Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Feng XiaProfessor, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Shuo YuDalian University of TechnologyVerified email at dlut.edu.cn
Huan LiuRegents Professor, Arizona State UniversityVerified email at asu.edu
Liangtian WanSchool of Software, Dalian University of TechnologyVerified email at dlut.edu.cn
Shirui PanFull Professor, ARC Future Fellow, FQA, Director of TrustAGI Lab, Griffith UniversityVerified email at griffith.edu.au
Teng GuoJinan UniversityVerified email at jnu.edu.cn
Francisco J Lopez-PellicerUniversidad de ZaragozaVerified email at unizar.es
Misbah Anwer@kiet.edu.pkVerified email at kiet.edu.pk
Awais AhmedLecturer at China West Normal UniversityVerified email at std.uestc.edu.cn
Javier Nogueras IsoUniversidad de ZaragozaVerified email at unizar.es
Ciyuan PengFederation University AustraliaVerified email at students.federation.edu.au
Mohsan AliResearcher, Aegean University, GreeceVerified email at aegean.gr
Loukis EuripidisUniversity of the AegeanVerified email at aegean.gr
Yannis CharalabidisProfessor, Digital Governance, University of the Aegean, GreeceVerified email at aegean.gr
Francesco CalimeriFull Professor of Computer Science, University of Calabria (UNICAL), ItalyVerified email at unical.it
Moiz Khan SherwaniUniversity of CopenhagenVerified email at sund.ku.dk
Syed Attique ShahBirmingham City UniversityVerified email at bcu.ac.uk
Mohamed Ben FarahSenior Lecturer in Cyber Security, Birmingham City UniversityVerified email at bcu.ac.uk
Javier LacastaAssistan Professor of Computer Science, University of ZaragozaVerified email at unizar.es
Giorgos PapageorgiouUniversity of EdinburghVerified email at ed.ac.uk