Get my own profile
Public access
View all31 articles
28 articles
available
not available
Based on funding mandates
Co-authors
Tsu-Yang WuCollege of Computer Science and Engineering, Shandong University of Science and TechnologyVerified email at sdust.edu.cn
King Hang Wang, KevinHong Kong Baptist UniversityVerified email at comp.hkbu.edu.hk
Saru KumariAssistant Professor, Department of Mathematics, Ch. Charan Singh University, MeerutVerified email at ccsuniversity.ac.in
Jeng-Shyang PanShandong University of Science and TechnologyVerified email at cc.kuas.edu.tw
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw
Jimmy Ming-Tai WuShandong University of Science and TechnologyVerified email at wmt35.idv.tw
Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
Prof. Dr. Mohammad Mehedi HassanProfessor, Dept. of Information Systems, King Saud University, Riyadh, KSAVerified email at ksu.edu.sa
Jerry Chun-Wei LinProfessor, IET Fellow, ACM Distinguished Member, Western Norway University of Applied SciencesVerified email at ieee.org
Kuo-Hui YehNational Dong Hwa UniversityVerified email at gms.ndhu.edu.tw
Yining LiuSchool of Computer Science and Information Security, Guilin University of Electronic TechnologyVerified email at guet.edu.cn
Shehzad Ashraf ChaudhryAbu Dhabi UniversityVerified email at adu.ac.ae
Muhammad Asghar KhanAssistant Professor, Department of Electrical Engineering, Hamdard University, PakistanVerified email at hamdard.edu.pk
Hu XiongUniversity of electronic science and technology of chinaVerified email at uestc.edu.cn
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp