Get my own profile
Public access
View all42 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Qiang NiProfessor, Lancaster UniversityVerified email at lancaster.ac.uk
- Syed Ali HassanNational University of Sciences and Technology (NUST)Verified email at seecs.edu.pk
- Leila MusavianProfessor, University of EssexVerified email at essex.ac.uk
- Muhammad Ali Imran, FIEEE, FRSE, F...Professor of Communication Systems - University of GlasgowVerified email at glasgow.ac.uk
- Muhammad Ali JamshedUniversity of GlasgowVerified email at glasgow.ac.uk
- Hassan MalikUniversity of EssexVerified email at essex.ac.uk
- Sukhpal Singh GillQueen Mary University of London, UKVerified email at qmul.ac.uk
- Wali Ullah KhanInterdisciplinary Centre for Security, Reliability and Trust (SnT), University of LuxembourgVerified email at uni.lu
- Regius Professor Rahim Tafazolli, FR...Regius Professor of Electronic EngineeringVerified email at surrey.ac.uk
- Shahid Mumtaz, ProfessorNottingham Trent UniversityVerified email at ieee.org
- Furqan JameelAalto UniversityVerified email at aalto.fi
- Muhammad Mahtab ALAMTallinn University of TechnologyVerified email at taltech.ee
- Saif U. R. MalikCybernetica AS EstoniaVerified email at cyber.ee
- Shreshth TuliHappening TechnologyVerified email at happening.xyz
- Manmeet Pal SinghRyerson UniversityVerified email at ryerson.ca
- Riku JanttiAalto UniversityVerified email at aalto.fi
- Charilaos ZarakovitisSenior Researcher, National Centre for Scientific Research DEMOKRITOSVerified email at iit.demokritos.gr
- Syed Ahsan Raza NaqviPacific Northwest National LaboratoryVerified email at pnnl.gov
- Yannick Le MoullecTallinn University of TechnologyVerified email at taltech.ee
- Mohammad Sadegh AslanpourMonash University and CSIRO Data61Verified email at monash.edu