Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kirstie HawkeyretiredVerified email at cs.dal.ca
- Matei RipeanuElectrical and Computer Engineering, University of British Columbia, V6T 1Z4Verified email at ece.ubc.ca
- Ildar MuslukhovThe University of British ColumbiaVerified email at ece.ubc.ca
- Yazan BoshmafQatar Computing Research Institute, HBKUVerified email at hbku.edu.qa
- San-Tsai SunUniversity of British ColumbiaVerified email at ece.ubc.ca
- Kasia MuldnerCarleton UniversityVerified email at carleton.ca
- Borke ObadaUniversity of British ColumbiaVerified email at ece.ubc.ca
- Yue HuangCSIRO's Data61Verified email at csiro.au
- Serge EgelmanUniversity of California, Berkeley / International Computer Science Institute (ICSI) / AppCensusVerified email at cs.berkeley.edu
- Primal WijesekeraUniversity of California, Berkeley | ICSIVerified email at cs.berkeley.edu
- Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
- Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
- David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Victor C. M. LeungShenzhen University / The University of British ColumbiaVerified email at ieee.org
- Hassan HalawaPh.D., The University of British Columbia (UBC)Verified email at aucegypt.edu
- Nalin Asanka Gamagedara Arachchila...Associate Professor in Cyber Security, School of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
- Cormac HerleyMicrosoft ResearchVerified email at microsoft.com
- Brian D. FisherProfessor of Interactive Arts and Technology, Simon Fraser UniversityVerified email at sfu.ca
- Sidney FelsProfessor of Electrical and Computer Engineering, University of British ColumbiaVerified email at ece.ubc.ca
- Jonathan LesterPrincipal Researcher, Microsoft ResearchVerified email at microsoft.com