Get my own profile
Public access
View all45 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Weiren YuDepartment of Computer Science, Imperial College LondonVerified email at imperial.ac.uk
Zhijin QinTsinghua UniversityVerified email at tsinghua.edu.cn
Philippe LalandaLIG/ADELE Université Joseph Fourier at GrenobleVerified email at imag.fr
Di WuProfessor, Hunan UniversityVerified email at hnu.edu.cn
Ada DiaconescuAssociate Professor (Tenured) in Computer Science, Telecom Paris, LTCI, Inst. Polytechnique de ParisVerified email at telecom-paristech.fr
Sokratis KartakisAmazonVerified email at amazon.com
Ivana TomićSenior Lecturer in Cyber Security, University of GreenwichVerified email at greenwich.ac.uk
Usman AdeelImperial College LondonVerified email at imperial.ac.uk
Andrew MacFarlaneCity, University of LondonVerified email at soi.city.ac.uk
Po-Yu Chen (陳伯禹)Computing Department, Imperial College LondonVerified email at imperial.ac.uk
Geoffrey Ye Li (李烨)Chair Professor in Wireless Systems, Dept EEE, Imperial College LondonVerified email at imperial.ac.uk
Ray (Fengrui) ShiCumberland, Imperial College LondonVerified email at cumberland.io
Dmitri Ivanovich ArkhipovUniversity of California IrvineVerified email at ics.uci.edu
Zhengguo ShengReader in University of Sussex, UKVerified email at sussex.ac.uk
Kin K. LeungTanaka Chair Professor, Imperial CollegeVerified email at imperial.ac.uk
Laksh BhatiaImperial College LondonVerified email at imperial.ac.uk
Yad TahirDepartment IT, American University of Iraq, Sulaimani, Kurdistan Region, IraqVerified email at auis.edu.krd
Amelia ReganProfessor of Computer Science and Transportation Systems Engineering, UC IrvineVerified email at uci.edu
Fatma BenkhelifaAssistant Professor in Coventry UniversityVerified email at kaust.edu.sa
Yuanwei LiuAssociate Professor in Queen Mary University of London, Web of Science Highly Cited ResearcherVerified email at qmul.ac.uk