Get my own profile
Public access
View all36 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Paul SmartSenior Research Fellow, University of SouthamptonVerified email at ecs.soton.ac.uk
David MottVerified email at soton.ac.uk
Nigel ShadboltProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Supriyo ChakrabortyResearch Staff Member, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Richard John TomsettOnfidoVerified email at onfido.com
Jie BaoMemectVerified email at memect.co
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Trung Dong HuynhKing's College LondonVerified email at kcl.ac.uk
Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Jonathan Z BakdashHuman Research and Engineering Directorate, U.S. Army Research Lab South at UT DallasVerified email at army.mil
Moustafa F. AlzantotGoogleVerified email at google.com
Katia SycaraProfessor School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com