Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dr Syed Salman Raza NaqviPhD in Computer Science, Beijing University of Posts and Telecommunications, ChinaVerified email at bupt.edu.cn
- Wali Ullah KhanInterdisciplinary Centre for Security, Reliability and Trust (SnT), University of LuxembourgVerified email at uni.lu
- Manzoor AhmedHubei Engineering UniversityVerified email at qdu.edu.cn
- Zhu HanUniversity of HoustonVerified email at uh.edu
- Shangguang WangBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Muhammad Rizwan AnwarBeijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
- Dr. Muhammad AsifChairman, Department of Computer Science, National Textile University FaisalabadVerified email at ntu.edu.pk
- Muhammad HafeezAssistant Professor, Institute of Business Management Sciences (IBMS), University of AgricultureVerified email at bupt.edu.cn
- Junaid CHAUDHRY PhD (Cyber Secu...College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, ArizonaVerified email at ieee.org
- Rafiqul IslamA/Professor in Computing, Charles Sturt UniversityVerified email at csu.edu.au
- Shahbaz AhmadSuperior University, Lahore, PakistanVerified email at superior.edu.pk