Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhen HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
Lionel LittyMenlo SecurityVerified email at menlosecurity.com
Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
Beom Heyn KimHanyang University ERICAVerified email at hanyang.ac.kr
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
Úlfar ErlingssonDistinguished Engineer at Google CloudVerified email at google.com
Ilya MironovMetaVerified email at meta.com
Marsha ChechikProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
patrick lincolnSRIVerified email at sri.com
Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
Phillipa GillResearch Scientist @ GoogleVerified email at google.com
Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca