Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kirstie HawkeySenior Instructor, Dalhousie UniversityVerified email at cs.dal.ca
Matei RipeanuElectrical and Computer Engineering, University of British Columbia, V6T 1Z4Verified email at ece.ubc.ca
Ildar MuslukhovThe University of British ColumbiaVerified email at ece.ubc.ca
Yazan BoshmafQatar Computing Research Institute, HBKUVerified email at hbku.edu.qa
San-Tsai SunUniversity of British ColumbiaVerified email at ece.ubc.ca
Kasia MuldnerCarleton UniversityVerified email at carleton.ca
Borke ObadaUniversity of British ColumbiaVerified email at ece.ubc.ca
Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
Primal WijesekeraUniversity of California, Berkeley | ICSIVerified email at cs.berkeley.edu
Yue HuangCSIRO's Data61Verified email at csiro.au
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Victor C. M. LeungShenzhen University / The University of British ColumbiaVerified email at ieee.org
Nalin Asanka Gamagedara Arachchila...Senior Lecturer (Associate Professor) in Cyber Security and Privacy ⚯ The University of AucklandVerified email at auckland.ac.nz
Cormac HerleyMicrosoft ResearchVerified email at microsoft.com
Brian D. FisherProfessor of Interactive Arts and Technology, Simon Fraser UniversityVerified email at sfu.ca
Sidney FelsProfessor of Electrical and Computer Engineering, University of British ColumbiaVerified email at ece.ubc.ca
Hassan HalawaPh.D., The University of British Columbia (UBC)Verified email at aucegypt.edu
Jonathan LesterPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com