Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Kirstie HawkeyretiredVerified email at cs.dal.ca
Matei RipeanuElectrical and Computer Engineering, University of British Columbia, V6T 1Z4Verified email at ece.ubc.ca
Ildar MuslukhovThe University of British ColumbiaVerified email at ece.ubc.ca
Yazan BoshmafQatar Computing Research Institute, HBKUVerified email at hbku.edu.qa
San-Tsai SunUniversity of British ColumbiaVerified email at ece.ubc.ca
Kasia MuldnerCarleton UniversityVerified email at carleton.ca
Borke ObadaUniversity of British ColumbiaVerified email at ece.ubc.ca
Yue HuangCSIRO's Data61Verified email at csiro.au
Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
Primal WijesekeraUniversity of California, Berkeley | ICSIVerified email at cs.berkeley.edu
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Victor C. M. LeungSMBU / Shenzhen University / The University of British ColumbiaVerified email at ieee.org
Hassan HalawaPh.D., The University of British Columbia (UBC)Verified email at aucegypt.edu
Nalin Asanka Gamagedara Arachchila...Associate Professor in Cyber Security, School of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Cormac HerleyMicrosoft ResearchVerified email at microsoft.com
Brian D. FisherProfessor of Interactive Arts and Technology, Simon Fraser UniversityVerified email at sfu.ca
Sidney FelsProfessor of Electrical and Computer Engineering, University of British ColumbiaVerified email at ece.ubc.ca
Jonathan LesterPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com