Get my own profile
Public access
View all40 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
Syed Ali HassanNational University of Sciences and Technology (NUST)Verified email at seecs.edu.pk
Leila MusavianProfessor, University of EssexVerified email at essex.ac.uk
Muhammad Ali Imran, FIEEE, FRSE, F...Professor of Communication Systems - University of GlasgowVerified email at glasgow.ac.uk
Muhammad Ali Jamshed, FRSAUniversity of GlasgowVerified email at glasgow.ac.uk
Hassan MalikEdge Hill UniversityVerified email at edgehill.ac.uk
Sukhpal Singh GillQueen Mary University of London, UKVerified email at qmul.ac.uk
Wali Ullah KhanInterdisciplinary Centre for Security, Reliability and Trust (SnT), University of LuxembourgVerified email at uni.lu
Regius Professor Rahim Tafazolli, FR...Regius Professor of Electronic EngineeringVerified email at surrey.ac.uk
shahid mumtaz, ProfessorNottingham Trent UniversityVerified email at ieee.org
Furqan JameelAalto UniversityVerified email at aalto.fi
Muhammad Mahtab ALAMTallinn University of TechnologyVerified email at ttu.ee
Syed Ahsan Raza NaqviPacific Northwest National LaboratoryVerified email at pnnl.gov
Riku JanttiAalto UniversityVerified email at aalto.fi
Shreshth TuliPresident's Ph.D. Scholar, Department of Computing, Imperial College LondonVerified email at imperial.ac.uk
Saif U. R. MalikCybernetica AS EstoniaVerified email at cyber.ee
Yannick Le MoullecTallinn University of TechnologyVerified email at ttu.ee
Mohammad Sadegh AslanpourMonash University and CSIRO Data61Verified email at monash.edu
Shikhar TuliPh.D. Candidate, Department of Electrical and Computer Engineering, Princeton UniversityVerified email at princeton.edu
Vlado StankovskiFull Professor, University of LjubljanaVerified email at fri.uni-lj.si