Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
Shanshan TuBeijing University of TechnologyVerified email at bjut.edu.cn
Abdul Rauf BaigProfessor, Computer Science, Imam Mohammad Ibn Saud Islamic University, RiyadhVerified email at imamu.edu.sa
Dr. Sadaqat RehmanUniversity of SalfordVerified email at salford.ac.uk
Dr. Atta Ur RahmanKing Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Syed Fawad HussainUniversity of BirminghamVerified email at bham.ac.uk
Doğan AydınIzmir Katip Çelebi UniversityVerified email at ikc.edu.tr
Zhu HanUniversity of HoustonVerified email at uh.edu
Saima HassanAssistant Professor at the Institute of Computing Kohat University of ScienceVerified email at kust.edu.pk
Sheng ChenProfessor, University of SouthamptonVerified email at ecs.soton.ac.uk
Muhammad Ghufran KhanPhD CandidateVerified email at inria.fr
Muhammad AtifUniversity of FlorenceVerified email at unifi.it
Dr. Usama ArshadAssistant Professor, FAST National University of Computer and Emerging SciencesVerified email at isb.nu.edu.pk
Mustapha LebbahFull Professor, Paris-Saclay University - UVSQ - VersaillesVerified email at uvsq.fr
Saadi BoudjitProfessor, university of Rouen NormandyVerified email at univ-rouen.fr
Dr Abrar UllahSchool of Mathematical and Computer Science, Heriot Watt UniversityVerified email at hw.ac.uk
Imad RidaMaître de conférences @ Université de Technologie de CompiègneVerified email at utc.fr
Omer AliPhD Student, Norwegian Radium HospitalVerified email at uio.no
Shahid IqbalPhD Student of IT, Monash UniversityVerified email at monash.edu
Zhongliang Yang (杨忠良)Associate Professor, Beijing University of Posts and TelecommunicationsVerified email at tsinghua.org.cn