Get my own profile
Public access
View all24 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Crime & Security Research InstituteVerified email at cardiff.ac.uk
Paul SmartSenior Research Fellow, University of SouthamptonVerified email at ecs.soton.ac.uk
David MottVerified email at soton.ac.uk
Nigel ShadboltProfessor of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
Federico CeruttiUniversity of BresciaVerified email at unibs.it
Supriyo ChakrabortySenior Research Scientist, IBM ResearchVerified email at us.ibm.com
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Richard John TomsettOnfidoVerified email at onfido.com
Jie BaoMemectVerified email at memect.co
Tien PhamMITRE LabsVerified email at mitre.org
Geeth de MelResearch Staff MemberVerified email at uk.ibm.com
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityVerified email at cs.cardiff.ac.uk
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Moustafa F. AlzantotGoogle ResearchVerified email at google.com
Dong HuynhKing's College LondonVerified email at kcl.ac.uk
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
Katia SycaraProfessor School of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu