Get my own profile
Public access
View all14 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
- Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Prudhvi GurramJHU/APLVerified email at ieee.org
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
- Moustafa F. AlzantotGoogle ResearchVerified email at google.com
- Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
- Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
- Simon JulierUCLVerified email at cs.ucl.ac.uk
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Mark O. CunninghamDiscipline of Physiology, Trinity College DublinVerified email at tcd.ie
- Marc Alwin GieselmannNewcastle UniversityVerified email at ncl.ac.uk
- Marcus KaiserProfessor, School of Medicine, University of Nottingham, UK. X/Bluesky: @ConnectomeLabVerified email at nottingham.ac.uk
- Ian TaylorUniversity of Notre DameVerified email at nd.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Erin ZaroukianUS Army Research LaboratoryVerified email at jhu.edu
- Nick O'LearyEmerging Technology Services, IBM UKVerified email at uk.ibm.com
- Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov