Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dr. Omprakash Kaiwartya, Associate P...Dept. of Computer Science, Nottingham Trent University, UKVerified email at ntu.ac.uk
Jaime Lloret (ORCID 0000-0002-0862...Universitat Politecnica de Valencia, SpainVerified email at dcom.upv.es
Prof Rupak KharelAssociate Dean and Professor of Cyber Security, University of Huddersfield, UKVerified email at hud.ac.uk
Kabita AdhikariSenior Lecturer in Signal Processing and Machine Learning, Newcastle UniversityVerified email at newcastle.ac.uk
Chaminda Thushara HewageReader in Data Security, Cardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk
Mufti Mahmud, PhDKing Fahd University of Petroleum and Minerals, Saudi ArabiaVerified email at kfupm.edu.sa
Yue Cao, CEng|FIET|FRSA|FBCS|FHE...Professor at Wuhan UniversityVerified email at whu.edu.cn
H. Herbert SongIEEE Fellow, Co-EiC of TII (IF=11.7), University of Maryland, Baltimore CountyVerified email at umbc.edu
Noel CrespiProfessor @ Telecom SudParis, Institut Mines-Telecom, Institut Polytechnique de ParisVerified email at it-sudparis.eu
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Weizhe ZhangProfessor of Peng Cheng Laboratory & Harbin Institute of TechnologyVerified email at hit.edu.cn
Chin-Teng LinUniversity of Technology SydneyVerified email at uts.edu.au
Xingwang LiAssociate Professor, Henan Polytechnic UniversityVerified email at hpu.edu.cn
Ghanim PutrusProfessor of Electrical Power Engineering, Northumbria UniversityVerified email at northumbria.ac.uk
Bamidele Adebisi, PhD, FIET, CEng, S...Professor of Intelligent Infrastructure Systems, Manchester Metropolitan UniversityVerified email at mmu.ac.uk
Yang CaoPhD, Associate Professor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn