Get my own profile
Co-authors
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Jens GrossklagsChair for Cyber Trust, Technical University of MunichVerified email at in.tum.de
Ion StoicaProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Benjamin JohnsonUniversity of California, BerkeleyVerified email at ischool.berkeley.edu
Kevin LaiNational Kaohsiung First University of Science and TechnologyVerified email at nkfust.edu.tw
Nick MerrillCenter for Long-Term Cybersecurity, UC BerkeleyVerified email at berkeley.edu
Ramayya KrishnanCarnegie Mellon UniversityVerified email at cmu.edu
Thomas MaillartUniversity of GenevaVerified email at unige.ch
Kartik HosanagarWharton School, University of PennsylvaniaVerified email at wharton.upenn.edu
Max T. CurranUniversity of California, Berkeley School of InformationVerified email at ischool.berkeley.edu
Christos H PAPADIMITRIOUColumbia UniversityVerified email at columbia.edu
Mikhail AtallahDistinguished Professor of Computer ScienceVerified email at cs.purdue.edu
Scott ShenkerProfessor of Computer Science, UC BerkeleyVerified email at icsi.berkeley.edu
Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu
Moshe BabaioffMicrosoft ResearchVerified email at microsoft.com
Vidyanand ChoudharyUniversity of California, IrvineVerified email at uci.edu
Pern Hui ChiaGoogleVerified email at google.com
Svetlana RadosavacFair Isaac Corporation (FICO)Verified email at fico.com
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Elaine SedenbergHarvard Berkman Klein CenterVerified email at ischool.berkeley.edu
John Chuang
Professor, UC Berkeley School of Information
Verified email at ischool.berkeley.edu - Homepage