Get my own profile
Public access
View all24 articles
12 articles
available
not available
Based on funding mandates
Co-authors
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Paul SmartSenior Research Fellow, University of SouthamptonVerified email at ecs.soton.ac.uk
- Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
- Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
- David MottUniversity of SouthamptonVerified email at soton.ac.uk
- Nigel ShadboltProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
- Richard John TomsettAmazonVerified email at amazon.co.uk
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
- Jie BaoMemectVerified email at memect.co
- Tien PhamMITRE LabsVerified email at mitre.org
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
- Moustafa F. AlzantotGoogle ResearchVerified email at google.com
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
- Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
- Dong HuynhKing's College LondonVerified email at kcl.ac.uk
- Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
- Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov