Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyEmail verificata su bit.edu.cn
- Kashif SharifBeijing Institute of Technology, ChinaEmail verificata su bit.edu.cn
- Zohaib LatifAssistant Professor, Nazarbayev University, KazakhstanEmail verificata su bit.edu.cn
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityEmail verificata su temple.edu
- Saraju P. MohantyProfessor, University of North TexasEmail verificata su unt.edu
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaEmail verificata su ericsson.com
- Anupam Kumar Bairagi, PhDProfessor of Computer Science and Engineering, Khulna University, BangladeshEmail verificata su cse.ku.ac.bd
- Yang LiuProfessor of Beijing University of Posts and TelecommunicationsEmail verificata su bupt.edu.cn
Segui
Sujit Biswas, PhD
Lecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UK
Email verificata su city.ac.uk