Get my own profile
Public access
View all10 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Linglong DaiProfessor, Tsinghua University; IEEE FellowVerified email at tsinghua.edu.cn
Usama MirUniversity of WindsorVerified email at uwindsor.ca
Bichai WangTsinghua UniversityVerified email at mails.tsinghua.edu.cn
Shanshan TuBeijing University of TechnologyVerified email at bjut.edu.cn
Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
Iftekhar AhmadSchool of Engineering, Edith Cowan University, AustraliaVerified email at ecu.edu.au
Dr. Sadaqat RehmanUniversity of SalfordVerified email at salford.ac.uk
Zahid HalimNational Yunlin University of Science and Technology, TaiwanVerified email at yuntech.edu.tw
Zhaocheng WangProfessor of Tsinghua UniversityVerified email at tsinghua.edu.cn
Zhen GaoBeijing Institute of TechnologyVerified email at bit.edu.cn
Jun FangUniversity of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Prof. Sultan AlamriProfessor of Computer Science- Senior Member IEEE. SEU, Saudi ArabiaVerified email at seu.edu.sa
Osama A. KhashanAssociate Professor in CybersecurityVerified email at ra.ac.ae
Ali SufyanAssistant Professor, The Islamia University of BahawalapurVerified email at iub.edu.pk
Raza AliUniversity of MalayaVerified email at siswa.um.edu.my
Zhu HanUniversity of HoustonVerified email at uh.edu
Yang YangSchool of Artificial Intelligence, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Wenqian ShenBeijing Institute of TechnologyVerified email at bit.edu.cn
Ahmet Mete ElbirResearch Fellow | University of LuxembourgVerified email at ext.uni.lu
Wei NiFIEEE, AAIA Fellow, Senior Principal Scientist & Conjoint Professor, CSIRO/UNSWVerified email at unsw.edu.au