Get my own profile
Public access
View all134 articles
40 articles
available
not available
Based on funding mandates
Co-authors
Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
J. Andrew ZhangProf, University of Technology SydneyVerified email at uts.edu.au
Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
Richard W. ZiolkowskiProfessor Emeritus, University of ArizonaVerified email at arizona.edu
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
He ZhuCommonwealth Scientific and Industrial Research Organisation (CSIRO)Verified email at csiro.au
Kai WuLecturer, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
Jia DuCSIROVerified email at csiro.au
Trevor S. BirdAntengenuityVerified email at ieee.org
Hai-Han SunAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
Val DyadyukCSIROVerified email at csiro.au
Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
Robert HeathLampe Distinguished Professor, North Carolina State UniversityVerified email at ncsu.edu
John BuntonCSIROVerified email at csiro.au
Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
Ming LiPostdoctoral Research Associate, University of Technology SydneyVerified email at uts.edu.au
Anh Tuyen LeUniversity of Technology SydneyVerified email at uts.edu.au
Follow