Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhen HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
Lionel LittyMenlo SecurityVerified email at menlosecurity.com
Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
Beom Heyn KimHanyang University ERICAVerified email at hanyang.ac.kr
Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
Marsha ChechikProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
patrick lincolnSRIVerified email at sri.com
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
Úlfar ErlingssonDistinguished Engineer at Google CloudVerified email at google.com
Ilya MironovMetaVerified email at meta.com
Phillipa GillResearch Scientist @ GoogleVerified email at google.com
Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca