Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Jialiu LinWaymo LLCVerified email at google.com
Hazim Almuhimedi حازم المحيميديSchool of Computer Science, Carnegie Mellon UniversityVerified email at cmu.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Shomir WilsonAssociate Professor, Pennsylvania State UniversityVerified email at psu.edu
Jason HongCarnegie Mellon UniversityVerified email at cs.cmu.edu
Yuvraj AgarwalAssociate Professor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
Shikun Aerin ZhangCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityVerified email at wesleyan.edu
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Roger IyengarResearch Scientist, FacebookVerified email at fb.com
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
Martin DegelingAI ForensicsVerified email at ruhr-uni-bochum.de
Ramesh GovindanProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
Hongxia JinSamsung Research AmericaVerified email at acm.org
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
Follow
Bin Liu
D. E. Shaw & Co., Tencent America, Google Inc., Carnegie Mellon University
Verified email at deshaw.com - Homepage