Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhen HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
Lionel LittyMenlo SecurityVerified email at menlosecurity.com
Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
Beom Heyn KimUniversity of TorontoVerified email at cs.toronto.edu
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Marsha Chechik Professor of Computer Science, University of TorontoVerified email at cs.toronto.edu
patrick lincolnSRIVerified email at sri.com
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
Phillipa GillResearch Scientist @ GoogleVerified email at google.com
Úlfar ErlingssonArchitect at LaceworkVerified email at lacework.net
Ilya MironovMetaVerified email at meta.com
Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca