Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Salman DurraniProfessor, School of Engineering, The Australian National UniversityVerified email at anu.edu.au
- Ghalib ShahAl-Khawarizmi Institute of Computer Science, UET LahoreVerified email at kics.edu.pk
- Waqar MahmoodUniversity of Engineering and Technology LahoreVerified email at kics.edu.pk
- Xiangyun (Sean) ZhouThe Australian National UniversityVerified email at anu.edu.au
- Bilal AfzalNational Centre for Cyber Security (NCCS)Verified email at kics.edu.pk
- Luigi AtzoriDepartment of Electrical and Electronic Engineering, University of CagliariVerified email at unica.it
- Adnan Noor MianComputer Lab., Department of Computer Science and Technology, University of Cambridge, CB3 0FDVerified email at cl.cam.ac.uk
- Muhammad ImranFederation University, AustraliaVerified email at ieee.org
- Shahzad YounisNational University of Sciences and Technology, IslamabadVerified email at seecs.edu.pk
- Adeel Baig , SMIEEE, SMACMAl Yamamah University Riyadh KSA - National University of Sciences and Technology, IslamabadVerified email at seecs.edu.pk
- Fakhar ul HassanInformation Technology UniversityVerified email at itu.edu.pk
- Duy T. NgoAssociate Professor, The University of Newcastle, AustraliaVerified email at newcastle.edu.au
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
- Fazal-e-AminKing Saud University, Riyadh, KSAVerified email at ksu.edu.sa
- Waleed IqbalQueen Mary University of LondonVerified email at qmul.ac.uk
- Dr. Kashif SattarAssistant Professor, IT Department, Arid University RawalpindiVerified email at uaar.edu.pk