Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jun BiProfessor and Director of Network Architecture Research Division, INSC, Tsinghua UniversityVerified email at tsinghua.edu.cn
Yu ZhouTsinghua UniversityVerified email at mails.tsinghua.edu.cn
cheng zhangTsinghua University PhDVerified email at mails.tsinghua.edu.cn
Ghalib ShahAl-Khawarizmi Institute of Computer Science, UET LahoreVerified email at kics.edu.pk
Ghulam AbbasProfessor at GIK Institute of Engineering Sciences and TechnologyVerified email at giki.edu.pk
Mumtaz Ali ShahUniversity of Wah, Wah Cantt. Taxila, PakistanVerified email at uow.edu.pk
Zahid HalimNational Yunlin University of Science and Technology, TaiwanVerified email at yuntech.edu.tw
Yiran ZhangAssistant Professor, Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Javed Ali KhanUniversity of Hertforshire, UKVerified email at herts.ac.uk
Rubia FatimaTsinghua UniversityVerified email at tsinghua.org.cn
Affan YasinPost Doctoral ResearcherVerified email at tsinghua.org.cn
Sheikh Badar ud din TahirLecturer, SZABIST University, IslamabadVerified email at students.au.edu.pk
Yangyang WangTsinghua UniversityVerified email at cernet.edu.cn
Bingyang LiuTsinghua UniversityVerified email at netarchlab.tsinghua.edu.cn
Zijun MaGraduate students of Computer Science, University of Wisconsin MadisonVerified email at wisc.edu
Sadia AzizLatrobe UniversityVerified email at latrobe.edu.au
Chengwei QinNanyang Technological UniversityVerified email at e.ntu.edu.sg
Hisham AlasmaryAssociate Professor, King Khalid UniversityVerified email at kku.edu.sa
Sheng ChenProfessor, University of SouthamptonVerified email at ecs.soton.ac.uk
Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk