Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gianluca StringhiniAssociate Professor at Boston UniversityVerified email at bu.edu
- Jeremy BlackburnAssociate Professor, Computer Science, Binghamton UniversityVerified email at binghamton.edu
- Savvas ZannettouAssistant Professor at Delft University of TechnologyVerified email at tudelft.nl
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Emiliano De CristofaroProfessor at University of California, RiversideVerified email at ucr.edu
- Utkucan BalcıBinghamton University and iDRAMA LabVerified email at binghamton.edu
- Fatemeh TahmasbiSUNY at Binghamton and iDRAMA LabVerified email at binghamton.edu
- Ihab AbuHilalPhD Candidate of Computer Science, Binghamton UniversityVerified email at binghamton.edu
- Shirin NilizadehUniversity of Texas at ArlingtonVerified email at uta.edu
- Nihal KumarswamyUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
- Mohit SinghalUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
- Pujan PaudelBoston UniversityVerified email at bu.edu
- Yuxi HongLawrence Berkeley National LaboratoryVerified email at lbl.gov
- Ye ZuochangInstitute of Microelectronics, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Krishna P. GummadiHead, Networked Systems Group, MPI-SWSVerified email at mpi-sws.org
- Yuping WangRenmin University of ChinaVerified email at bu.edu
- Megan SquireDep. Director for Data Analytics & OSINT, Southern Poverty Law Center Intelligence ProjectVerified email at splcenter.org
- Shiza AliBoston UniversityVerified email at bu.edu
- Pamela J. WisniewskiAssociate Professor, Vanderbilt UniversityVerified email at Vanderbilt.edu
- Afsaneh RaziAssistant Professor, Drexel UniversityVerified email at drexel.edu