Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Robin KravetsUniversity of IllinoisVerified email at illinois.edu
- Soteris DemetriouAssistant Professor, Imperial College LondonVerified email at imperial.ac.uk
- Giacomo BenincasaAmazonVerified email at amazon.com
- Ahmed HelmyAssoc. Dean for Research, College of Computing, UNC CharlotteVerified email at charlotte.edu
- Vansh KhannaUniversity of Illinois at Urbana ChampaignVerified email at illinois.edu
- Roy WantResearch Scientist, GoogleVerified email at google.com
- Karan GanjuUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
- Jingyu QianUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- hari sundaramUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Abbas AcarFlorida International UniversityVerified email at fiu.edu
- Ahmet ArışSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
- Harun OzGraduate Research Assistant, Florida International UniversityVerified email at fiu.edu
- Selcuk UluagacFlorida International UniversityVerified email at fiu.edu
- Masooda BashirAssociate Professor of Information Science, University of Illinois at Urbana ChampaignVerified email at illinois.edu
- Hsiao-Ying HuangPhD in Informatics, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
- Faraz NaseemGraduate Research Assistant, Florida International UniversityVerified email at fiu.edu
- Bram BonnéSoftware Engineer, GoogleVerified email at google.com
- René MayrhoferJohannes Kepler University LinzVerified email at jku.at