Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
- Hsu-Chun HsiaoNational Taiwan UniversityVerified email at csie.ntu.edu.tw
- Jason HongCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Paweł SzałachowskiVerified email at google.com
- Xin ZhangCarnegie Mellon UniversityVerified email at cmu.edu
- Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
- Heejo LeeProfessor of Computer Science, Korea UniversityVerified email at korea.ac.kr
- Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Akira YamadaKDDI Research, Inc.Verified email at acm.org
- Lin-Shung HuangSecurity Engineer, FacebookVerified email at fb.com
- Laura DabbishAssociate Professor, Carnegie Mellon UniversityVerified email at cmu.edu
- Yueh-Hsun LinApple Inc.Verified email at andrew.cmu.edu
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Cristina BasescuEPFLVerified email at epfl.ch
- Sauvik DasAssistant Professor, Carnegie Mellon UniversityVerified email at cmu.edu
- Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
- Jonathan McCuneGoogle IncVerified email at google.com
- Stephanos MatsumotoCarnegie Mellon University, ETH ZurichVerified email at cmu.edu