Works by Deng, Robert
1
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 3, p. 158, doi. 10.1049/iet-ifs.2014.0145
- Sun, Yinxia;
- Zhang, Futai;
- Shen, Limin;
- Deng, Robert H.
- Article
2
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 5, p. 273, doi. 10.1049/iet-ifs.2013.0062
- Guan, Chaowen;
- Weng, Jian;
- Deng, Robert H.;
- Chen, Minrong;
- Zhou, Dehua
- Article
3
- IET Information Security (Wiley-Blackwell), 2013, v. 7, n. 1, p. 1, doi. 10.1049/iet-ifs.2013.0043
- Yan, Zheng;
- Wang, Guojun;
- Deng, Robert H.;
- Jøsang, Audun
- Article
4
- Heteroatom Chemistry, 2009, v. 20, n. 3, p. 136, doi. 10.1002/hc.20525
- Batsanov, Andrei S.;
- Deng, Robert M. K.;
- Dillon, Keith B.;
- Goeta, Andrés E.;
- Howard, Judith A. K.;
- Meldrum, James;
- Monks, Philippa K.;
- Puschmann, Horst;
- Shepherd, Helena J.
- Article
5
- Telemedicine & e-Health, 2008, v. 14, n. 8, p. 833, doi. 10.1089/tmj.2008.0086
- Zhuo Wei;
- Yongdong Wu;
- Robert H. Deng;
- Shengsheng Yu;
- Haixia Yao;
- Zhigang Zhao;
- Lek Heng Ngoh;
- Lim Tock Han;
- Eugenie W. T. Poh
- Article
6
- Computer Journal, 2020, v. 63, n. 4, p. 536, doi. 10.1093/comjnl/bxz095
- Tian, Yangguang;
- Li, Yingjiu;
- Deng, Robert H;
- Li, Nan;
- Yang, Guomin;
- Yang, Zheng
- Article
7
- Computer Journal, 2016, v. 59, n. 8, p. 1220, doi. 10.1093/comjnl/bxw007
- Article
8
- Concurrency & Computation: Practice & Experience, 2020, v. 32, n. 14, p. 1, doi. 10.1002/cpe.5680
- Cui, Hui;
- Hon Yuen, Tsz;
- Deng, Robert H.;
- Wang, Guilin
- Article
9
- Innovation, 2004, v. 4, n. 1, p. 48
- Article
10
- Multimedia Systems, 2014, v. 20, n. 2, p. 165, doi. 10.1007/s00530-013-0326-0
- Deng, Robert;
- Ding, Xuhua;
- Wu, Yongdong;
- Wei, Zhuo
- Article
11
- Phosphorus, Sulfur & Silicon & the Related Elements, 1992, v. 66, n. 1-4, p. 95, doi. 10.1080/10426509208038336
- Deng, Robert M. K.;
- Dillon, Keith B.
