Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Adithya VadapalliIIT KanpurVerified email at cse.iitk.ac.in
amir herzbergDept. of Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
Femi OlumofinGoogleVerified email at google.com
Syed Mahbub HafizStaff Security Research Engineer (Cryptography) at LG Electronics USA, Inc.Verified email at lge.com
L Jean CampProfessor of Informatics and Computer Science, Luddy School, Indiana UniversityVerified email at indiana.edu
Tadayoshi KohnoProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Shwetak PatelUniversity of Washington, Washington Research Foundation Endowed Professor, Computer ScienceVerified email at cs.washington.edu
Shrirang MareWestern Washington UniversityVerified email at wwu.edu
Joshua StreiffIndiana UniversityVerified email at iu.edu
Wouter LueksCISPA Helmholtz Center for Information Security, GermanyVerified email at cispa.de
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
KJ (Kyoung Jin) ChoiHaskayne School of Business, University of CalgaryVerified email at ucalgary.ca
Alfred LeharHaskayne School of Business, University of CalgaryVerified email at ucalgary.ca
Fattaneh BayatbabolghaniSoftware Engineer, Security at GoogleVerified email at google.com
Tiantian GongPurdue UniversityVerified email at purdue.edu
Alexandros PsomasAssistant Professor, Purdue UniversityVerified email at cs.purdue.edu
Bailey KacsmarUniversity of AlbertaVerified email at ualberta.ca
Sarah PloskerDepartment of Mathematics & Computer Science, Brandon UniversityVerified email at brandonu.ca
Natnatee DokmaiPostdoctoral Associate, Yale School of MedicineVerified email at yale.edu