Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kashif SharifBeijing Institute of Technology, ChinaVerified email at bit.edu.cn
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyVerified email at bit.edu.cn
- Zohaib LatifAssistant Professor, Nazarbayev University, KazakhstanVerified email at bit.edu.cn
- Sujit Biswas, PhDLecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UKVerified email at city.ac.uk
- liehuang zhuBeijing Institute of TechnologyVerified email at bit.edu.cn
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaVerified email at ericsson.com
- Chang XUAssociate Professor, Beijing Institute of Technology, Beijing, ChinaVerified email at bit.edu.cn
- Alia AsheralievaSouthern University of Science and Technology, ChinaVerified email at sustech.edu.cn
- Arif RazaResearcher at Shenzhen UniversityVerified email at email.szu.edu.cn
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
- Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
- Ezekia GilliardLecturer, Cyber Science at Mwalimu Julius K. Nyerere University of Agriculture and TechnologyVerified email at mjnuat.ac.tz
- Zehui XiongSingapore University of Technology and Design (SUTD), Highly Cited ResearcherVerified email at sutd.edu.sg
- Jiawen KangGuangdong University of TechnologyVerified email at gdut.edu.cn
- Qiang YanSingapore Management UniversityVerified email at smu.edu.sg