Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
- Shanshan TuBeijing University of TechnologyVerified email at bjut.edu.cn
- Abdul Rauf BaigProfessor, Computer Science, Imam Mohammad Ibn Saud Islamic University, RiyadhVerified email at imamu.edu.sa
- Dr. Sadaqat RehmanUniversity of SalfordVerified email at salford.ac.uk
- Dr. Atta Ur RahmanKing Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
- Syed Fawad HussainUniversity of BirminghamVerified email at bham.ac.uk
- UzmaResearch AssociateVerified email at glasgow.ac.uk
- Doğan AydınIzmir Katip Çelebi UniversityVerified email at ikc.edu.tr
- Zhu HanUniversity of HoustonVerified email at uh.edu
- Sheng ChenProfessor, University of SouthamptonVerified email at ecs.soton.ac.uk
- Saima HassanAssistant Professor at the Institute of Computing Kohat University of ScienceVerified email at kust.edu.pk
- Muhammad Ghufran KhanPhD CandidateVerified email at inria.fr
- Muhammad AtifUniversity of FlorenceVerified email at unifi.it
- Mustapha LebbahFull Professor, Paris-Saclay University - UVSQ - VersaillesVerified email at uvsq.fr
- Saadi BoudjitAssociate professor, university of Paris 13Verified email at univ-paris13.fr
- Omer AliPhD Student, Norwegian Radium HospitalVerified email at uio.no
- Dr Abrar UllahSchool of Mathematical and Computer Science, Heriot Watt UniversityVerified email at hw.ac.uk
- Shahid IqbalPhD Student of IT, Monash UniversityVerified email at monash.edu
- Zhongliang Yang (杨忠良)Associate Professor, Beijing University of Posts and TelecommunicationsVerified email at tsinghua.org.cn
- Anis KoubâaPrince Sultan University | Executive Director of the Innovation Center | Director of ResearchVerified email at psu.edu.sa