Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Mayank VariaBoston University, Computing and Data SciencesVerified email at bu.edu
- Nicolas AlhaddadBoston UniversityVerified email at bu.edu
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
- Matt FranklinProfessor of Computer Science, U. C. DavisVerified email at cs.ucdavis.edu
- Sean PeisertCybersecurity & Privacy R&D Lead, Lawrence Berkeley National Laboratory; Adjunct Professor, UC DavisVerified email at lbl.gov
- Chao LiuUMBCVerified email at umbc.edu
- Hein MelingProfessor of Computer Science, University of Stavanger, NorwayVerified email at uis.no
- James ClavinUMBCVerified email at umbc.edu
- Xin WangPostdoc, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Yelena YeshaUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
- Sharada SundaramStanford UniversityVerified email at cs.stanford.edu
- Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
- Alan T. ShermanProfessor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore CountyVerified email at umbc.edu
- Farid JavaniUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
- Enis GolaszewskiVerified email at umbc.edu
- Zhuolun XiangAptosVerified email at aptoslabs.com
- Ling RenAssistant Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Lucy C EricksonGoogleVerified email at google.com