Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
35 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yong FengSwinburne University of Technology, AustraliaEmail verificata su swin.edu.au
- Xinghuo YuFAA, FIEEE, HonFIEAust, Distinguished Professor @ RMIT UniversityEmail verificata su rmit.edu.au
- Prof. Jiankun HuUniversity of New South Wales, CanberraEmail verificata su adfa.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Xuechao YangCollege of ABLE&IT, Victoria UniversityEmail verificata su vu.edu.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesEmail verificata su rmit.edu.au
- Jinhu LuProfessor of Beihang UniversityEmail verificata su iss.ac.cn
- Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaEmail verificata su rmit.edu.au
- Guanrong ChenCity University of Hong KongEmail verificata su cityu.edu.hk
- Rebecca Jing YangRMIT UniversityEmail verificata su rmit.edu.au
- Xuemei ZhengProfessor, Harbin Institute of Technology, ChinaEmail verificata su hit.edu.cn
- Tohari AhmadDepartment of Informatics, Institut Teknologi Sepuluh NopemberEmail verificata su if.its.ac.id
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Yi (Alice) WangDongguan University of TechnologyEmail verificata su ieee.org
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityEmail verificata su rmit.edu.au
- Ligang HeReader of Computer Science, University of Warwick, United KingdomEmail verificata su warwick.ac.uk
- Minghao Zhou (周铭浩)Harbin Institute of Technology, China; RMIT University, Australia; HUST, China
Segui
Fengling Han
School of Computing Technologies, RMIT University, Australia
Email verificata su rmit.edu.au - Home page