Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Alun PreeceCardiff University - Security Crime and Intelligence Innovation InstituteVerified email at cardiff.ac.uk
- Dave BrainesIBM Research, UKVerified email at uk.ibm.com
- Richard John TomsettAmazonVerified email at amazon.co.uk
- Supriyo ChakrabortyDistinguished Applied Researcher, AI Foundations, Capital OneVerified email at capitalone.com
- Ramya RaghavendraIBM TJ Watson Research CenterVerified email at fb.com
- Moustafa F. AlzantotGoogle ResearchVerified email at google.com
- Mani SrivastavaProfessor of Electrical & Computer Engineering, and Professor of Computer Science, UCLAVerified email at ucla.edu
- Federico CeruttiFull Professor, University of Brescia, ItalyVerified email at unibs.it
- Prudhvi GurramJHU/APLVerified email at ieee.org
- Murat SensoyDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Simon JulierUCLVerified email at cs.ucl.ac.uk
- Lance KaplanArmy Research LaboratoryVerified email at mail.mil
- Jonathan Z BakdashAgency for Healthcare Research and QualityVerified email at ahrq.hhs.gov
Follow
Daniel Harborne
Crime and Security Research Institute, Cardiff University
Verified email at cardiff.ac.uk - Homepage