- Article
12
- Computer Journal, 2024, v. 67, n. 5, p. 1814, doi. 10.1093/comjnl/bxad102
- Tian, Yangguang;
- Li, Yingjiu;
- Deng, Robert H;
- Yang, Guomin;
- Li, Nan
- Article
13
- Computer Journal, 2022, v. 65, n. 10, p. 2570, doi. 10.1093/comjnl/bxab090
- Sengupta, Binanda;
- Li, Yingjiu;
- Tian, Yangguang;
- Deng, Robert H;
- Yang, Zheng
- Article
14
- 2011
- Deng, Robert;
- Veijalainen, Jari;
- Lian, Shiguo;
- Kanellopoulos, Dimitris
- Editorial
15
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 20, p. 6191, doi. 10.1007/s00500-016-2177-z
- Ma, Siqi;
- Lai, Junzuo;
- Deng, Robert;
- Ding, Xuhua
- Article
16
- Heteroatom Chemistry, 2005, v. 16, n. 5, p. 447, doi. 10.1002/hc.20124
- Burton, Jenny D.;
- Deng, Robert M. K.;
- Dillon, Keith B.;
- Monks, Philippa K.;
- J. Olivey, Richard
- Article
17
- Heteroatom Chemistry, 2001, v. 12, n. 6, p. 501, doi. 10.1002/hc.1077
- Barnham, Rachel J.;
- Deng, Robert M. K.;
- Dillon, Keith B.;
- Goeta, Andrés E.;
- Howard, Judith A. K.;
- Puschmann, Horst
- Article
18
- Security & Communication Networks, 2016, v. 9, n. 18, p. 4897, doi. 10.1002/sec.1663
- Liu, Lixian;
- Lai, Junzuo;
- Deng, Robert H.;
- Li, Yingjiu
- Article
19
- Security & Communication Networks, 2014, v. 7, n. 3, p. 611, doi. 10.1002/sec.762
- Deng, Robert H.;
- Ding, Xuhua;
- Lo, Swee-Won
- Article
20
- Security & Communication Networks, 2012, v. 5, n. 11, p. 1248, doi. 10.1002/sec.620
- Huang, Xinyi;
- Chu, Cheng-Kang;
- Sun, Hung-Min;
- Zhou, Jianying;
- Deng, Robert H.
- Article
21
- Security & Communication Networks, 2012, v. 5, n. 5, p. 496, doi. 10.1002/sec.338
- Zhu, Wen Tao;
- Zhou, Jianying;
- Deng, Robert H.;
- Bao, Feng
- Article
22
- KSII Transactions on Internet & Information Systems, 2021, v. 15, n. 8, p. 2827, doi. 10.3837/tiis.2021.08.007
- Yingling Dai;
- Jian Weng;
- Anjia Yang;
- Shui Yu;
- Deng, Robert H.
- Article
23
- Cybersecurity (2523-3246), 2020, v. 3, n. 1, p. N.PAG, doi. 10.1186/s42400-020-00057-3
- Liu, Ximeng;
- Deng, Robert H.;
- Wu, Pengfei;
- Yang, Yang
- Article
24
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0009-4
- Chang, Bing;
- Li, Yingjiu;
- Wang, Qiongxiao;
- Zhu, Wen-Tao;
- Deng, Robert H.
- Article
25
- Personal & Ubiquitous Computing, 2012, v. 16, n. 5, p. 485, doi. 10.1007/s00779-011-0420-2
- Yan, Zheng;
- Zhang, Peng;
- Deng, Robert
- Article
26
- 2020
- Yeh, Kuo-Hui;
- Su, Chunhua;
- Deng, Robert H.;
- Yung, Moti;
- Kutylowski, Miroslaw
- Editorial
27
- International Journal of Information Security, 2018, v. 17, n. 3, p. 347, doi. 10.1007/s10207-017-0372-2
- Wang, Yujue;
- Pang, HweeHwa;
- Deng, Robert H.
- Article
28
- 2015
- Bertino, Elisa;
- Deng, Robert;
- Huang, Xinyi;
- Zhou, Jianying
- Editorial
29
- International Journal of Information Security, 2011, v. 10, n. 3, p. 155, doi. 10.1007/s10207-011-0127-4
- Zhu, Wen;
- Xiang, Yang;
- Zhou, Jianying;
- Deng, Robert;
- Bao, Feng
- Article
30
- International Journal of Information Security, 2010, v. 9, n. 4, p. 237, doi. 10.1007/s10207-010-0105-2
- Ding, Xuhua;
- Yang, Yanjiang;
- Deng, Robert;
- Wang, Shuhong
- Article
31
- International Journal of Information Security, 2006, v. 5, n. 1, p. 37, doi. 10.1007/s10207-005-0072-1
- Jianying Zhou;
- Bao, Feng;
- Deng, Robert
- Article
32
- Concurrency & Computation: Practice & Experience, 2011, v. 23, n. 12, p. 1348, doi. 10.1002/cpe.1618
- Zhang, Qi;
- Mu, Yi;
- Zhang, Minjie;
- Deng, Robert H.
- Article