Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
- Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
- Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
- Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
- Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
- Robin BerthierUniversity of IllinoisVerified email at illinois.edu
- William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
- David Grochocki JrUniversity of Illinois Urbana-Champaign, UIUCVerified email at illinois.edu
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- Jingwei HuangUniversity of Texas Southwestern Medical CenterVerified email at utsouthwestern.edu
- Mirko MontanariPhD, Software Engineer at GoogleVerified email at illinois.edu
- Roy H CampbellProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
- Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
- John LyleDepartment of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerVerified email at slb.com
- Ulrich HerbergDistinguished Engineer at eBayVerified email at herberg.name
- Yoonjoo ChoiAssociate Professor, Medical Research Center, Chonnam National University Medical SchoolVerified email at jnu.ac.kr
- Incheol ShinProfessor of Life Science, Hanyang UniversityVerified email at hanyang.ac.kr