Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Adam BatesAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Wajih Ul HassanAssistant Professor, University of VirginiaVerified email at virginia.edu
- Muhammad Adil InamUniversity of Illinois Urbana ChampaignVerified email at illinois.edu
- Natã M. BarbosaNetflixVerified email at netflix.com
- Yinfang ChenUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
- Linhai SongAssociate Professor, Pennsylvania State UniversityVerified email at ist.psu.edu
- Shuofei ZhuPenn State UniversityVerified email at psu.edu
- Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
- Licheng LuoUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Olivia FigueiraPhD student at University of California, IrvineVerified email at uci.edu
- Yang WangProfessor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
- Juliane SchmüserCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Harjot KaurPh.D. Student, CISPA Helmholtz Center for Information Security, GermanyVerified email at cispa.de
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
- Limin YangMicrosoftVerified email at microsoft.com
- Arridhana CiptadiTechnical Lead Manager at CruiseVerified email at getcruise.com