Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichVerified email at tum.de
Liyi ZhouComputer Science Lecturer (~Assistant Professor) @ The University of SydneyVerified email at sydney.edu.au
Stefanos ChaliasosPhD student, Imperial College LondonVerified email at imperial.ac.uk
Jan LauingerTechnical University of MunichVerified email at tum.de
Kaihua QinYale UniversityVerified email at qin.ac
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Anton WahrstätterResearcher at Vienna University of Economics and BusinessVerified email at wu.ac.at
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Mohammad JahanaraScroll FoundationVerified email at scroll.io