Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Jessica StaddonGoogleVerified email at google.com
Elaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Markus JakobssonFounder/CTO, ZapFraud; Chief Scientist, Stealth companyVerified email at zapfraud-inc.com
Jesus MolinaIndependent Consultant, Jesus Molina ConsultingVerified email at jesusmolina.com
Yuan NiuGoogleVerified email at google.com
T-H. Hubert ChanDepartment of Computer Science, The University of Hong KongVerified email at cs.hku.hk
Gokay SaldamliSan Jose State UniversityVerified email at sjsu.edu
Bart KnijnenburgAssociate Professor in Human Centered Computing, Clemson UniversityVerified email at clemson.edu
Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
Nicolas DucheneautQuantic FoundryVerified email at quanticfoundry.com
Jianqiang ShenPalo Alto Research Center (PARC)Verified email at parc.com
Tracy Holloway KingAdobe Inc., Sensei and SearchVerified email at alum.mit.edu
Eric BierPrincipal Scientist, Palo Alto Research Center, Inc.Verified email at parc.com
Manas PathakCarnegie Mellon UniversityVerified email at cs.cmu.edu
Cong WangDepartment of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Hosub LeeSamsung Research AmericaVerified email at samsung.com
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Ersin UzunRIT ESL Global Cybersecurity InstituteVerified email at rit.edu
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca