Get my own profile
Public access
View all16 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Matthew R. McKayProfessor, ARC Future Fellow, University of MelbourneVerified email at unimelb.edu.au
Wei NiPrincipal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Maged ElkashlanAssociate Professor, Queen Mary University of LondonVerified email at qmul.ac.uk
Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
Phil YeohUniversity of SydneyVerified email at sydney.edu.au
Stephen HanlyProfessor of EngineeringVerified email at mq.edu.au
Ren Ping LiuProfessor, University of Technology SydneyVerified email at uts.edu.au
I. Vaughan L. ClarksonSchool of Electrical Engineering & Computer Science, Queensland University of TechnologyVerified email at qut.edu.au
Zhuo ChenCSIRO, AustraliaVerified email at csiro.au
Hajime SuzukiCSIROVerified email at csiro.au
Raymond LouieUniversity of New South WalesVerified email at kirby.unsw.edu.au
Mark HedleyCSIRO Data61Verified email at csiro.au
Linda DavisAssociate Professor, Institute for Telecommunications Research, University of South AustraliaVerified email at unisa.edu.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
Philip WhitingMacquarie University, Dept. of Engineering, North Ryde, NSW AustraliaVerified email at mq.edu.au
Min LiZJU100 Young Professor at Zhejiang UniversityVerified email at zju.edu.cn
Michael HonigProfessor of Electrical Engineering and Computer Science, Northwestern UniversityVerified email at eecs.northwestern.edu
Nan YangAustralian National UniversityVerified email at anu.edu.au
Chang Kyung SungThales AustraliaVerified email at thalesgroup.com.au
Antonio ForenzaArtemis NetworksVerified email at artemis.com