Get my own profile
Public access
View all17 articles
35 articles
available
not available
Based on funding mandates
Co-authors
Yong FengSwinburne University of Technology, AustraliaVerified email at swin.edu.au
Xinghuo YuFAA, HonFIEAust, FIEEE, Distinguished Professor @ RMIT UniversityVerified email at rmit.edu.au
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Xuechao YangSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Jinhu LuProfessor of Beihang UniversityVerified email at iss.ac.cn
Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
Guanrong ChenCity University of Hong KongVerified email at cityu.edu.hk
Rebecca Jing YangRMIT UniversityVerified email at rmit.edu.au
Xuemei ZhengProfessor, Harbin Institute of Technology, ChinaVerified email at hit.edu.cn
Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberVerified email at if.its.ac.id
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yi (Alice) WangDongguan University of TechnologyVerified email at ieee.org
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Ligang HeReader of Computer Science, University of Warwick, United KingdomVerified email at warwick.ac.uk
Minghao Zhou (周铭浩)Harbin Institute of Technology, China; RMIT University, Australia; HUST, China
Follow
Fengling Han
School of Computing Technologies, RMIT University, Australia
Verified email at rmit.edu.au - Homepage