Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Malcolm HeywoodProfessor, Computer Science, Dalhousie UniversityVerified email at cs.dal.ca
- Atif KhanComputer Science, University of WaterlooVerified email at uwaterloo.ca
- Kate LarsonUniversity of WaterlooVerified email at uwaterloo.ca
- Hadi HosseiniPenn State UniversityVerified email at psu.edu
- Daniel LizotteAssociate Professor of Computer Science; