Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Merouane DebbahKU 6G Center, Khalifa University, CentralesupelecVerified email at centralesupelec.fr
- Hamidouche WassimAssociate ProfessorVerified email at insa-rennes.fr
- Riku JanttiAalto UniversityVerified email at aalto.fi
- Tarik TalebRuhr University BochumVerified email at ieee.org
- Zinelaabidine NADIRAalto UniversityVerified email at aalto.fi
- JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
- Hamed HELLAOUINokia Standards & Aalto UniversityVerified email at ieee.org
- Ibrahim KhadraouiResearch engineer , Technology Innovation InstituteVerified email at tii.ae
- Faouzi BaderISEP- Paris, FranceVerified email at isep.fr
- Bilel CHERIFTII Abu DhabiVerified email at tii.ae
- Xinyi TuResearcher @Aalto University | Visiting Collaborator @University of Cambridge | Consultant @PwCVerified email at aalto.fi