Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Aviv ZoharThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
Yotam GafniGame Theory Phd Candidate, Technion - Israel institute of TechnologyVerified email at campus.technion.ac.il
Kaihua QinYale UniversityVerified email at qin.ac
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Liyi ZhouComputer Science Lecturer (~Assistant Professor) @ The University of SydneyVerified email at sydney.edu.au
Davor SvetinovicKhalifa UniversityVerified email at ku.ac.ae
Maya DotanThe Hebrew UniversityVerified email at mail.huji.ac.il
Saar TochnerCarnegie Mellon UniversityVerified email at mail.huji.ac.il
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Anton WahrstätterResearcher at Vienna University of Economics and BusinessVerified email at wu.ac.at
Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
Taro TsuchiyaCarnegie Mellon UniversityVerified email at cs.cmu.edu
Mikołaj BarczentewiczUniversity of SurreyVerified email at surrey.ac.uk
Gilad SternPhD CandidateVerified email at mail.huji.ac.il
Johnnatan MessiasMatter LabsVerified email at matterlabs.dev
Fan ZhangAssistant Professor, Yale UniversityVerified email at yale.edu
Svetlana AbramovaAustrian Institute of TechnologyVerified email at ait.ac.at
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at