Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
- Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
- Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
- Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
- David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Sonia JahidDepartment of Computer Science, UIUCVerified email at illinois.edu
- Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
- Eric BrewerGoogle and UC BerkeleyVerified email at cs.berkeley.edu
- George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
- Xun GongUniversity of IllinoisVerified email at illinois.edu
- Kazuhiro MinamiProfessor, Institute of Statistical MathematicsVerified email at ism.ac.jp
- Qi WangUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
- Qiyan "Chiyan" WangPrincipal Research Engineer at SymantecVerified email at symantec.com
- Chi-Yao HongGoogleVerified email at google.com
- Shirin NilizadehUniversity of Texas at ArlingtonVerified email at uta.edu
- Matt WelshVerified email at mdw.la
- David CULLERUniversity of California, BerkeleyVerified email at berkeley.edu
- Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Follow
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at illinois.edu - Homepage