Get my own profile
Public access
View all18 articles
22 articles
available
not available
Based on funding mandates
Co-authors
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Wamberto VasconcelosProfessor in Computing Science, University of Aberdeen, UKVerified email at abdn.ac.uk
Gavin PearsonDstlVerified email at dstl.gov.uk
Diego PizzocaroHonorary Research Fellow, Cardiff University, UKVerified email at cs.cardiff.ac.uk
Thomas La PortaPenn State UniversityVerified email at cse.psu.edu
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Mario Gómez MartínezAssociate Professor (UPV)Verified email at dsic.upv.es
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Matthew P. JohnsonDepartment of CS, Lehman College, CUNYVerified email at ucla.edu
Hosam RowaihyAssistant Professor of Computer Engineering, King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
Christopher GibsonIBM Research, IBM UKVerified email at uk.ibm.com
Alice TonioloUniversity of St AndrewsVerified email at st-andrews.ac.uk
Yuqing TangFacebook AIVerified email at fb.com
Christos ParizasPhD candidate, Computer Science, Cardiff UniversityVerified email at cardiff.ac.uk
Ron RudnickiSr. Research Scientist, CUBRC, Inc., BuffaloVerified email at cubrc.org
Chatschik BisdikianIBM ResearchVerified email at us.ibm.com
Dominic HarriesIBMVerified email at uk.ibm.com