Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Zhen HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
- Lionel LittyMenlo SecurityVerified email at menlosecurity.com
- Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
- Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
- Beom Heyn KimHanyang University ERICAVerified email at hanyang.ac.kr
- John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
- Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
- Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
- Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
- Marsha ChechikProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
- Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
- patrick lincolnSRIVerified email at sri.com
- Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
- Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
- Úlfar ErlingssonDistinguished Engineer at Google CloudVerified email at google.com
- Ilya MironovMetaVerified email at meta.com
- Phillipa GillResearch Scientist @ GoogleVerified email at google.com
- Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
- Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca