Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Qiang DuanProfessor of Information Sciences & Technology, the Penn State UniversityVerified email at psu.edu
Daniel LemireProfessor of Computer Science, Data Science Laboratory, Université du Québec (TELUQ)Verified email at uqam.ca
Hamadou Saliah-HassaneProfesseur génie électrique et informatique TELUQVerified email at teluq.ca
Pascal PoizatProfessor at Université Paris NanterreVerified email at lip6.fr
Serguei A. MokhovConcordia University, Montreal, CanadaVerified email at cse.concordia.ca
Ali GhorbaniProfessor and Canada Research Chair in Cybersecurity, University of New Brunswick, CanadaVerified email at unb.ca
Joey PaquetProfessor of Computer Science and Software EngineeringVerified email at cse.concordia.ca
Touraj LalehUniversity of Montreal / Mila -Quebec AI InstituteVerified email at mila.quebec
Yannick PencoléLAASVerified email at laas.fr
marie-odile cordierprofessor of computer science, university of Rennes1Verified email at irisa.fr
Harry ZhangProfessor of Computer Science, University of New BrunswickVerified email at unb.ca
martin brooksShapeVision IncVerified email at shapevision.biz
Lina YEUniversité Paris-Saclay, CentraleSupélec, LRIVerified email at centralesupelec.fr
Alban GrastienResearch Fellow at HMI, ANUVerified email at anu.edu.au
Yang YubinNanjing UniversityVerified email at nju.edu.cn
Jun HuangBaylor UniversityVerified email at ieee.org
Athanasios VasilakosPROF OF COMPLEX SYSTEMS, CYBERSECURITY, AI
Follow