Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kashif SharifBeijing Institute of Technology, ChinaEmail verificata su bit.edu.cn
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyEmail verificata su bit.edu.cn
- Sujit Biswas, PhDLecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UKEmail verificata su city.ac.uk
- Md Monjurul KarimShenzhen Institute of Advanced TechnologyEmail verificata su siat.ac.cn
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityEmail verificata su temple.edu
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- Saraju P. MohantyProfessor, University of North TexasEmail verificata su unt.edu
- Qasim UmerCOMSATS University Islamabad, Vehari Campus, PakistanEmail verificata su ciitvehari.edu.pk
- Iqbal AlamBeijing Institute of Technology, ChinaEmail verificata su bit.edu.cn