Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
Alvaro A. CardenasProfessor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
Dave Grochocki JrUniversity of Illinois Urbana-Champaign, UIUCVerified email at illinois.edu
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Jingwei HuangUniversity of Texas Southwestern Medical CenterVerified email at utsouthwestern.edu
Mirko MontanariPhD, Software Engineer at GoogleVerified email at illinois.edu
Roy H CampbellProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
John LyleDepartment of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerVerified email at slb.com
Ulrich HerbergSr. Director of Engineering at eBayVerified email at herberg.name
Yoonjoo ChoiAssociate Professor, Medical Research Center, Chonnam National University Medical SchoolVerified email at jnu.ac.kr
Incheol ShinProfessor of Life Science, Hanyang UniversityVerified email at hanyang.ac.kr