Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
- Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
- Liyi ZhouComputer Science Lecturer (~Assistant Professor) @ The University of SydneyVerified email at sydney.edu.au
- Stefanos ChaliasosPhD student, Imperial College LondonVerified email at imperial.ac.uk
- Jan LauingerTechnical University of MunichVerified email at tum.de
- Kaihua QinYale UniversityVerified email at qin.ac
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
- Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
- Anton WahrstätterResearcher at Vienna University of Economics and BusinessVerified email at wu.ac.at
- Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Mohammad JahanaraScroll FoundationVerified email at scroll.io