Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mahmood Yousefi-AzarMacquarie UniversityVerified email at hdr.mq.edu.au
Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
Kevin Ho-ShonMacquarie UniversityVerified email at ho-shon.com
Omid NezamiMacquarie UniversityVerified email at mq.edu.au
Mark DrasAssociate Professor of Computing, Macquarie UniversityVerified email at mq.edu.au
Dr. Shiping ChenCSIRO Data61 AustraliaVerified email at data61.csiro.au
Deborah RichardsProfessor, Department of Computing, Macquarie UniversityVerified email at mq.edu.au
Uday TupakulaThe University of NewcastleVerified email at newcastle.edu.au
Sarvnaz KarimiCSIROVerified email at csiro.au
Sonit SinghSchool of Computer Science and Engineering, UNSW, AustraliaVerified email at unsw.edu.au
Stephen WanData61 CSIROVerified email at data61.csiro.au
Manolya Kavakli-ThorneHonorary Professor of Computer Science, Macquarie UniversityVerified email at mq.edu.au
Tahereh Hassanzadeh, Ph.DPostdoctoral Researcher at Leiden University Medical Center (LUMC), The Netherlands.Verified email at lumc.nl
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Xi ZhengMacquarie UniversityVerified email at mq.edu.au
Anthony SloaneHonorary Associate Professor, Macquarie UniversityVerified email at mq.edu.au
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
H. T. KungProfessor, Harvard UniversityVerified email at harvard.edu
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Takeo KanadeCarnegie Mellon UniversityVerified email at cs.cmu.edu