Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Amir HoumansadrUniversity of Massachusetts AmherstVerified email at cs.umass.edu
Prateek MittalProfessor, Princeton UniversityVerified email at princeton.edu
Matthew CaesarProfessor of Computer Science, University of IllinoisVerified email at illinois.edu
Anupam DasNorth Carolina State UniversityVerified email at ncsu.edu
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Negar KiyavashÉcole polytechnique fédérale de Lausanne (EPFL)Verified email at epfl.ch
Sonia JahidDepartment of Computer Science, UIUCVerified email at illinois.edu
Eric BrewerGoogle and UC BerkeleyVerified email at cs.berkeley.edu
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Shishir NagarajaProfessor of Cybersecurity, University of NewcastleVerified email at newcastle.ac.uk
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Xun GongUniversity of IllinoisVerified email at illinois.edu
Kazuhiro MinamiProfessor, Institute of Statistical MathematicsVerified email at ism.ac.jp
Qiyan "Chiyan" WangPrincipal Research Engineer at SymantecVerified email at symantec.com
Qi WangUniversity of Illinois Urbana-ChampaignVerified email at illinois.edu
Matt WelshGoogleVerified email at mdw.la
David CULLERUniversity of California, BerkeleyVerified email at berkeley.edu
Giang NguyenComputer Science Graduate Student, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Chi-Yao HongGoogleVerified email at google.com
Apu KapadiaProfessor of Computer Science, Indiana UniversityVerified email at indiana.edu
Follow
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at illinois.edu - Homepage