Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Gang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Wajih Ul HassanAssistant Professor, University of VirginiaVerified email at virginia.edu
- Muhammad Adil InamUniversity of Illinois Urbana ChampaignVerified email at illinois.edu
- Linhai SongAssociate Professor, Pennsylvania State UniversityVerified email at ist.psu.edu
- Shuofei ZhuPenn State UniversityVerified email at psu.edu
- Aiping XiongThe Pennsylvania State UniversityVerified email at psu.edu
- Natã M. BarbosaNetflixVerified email at netflix.com
- Licheng LuoUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Olivia FigueiraPhD Student at University of California, IrvineVerified email at uci.edu
- Yang WangAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Yinfang ChenUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
- Sascha FahlCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yasemin AcarPaderborn University & The George Washington UniversityVerified email at sec.uni-hannover.de
- Juliane SchmüserCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
- Amanda Rose YuilePostdoc, Purdue UniversityVerified email at purdue.edu
- Hadjer BenkraoudaPh.D. Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Daniel VotipkaTufts UniversityVerified email at cs.tufts.edu
- Limin YangTiktok, PhD from University of Illinois at Urbana-ChampaignVerified email at illinois.edu