Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Salman DurraniProfessor, School of Engineering, The Australian National UniversityEmail verificata su anu.edu.au
- Ghalib ShahAl-Khawarizmi Institute of Computer Science, UET LahoreEmail verificata su kics.edu.pk
- Waqar MahmoodUniversity of Engineering and Technology LahoreEmail verificata su kics.edu.pk
- Bilal AfzalNational Centre for Cyber Security (NCCS)Email verificata su kics.edu.pk
- Xiangyun (Sean) ZhouThe Australian National UniversityEmail verificata su anu.edu.au
- Luigi AtzoriDepartment of Electrical and Electronic Engineering, University of CagliariEmail verificata su unica.it
- Adnan Noor MianComputer Lab., Department of Computer Science and Technology, University of Cambridge, CB3 0FDEmail verificata su cl.cam.ac.uk
- Shahzad YounisNational University of Sciences and Technology, IslamabadEmail verificata su seecs.edu.pk
- Adeel Baig , SMIEEE, SMACMAl Yamamah University Riyadh KSA - National University of Sciences and Technology, IslamabadEmail verificata su seecs.edu.pk
- Fakhar ul HassanInformation Technology UniversityEmail verificata su itu.edu.pk
- Duy T. NgoAssociate Professor, The University of Newcastle, AustraliaEmail verificata su newcastle.edu.au
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Email verificata su mbzuai.ac.ae
- Fazal-e-AminKing Saud University, Riyadh, KSAEmail verificata su ksu.edu.sa
- Waleed IqbalQueen Mary University of LondonEmail verificata su qmul.ac.uk
- Dr. Kashif SattarAssistant Professor, IT Department, Arid University RawalpindiEmail verificata su uaar.edu.pk