Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Eran TromerBoston UniversityVerified email at bu.edu
- Vitaly ShmatikovVerified email at cs.cornell.edu
- Mor GevaTel Aviv University, Google ResearchVerified email at tauex.tau.ac.il
- Nicolas PapernotUniversity of Toronto and Vector InstituteVerified email at utoronto.ca
- Adam DziedzicSprintML group at CISPA, Vector Institute & University of TorontoVerified email at cispa.de
- Franziska BoenischAssistant Professor, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Ilia ShumailovGoogle DeepMindVerified email at google.com
- Tal SchusterGoogle DeepMindVerified email at google.com
- Omer LevyGoogle DeepMindVerified email at google.com
- Jonathan BerantAssociate Professor, Tel-Aviv University, Visiting Faculty Researcher, Google DeepMIndVerified email at cs.tau.ac.il
- Ali Shahin ShamsabadiSenior Privacy Researcher at Brave SoftwareVerified email at brave.com
- Daniel GenkinGeorgia TechVerified email at gatech.edu
- Darsh J ShahMassachusetts Institute of TechnologyVerified email at csail.mit.edu
- Regina BarzilayProfessor of EECS, MITVerified email at csail.mit.edu
- Congzheng SongApple Inc.Verified email at apple.com
- Adi HavivTel Aviv UniversityVerified email at mail.tau.ac.il
- Tushar M. JoisAssistant Professor, City College of New YorkVerified email at ccny.cuny.edu
- Jonathan ProkosSecurity ResearcherVerified email at prokos.us
- Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
- Yinzhi CaoJohns Hopkins UniversityVerified email at jhu.edu