Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Jose SuchProfessor of Computer Science, King's College London & VRAIN-UPVVerified email at kcl.ac.uk
Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
Antonios GouglidisAssociate Professor, Lancaster UniversityVerified email at lancaster.ac.uk
William KnowlesLancaster UniversityVerified email at williamknowles.io
Nicholas MicallefLecturer in Computer Science, Swansea UniversityVerified email at swansea.ac.uk
Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
Hamed BalogunUniversity of Central LancashireVerified email at uclan.ac.uk
Shlomo BerkovskyMacquarie UniversityVerified email at mq.edu.au
Erwin AdiDeloitte Technology and TransformationVerified email at deloitte.com.au
Kopo M. RamokapaneUniversity of BristolVerified email at bristol.ac.uk
Sören PreibuschMeta ← Google ← Microsoft Research ← University of CambridgeVerified email at fb.com
Matteo MigliavaccaUniversity of KentVerified email at kent.ac.uk
Fernando OteroReader, University of KentVerified email at kent.ac.uk
Marianne JungerChair of Cyber Security and Business ContinuityVerified email at utwente.nl
Lorena MontoyaUniversity of TwenteVerified email at utwente.nl
Jose M. del AlamoAssociate Professor (UPM)Verified email at upm.es
Borja BalleDeepMindVerified email at google.com
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
Anupam DattaSnowflake AI Research, Ex-Professor CMUVerified email at snowflake.com