Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Blase UrAssociate Professor, University of ChicagoVerified email at uchicago.edu
- Roshni PadhiStanford UniversityVerified email at stanford.edu
- Lefan ZhangPhD, The University of ChicagoVerified email at uchicago.edu
- Earlence FernandesAssistant Professor, UC San DiegoVerified email at ucsd.edu
- Jesse J. MartinezPhD Student, Paul G. Allen School of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
- Michael LittmanBrown UniversityVerified email at brown.edu
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Shan LuProfessor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Valerie ZhaoVerified email at wellesley.edu
- Abhimanyu DeoraVerified email at deora.dev
- Will BrackenburyUniversity of ChicagoVerified email at uchicago.edu
- David KotzDartmouth CollegeVerified email at dartmouth.edu
- Timothy J. PiersonDartmouth CollegeVerified email at cs.dartmouth.edu
- Nathan ReitingerPh.D. Candidate, University of MarylandVerified email at umd.edu
- Josiah HesterAssociate Professor, Interactive Computing and Computer Science, Georgia TechVerified email at gatech.edu
- Mounib KhanaferAssociate Professor of Electrical and Computer Engineering, American University of KuwaitVerified email at auk.edu.kw
- Chixiang WangDartmouth CollegeVerified email at dartmouth.edu
- Denise AnthonyProfessor, Health Mgmt & Policy | Sociology, University of MichiganVerified email at umich.edu
- Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu