Get my own profile
Public access
View all43 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
Syed Ali HassanNational University of Sciences and Technology (NUST)Verified email at seecs.edu.pk
Leila MusavianProfessor, University of EssexVerified email at essex.ac.uk
Muhammad Ali Imran, FIEEE, FRSE, F...Professor of Communication Systems - University of GlasgowVerified email at glasgow.ac.uk
Muhammad Ali JamshedUniversity of GlasgowVerified email at glasgow.ac.uk
Hassan MalikUniversity of EssexVerified email at essex.ac.uk
Sukhpal Singh GillQueen Mary University of London, UKVerified email at qmul.ac.uk
Wali Ullah KhanInterdisciplinary Centre for Security, Reliability and Trust (SnT), University of LuxembourgVerified email at uni.lu
Regius Professor Rahim Tafazolli, FR...Regius Professor of Electronic EngineeringVerified email at surrey.ac.uk
Shahid Mumtaz, ProfessorNottingham Trent UniversityVerified email at ieee.org
Furqan JameelAalto UniversityVerified email at aalto.fi
Muhammad Mahtab ALAMTallinn University of TechnologyVerified email at taltech.ee
Saif U. R. MalikCybernetica AS EstoniaVerified email at cyber.ee
Shreshth TuliHappening TechnologyVerified email at happening.xyz
Manmeet Pal SinghRyerson UniversityVerified email at ryerson.ca
Charilaos C. Zarakovitisaxon logic, Athens, GreeceVerified email at axonlogic.gr
Riku JanttiAalto UniversityVerified email at aalto.fi
Syed Ahsan Raza NaqviPacific Northwest National LaboratoryVerified email at pnnl.gov
Yannick Le MoullecTallinn University of TechnologyVerified email at taltech.ee
Mohammad Sadegh AslanpourMonash University and CSIRO Data61Verified email at monash.edu