Get my own profile
Public access
View all0 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Zhuo LiTianjin UniversityVerified email at tju.edu.cn
Zunera JalilDepartment of Cyber Security, National Cyber Crimes & Forensics Lab, Air University, IslamabadVerified email at mail.au.edu.pk
Abdul Rehman JavedDepartment of Cyber Security, Air University, Islamabad, PakistanVerified email at au.edu.pk
Syed Atif MoqurrabFCAI,Air University, IslamabadVerified email at mail.au.edu.pk
Sidra AbbasASET Lab, IslamabadVerified email at nu.edu.pk
Syed Hassan AhmedJMA Wireless, USA. | IEEE Senior Member | ACM Distinguished SpeakerVerified email at ieee.org
Sayed Chhattan ShahAssociate Professor of Computer Science at Hankuk University of Foreign Studies, South KoreaVerified email at hufs.ac.kr
Shuiguang DENGProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Bin CaoCollege of Computer Science, Zhejiang University of TechnologyVerified email at zjut.edu.cn
Jianwei YinProfessor of Computer Science and Technology, Zhejiang UniversityVerified email at zju.edu.cn
Xuan Liu
College of Information Engineering (College of Artificial Intelligence), Yangzhou University, China
Verified email at yzu.edu.cn - Homepage