Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
Geumhwan ChoSungkyunkwan UniversityVerified email at skku.edu
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Robin BerthierUniversity of IllinoisVerified email at illinois.edu
William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
David Grochocki JrUniversity of Illinois Urbana-Champaign, UIUCVerified email at illinois.edu
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Jingwei HuangUniversity of Texas Southwestern Medical CenterVerified email at utsouthwestern.edu
Mirko MontanariPhD, Software Engineer at GoogleVerified email at illinois.edu
Roy H CampbellProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Nina H. FeffermanProfessor of Ecology and Evolutionary Biology & MathematicsVerified email at utk.edu
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
John LyleDepartment of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Apurva MohanSr. Engineering Manager - Digital Security, SchlumbergerVerified email at slb.com
Ulrich HerbergDistinguished Engineer at eBayVerified email at herberg.name
Yoonjoo ChoiAssociate Professor, Medical Research Center, Chonnam National University Medical SchoolVerified email at jnu.ac.kr
Incheol ShinProfessor of Life Science, Hanyang UniversityVerified email at hanyang.ac.kr