Get my own profile
Public access
View all29 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Chang-Tsun LiProfessor of Cyber Security at Deakin University, AustraliaVerified email at deakin.edu.au
- Gary StoreyResearch Associate, Loughborough UniversityVerified email at lboro.ac.uk
- M. Emre Celebi, SPIE FellowProfessor and Chair, Department of Computer Science and Engineering, University of Central ArkansasVerified email at uca.edu
- Debanjan KonarSamsung Research and Development Institute Bangalore (SRIB)Verified email at samsung.com
- Ammar BelatrecheAssociate Professor in Computer Science, Faculty of Engineering and EnvironmentVerified email at northumbria.ac.uk
- Zhaonian ZhangPhD student, Lancaster UniversityVerified email at lancaster.ac.uk
- Luca LongoTechnological University Dublin; Trinity College DublinVerified email at tudublin.ie
- Zhu YijieLancaster UniversityVerified email at lancaster.ac.uk
- Abdulrahman Kerim, PhDResearch Fellow in Explainable Machine LearningVerified email at surrey.ac.uk
- John George HardySenior Lecturer (Associate Professor) in Materials Chemistry, Lancaster UniversityVerified email at lancaster.ac.uk
- Ranjith DinakaranData Scientist
Follow
Richard Jiang
Senior Lecturer and Associate Professor, Lancaster University
Verified email at lancaster.ac.uk - Homepage