Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Fan Li (李凡)Professor of School of Computer Science, Beijing Institute of TechnologyVerified email at bit.edu.cn
- Kashif SharifBeijing Institute of Technology, ChinaVerified email at bit.edu.cn
- Zohaib LatifAssistant Professor, Nazarbayev University, KazakhstanVerified email at bit.edu.cn
- Yu Wang (王昱)Professor of Computer and Information Sciences, FIEEE, DMACM, Temple UniversityVerified email at temple.edu
- Saraju P. MohantyProfessor, University of North TexasVerified email at unt.edu
- Boubakr NourCybersecurity Researcher, Ericsson, Montreal, CanadaVerified email at ericsson.com
- Anupam Kumar Bairagi, PhDProfessor of Computer Science and Engineering, Khulna University, BangladeshVerified email at cse.ku.ac.bd
- Yang LiuProfessor of Beijing University of Posts and TelecommunicationsVerified email at bupt.edu.cn
Follow
Sujit Biswas, PhD
Lecturer (Asst. Prof.), City, University of London, UK; Research Associate, UCL, UK
Verified email at city.ac.uk