Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Sonia JahidDepartment of Computer Science, UIUCVerified email at illinois.edu
Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
Eric BrewerGoogle and UC BerkeleyVerified email at cs.berkeley.edu
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Xun GongUniversity of IllinoisVerified email at illinois.edu
Kazuhiro MinamiProfessor, Institute of Statistical MathematicsVerified email at ism.ac.jp
Qi WangUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
Qiyan "Chiyan" WangPrincipal Research Engineer at SymantecVerified email at symantec.com
Chi-Yao HongGoogleVerified email at google.com
Shirin NilizadehUniversity of Texas at ArlingtonVerified email at uta.edu
Matt WelshVerified email at mdw.la
David CULLERUniversity of California, BerkeleyVerified email at berkeley.edu
Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Follow
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at illinois.edu - Homepage