Get my own profile
Public access
View all136 articles
50 articles
available
not available
Based on funding mandates
Co-authors
- Xiaojing HuangProfessor of ICT, University of Technology SydneyVerified email at uts.edu.au
- Pei-Yuan QinUniversity of Technology, SydneyVerified email at uts.edu.au
- J. Andrew ZhangProf, University of Technology SydneyVerified email at uts.edu.au
- Shu-Lin ChenUniversity of Technology SydneyVerified email at uts.edu.au
- Richard W. ZiolkowskiProfessor Emeritus, University of ArizonaVerified email at arizona.edu
- Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
- He ZhuCommonwealth Scientific and Industrial Research Organisation (CSIRO)Verified email at csiro.au
- Kai WuLecturer, GBDTC, SEDE, FEIT, UTSVerified email at uts.edu.au
- Jia DuCSIROVerified email at csiro.au
- Trevor S. BirdAntengenuityVerified email at ieee.org
- Hai-Han SunAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
- Jose Luis Gomez TorneroTechnical University of CartagenaVerified email at upct.es
- Debabrata Kumar KarmokarUniversity of South AustraliaVerified email at ieee.org
- Val DyadyukCSIROVerified email at csiro.au
- Xu WangSchool of Electrical and Data Engineering, University of Technology SydneyVerified email at uts.edu.au
- Robert HeathCharles Lee Powell Chair in Wireless Communication, University of California, San DiegoVerified email at ucsd.edu
- Maral AnsariResearch Engineer, CSIROVerified email at csiro.au
- John BuntonCSIROVerified email at csiro.au
- Jinhong YuanProfessor of Electrical Engineering and Telecommunications, University of New South WalesVerified email at unsw.edu.au
- Anh Tuyen LeUniversity of Technology SydneyVerified email at uts.edu.au
Follow