Get my own profile
Public access
View all14 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
Daniel HarborneCrime and Security Research Institute, Cardiff UniversityVerified email at cardiff.ac.uk
Dave BrainesIBM Research, UKVerified email at uk.ibm.com
Prudhvi GurramJHU/APLVerified email at ieee.org
Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
Moustafa F. AlzantotGoogle ResearchVerified email at google.com
Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
Simon JulierUCLVerified email at cs.ucl.ac.uk
Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Lance KaplanArmy Research LaboratoryVerified email at mail.mil
Mark O. CunninghamDiscipline of Physiology, Trinity College DublinVerified email at tcd.ie
Marc Alwin GieselmannNewcastle UniversityVerified email at ncl.ac.uk
Marcus KaiserProfessor, School of Medicine, University of Nottingham, UK. X/Bluesky: @ConnectomeLabVerified email at nottingham.ac.uk
Ian TaylorUniversity of Notre DameVerified email at nd.edu
Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Erin ZaroukianUS Army Research LaboratoryVerified email at jhu.edu
Nick O'LearyEmerging Technology Services, IBM UKVerified email at uk.ibm.com
Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov