Get my own profile
Public access
View all7 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Mehran AbolhasanProfessor, University of Technology SydneyVerified email at uts.edu.au
Negin ShariatiSenior Lecturer, University of Technology Sydney (UTS)Verified email at uts.edu.au
Wei NiFIEEE, Principal Research Scientist, Information Privacy and Security Group, CSIROVerified email at csiro.au
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Imran MakhdoomNUST (Pak), University of Technology Sydney (Aus)Verified email at uts.edu.au
Samaneh MovassaghiGoogleVerified email at google.com
Farzad TofighUniversity of Technology SydneyVerified email at uts.edu.au
Ian ZhouUniversity of Technology SydneyVerified email at student.uts.edu.au
Majid AmiriPhD in Electrical and Telecommunication EngineeringVerified email at uts.edu.au
Paul BousteadDolby LaboratoriesVerified email at dolby.com
Joe ChicharoProfessor, University of WollongongVerified email at uow.edu.au
Rasool KeshavarzUniversity of Technology SydneyVerified email at uts.edu.au
David SmithPrincipal Research Scientist, Data61, CSIRO (NICTA); Adjunct Assoc. Prof., ANUVerified email at data61.csiro.au
John JudgeCiscoVerified email at ieee.org
Tadeusz A WysockiProfessor of Electrical and Computer Engineering, University of Nebraska - LincolnVerified email at unl.edu
Mahdi SakiFaculty of Engineering and Information Technology, University of Technology SydneyVerified email at uts.edu.au
Daniel R. FranklinSenior Lecturer in Telecommunications Engineering, University of Technology SydneyVerified email at uts.edu.au
Saber JafarizadehResearch Scientist, Rakuten, TokyoVerified email at rakuten.com
sepehr ashtariUniversity of Technology SydneyVerified email at student.uts.edu.au
Lei YangSr. Staff Research Scientist at IntelVerified email at intel.com
Follow