Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Moatsum AlawidaAbu Dhabi University.Verified email at adu.ac.ae
Azman SamsudinUniversiti Sains MalaysiaVerified email at cs.usm.my
Norziana JamilUnited Arab Emirates University and Universiti Tenaga NasionalVerified email at uaeu.ac.ae
Jiageng ChenCentral China Normal UniversityVerified email at ccnu.edu.cn
Wei-Zhu YeohCISPA Helmholtz Center for Information Security, PhD StudentVerified email at cispa.de
Damilare Peter OYINLOYEFellow, Norwegian University of Science and TechnologyVerified email at ntnu.no
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Weizhi MengProfessor, Lancaster University, United KingdomVerified email at lancaster.ac.uk
Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
Jiashen TehAssociate Professor, University Sains Malaysia (USM)Verified email at usm.my