Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Asadollah ShahbahramiProf. Computer Eng., University of Guilan, University of Groningen, University of Guilan, TUDelftVerified email at guilan.ac.ir
- Amir H. GandomiProfessor, University of Technology Sydney, Obuda UniversityVerified email at msu.edu
- Jun ShenUniversity of WollongongVerified email at uow.edu.au
- Wolfgang BanzhafKoza Chair in Genetic Programming, Michigan State University, USAVerified email at msu.edu
- Amirhessam TahmassebiPhD in Computational Science, Department of Scientific Computing, Florida State UniversityVerified email at FSU.edu
- Mahdi FahmidehSenior Lecturer (Assistant Professor) in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
- Bo DuDepartment of Business Strategy and Innovation, Griffith Business SchoolVerified email at griffith.edu.au
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Georgi GaydadjievProfessor in Computer Architecture, University of GroningenVerified email at rug.nl
- Peng WangProfessor, University of Electronic Science and Technology of China
Follow
Akbar Telikani
School of Computing and Information Technology, University of Wollongong, Australia
Verified email at uow.edu.au