Crea il mio profilo
Accesso pubblico
Visualizza tutto23 articoli
12 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteEmail verificata su cardiff.ac.uk
- Paul SmartSenior Research Fellow, University of SouthamptonEmail verificata su ecs.soton.ac.uk
- Daniel HarborneCrime and Security Research Institute, Cardiff UniversityEmail verificata su cardiff.ac.uk
- David MottEmail verificata su soton.ac.uk
- Federico CeruttiUniversity of BresciaEmail verificata su unibs.it
- Nigel ShadboltProfessor of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneEmail verificata su capitalone.com
- Richard John TomsettAmazonEmail verificata su amazon.co.uk
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAEmail verificata su ucla.edu
- Jie BaoMemectEmail verificata su memect.co
- Tien PhamMITRE LabsEmail verificata su mitre.org
- Geeth de MelResearch Staff MemberEmail verificata su uk.ibm.com
- Murat SensoyDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Lance KaplanArmy Research LaboratoryEmail verificata su mail.mil
- Diego PizzocaroHonorary Research Fellow, Cardiff University, UKEmail verificata su cs.cardiff.ac.uk
- Will WebberleySchool of Computer Science and Informatics, Cardiff UniversityEmail verificata su cs.cardiff.ac.uk
- Moustafa F. AlzantotGoogle ResearchEmail verificata su google.com
- Dong HuynhKing's College LondonEmail verificata su kcl.ac.uk
- Jonathan Z BakdashAgency for Healthcare Research and QualityEmail verificata su ahrq.hhs.gov
- Ramya RaghavendraIBM TJ Watson Research CenterEmail verificata su fb.com