Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Hsu-Chun HsiaoNational Taiwan UniversityVerified email at csie.ntu.edu.tw
Jason HongCarnegie Mellon UniversityVerified email at cs.cmu.edu
Paweł SzałachowskiVerified email at google.com
Xin ZhangCarnegie Mellon UniversityVerified email at cmu.edu
Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
Heejo LeeProfessor of Computer Science, Korea UniversityVerified email at korea.ac.kr
Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
Akira YamadaKobe UniversityVerified email at acm.org
Lin-Shung HuangSecurity Engineer, FacebookVerified email at fb.com
Laura DabbishProfessor, Carnegie Mellon UniversityVerified email at cmu.edu
Yueh-Hsun LinApple Inc.Verified email at andrew.cmu.edu
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Cristina BasescuEPFLVerified email at epfl.ch
Sauvik DasAssistant Professor, Carnegie Mellon UniversityVerified email at cmu.edu
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Jonathan McCuneGoogle IncVerified email at google.com
Stephanos MatsumotoCarnegie Mellon University, ETH ZurichVerified email at cmu.edu