Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
- Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
- Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
- Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
- Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
- Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Jin ZheProfessor of Computer Science, Anhui UniversityVerified email at ahu.edu.cn
- Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
- Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
- Rouzbeh BehniaUniversity of South FloridaVerified email at usf.edu
- Yvonne Kam Hwei SynMultimedia UniversityVerified email at mmu.edu.my
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu
- Chee Siang WongUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Andrew Teoh Beng JinProfessor of Electrical and Electronic Engineering, Yonsei University, KoreaVerified email at yonsei.ac.kr