Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Hsu-Chun HsiaoNational Taiwan UniversityVerified email at csie.ntu.edu.twJason HongCarnegie Mellon UniversityVerified email at cs.cmu.edu
Paweł SzałachowskiVerified email at google.com
Bruno SinopoliElectrical and Systems Engineering, Washington University inVerified email at wustl.edu
Heejo LeeProfessor of Computer Science, Korea UniversityVerified email at korea.ac.kr
Yilin MoAssociate Professor, Department of Automation, Tsinghua UniversityVerified email at tsinghua.edu.cn
Xin ZhangCarnegie Mellon UniversityVerified email at cmu.edu
Akira YamadaUniversity of HyogoVerified email at acm.orgLin-Shung HuangSecurity Engineer, FacebookVerified email at fb.com
Laura DabbishProfessor, Carnegie Mellon UniversityVerified email at cmu.edu
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
David BasinProfessor of Computer Science, ETH Zurich; Affiliated Faculty, INSAIT, Sofia UniversityVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yueh-Hsun LinApple Inc.Verified email at andrew.cmu.edu
Cristina BasescuEPFLVerified email at epfl.ch
Sauvik DasAssociate Professor, Carnegie Mellon UniversityVerified email at cmu.edu
Lujo BauerCarnegie Mellon UniversityVerified email at cmu.edu
Jonathan McCuneGoogle IncVerified email at google.com
Stephanos MatsumotoCarnegie Mellon University, ETH ZurichVerified email at cmu.edu