Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Linglong DaiProfessor, Tsinghua University; IEEE FellowEmail verificata su tsinghua.edu.cn
- Usama MirUniversity of WindsorEmail verificata su uwindsor.ca
- Bichai WangTsinghua UniversityEmail verificata su mails.tsinghua.edu.cn
- Shanshan TuBeijing University of TechnologyEmail verificata su bjut.edu.cn
- Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Email verificata su gre.ac.uk
- Iftekhar AhmadSchool of Engineering, Edith Cowan University, AustraliaEmail verificata su ecu.edu.au
- Dr. Sadaqat RehmanUniversity of SalfordEmail verificata su salford.ac.uk
- Zahid HalimNational Yunlin University of Science and Technology, TaiwanEmail verificata su yuntech.edu.tw
- Zhaocheng WangProfessor of Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Zhen GaoBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Jun FangUniversity of Electronic Science and Technology of ChinaEmail verificata su uestc.edu.cn
- Prof. Sultan AlamriProfessor of Computer Science- Senior Member IEEE. SEU, Saudi ArabiaEmail verificata su seu.edu.sa
- Osama A. KhashanAssociate Professor in CybersecurityEmail verificata su ra.ac.ae
- Ali SufyanAssistant Professor, The Islamia University of BahawalapurEmail verificata su iub.edu.pk
- Raza AliUniversity of MalayaEmail verificata su siswa.um.edu.my
- Zhu HanUniversity of HoustonEmail verificata su uh.edu
- Yang YangSchool of Artificial Intelligence, Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
- Wenqian ShenBeijing Institute of TechnologyEmail verificata su bit.edu.cn
- Ahmet M. ElbirResearch Fellow | University of LuxembourgEmail verificata su ext.uni.lu
- Wei NiFIEEE, AAIA Fellow, Senior Principal Scientist, Information Security & Privacy Group, CSIROEmail verificata su csiro.au