Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peter ChristenProfessor, Australian National University, and University of EdinburghVerified email at anu.edu.au
- Lexing XieProfessor at Australian National UniversityVerified email at anu.edu.au
- Scott SannerUniversity of TorontoVerified email at mie.utoronto.ca
- Michael ComptonCSIROVerified email at csiro.au
- Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
- Jey Han LauComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Edwin V. BonillaPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
- Ehsan AbbasnejadAustralian Institute for Machine Learning, University of AdelaideVerified email at adelaide.edu.au
- Nicolás Della PennaGroupLangVerified email at grouplang.com
- Joseph NoelAsian Institute of ManagementVerified email at aim.edu
- Kerry TaylorProfessor of Computer Science, Australian National UniversityVerified email at acm.org
- Mukesh MohaniaIIIT DelhiVerified email at iiitd.ac.in
- Christopher John ButlerResearch Scientist, IBMVerified email at au1.ibm.com
- Alexandre RademakerIBM Research and EMAp/FGVVerified email at br.ibm.com
- Ishan JindalIBM ResearchVerified email at wayne.edu
- Roderic BroadhurstEmeritus Professor, Regnet, Research School of Asia and the Pacific, Australian National UniversityVerified email at anu.edu.au
- Warren JinData61 CSIRO AustraliaVerified email at csiro.au
- Lianhua ChiLecturer at La Trobe UniversityVerified email at latrobe.edu.au
- Trevor CohnGoogle Research (Research Scientist) & University of Melbourne (Professor; School of CIS)Verified email at unimelb.edu.au
- Suvash SedhainTubi IncVerified email at twitter.com