Get my own profile
Public access
View all18 articles
22 articles
available
not available
Based on funding mandates
Co-authors
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
- Gavin PearsonDstlVerified email at dstl.gov.uk
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
- Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Mario Gómez MartínezAssociate Professor (UPV)Verified email at dsic.upv.es
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
- Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
- Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
- Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
- Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
- Yuqing TangFacebook AIVerified email at fb.com
- Christos ParizasPhD candidate, Computer Science, Cardiff UniversityVerified email at cardiff.ac.uk
- Ron RudnickiSr. Research Scientist, CUBRC, Inc., BuffaloVerified email at cubrc.org
- Chatschik BisdikianIBM ResearchVerified email at us.ibm.com
- Dominic HarriesIBMVerified email at uk.ibm.com