Get my own profile
Public access
View all43 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Jean-Pierre CorriveauComputer Science professor, CarletonVerified email at scs.carleton.ca
- Tian Zhihong(田志宏)Professor; Guangzhou UniversityVerified email at gzhu.edu.cn
- Marc St-HilaireProfessor, Carleton UniversityVerified email at carleton.ca
- Riham ElhabyanFisheries and Oceans CanadaVerified email at dfo-mpo.gc.ca
- Nicola SantoroDistingushed Research Professor, Carleton UniversityVerified email at scs.carleton.ca
- Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
- Xiaojiang Du, Endowed-Chair Profess...Stevens Institute of TechnologyVerified email at stevens.edu
- Lingfang ZengProfessor, Zhejiang LabVerified email at zhejianglab.org
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
- Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
- Michel BarbeauCarleton UniversityVerified email at scs.carleton.ca
- Menglan HuAssociate professor, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
- Rastislav KrálovičComenius UniversityVerified email at dcs.fmph.uniba.sk
- Richard W. PazziAssociate Professor, University of Ontario Institute of TechnologyVerified email at uoit.ca
- Najmeh TalebBlue Horizon AIVerified email at bluehorizon.ai
- Kenneth B KentUniversity of New BrunswickVerified email at unb.ca