Get my own profile
Public access
View all10 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Mario KöppenKyushu Institute of TechnologyVerified email at ieee.org
Hai Thanh NguyenResearch scientist at Telenor ResearchVerified email at ntnu.no
Andrii ShalaginovKristiania University CollegeVerified email at kristiania.no
L.R.B. SchomakerUniversity of GroningenVerified email at rug.nl
Slobodan V. PetrovicGjøvikVerified email at hig.no
Umapada Pal, FIAPR, FAAIAProfessor, Computer Vision and Pattern Recogniiton Unit, Indian Statistical Institute, KolkataVerified email at isical.ac.in
Sukalpa ChandaØstfold University CollegeVerified email at ieee.org
Ali DehghantanhaAssociate Professor & Canada Research Chair in Cyber Security & Threat Intelligence at theVerified email at uoguelph.ca
Gonzalo AlvarezCSICVerified email at iec.csic.es
Carmen Torrano GiménezProfesora de Ciberseguridad y Blockchain, UNIRVerified email at unir.net
Sargur (Hari) SrihariSUNY Dist. Prof., Dept. of Comp. Sci. & Engg, Dept. of Biostatistics, University at Buffalo, SUNYVerified email at buffalo.edu
Isabelle GuyonUniversité Paris-Saclay / INRIA / ChaLearnVerified email at chalearn.org
André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Steve WatsonVerified email at stevewatson.net
Ajith AbrahamMachine Intelligence Research Labs (MIR Labs)Verified email at ieee.org
Zeno Geradtsforensic scientistVerified email at uva.nl
Dr. Srikanta PalInformation and Communication Technology, Griffith University, AustraliaVerified email at griffithuni.edu.au
Sergii BaninNorwegian University of Science and TechnologyVerified email at ntnu.no
isuf deliuVerified email at stud.ntnu.no