Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhen (James) HuangAssistant Professor, School of Computing, DePaul UniversityVerified email at depaul.edu
Lionel LittyMenlo SecurityVerified email at menlosecurity.com
Mark HorowitzProfessor of Electrical Engineering and Computer ScienceVerified email at ee.stanford.edu
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Wei HuangUniversity of TorontoVerified email at mail.utoronto.ca
Beom Heyn KimUniversity of TorontoVerified email at cs.toronto.edu
Michelle WongUniversity of TorontoVerified email at mail.utoronto.ca
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Marsha Chechik Professor of Computer Science, University of TorontoVerified email at cs.toronto.edu
patrick lincolnSRIVerified email at sri.com
Afshar GanjaliApplication Security Researcher, Security CompassVerified email at utoronto.ca
Petros ManiatisStaff Research Scientist, GoogleVerified email at google.com
Zoran DimitrijevicAirbnb LabsVerified email at ext.airbnb.com
Dejan MilojicicHewlett Packard LabsVerified email at hpe.com
Phillipa GillResearch Scientist @ GoogleVerified email at google.com
Yashar GanjaliProfessor of Computer Science, University of TorontoVerified email at cs.toronto.edu
Úlfar ErlingssonArchitect at LaceworkVerified email at lacework.net
Ilya MironovMeta AIVerified email at fb.com
Sukwon OhUniversity of TorontoVerified email at mail.utoronto.ca
Mohammad MannanAssociate Professor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca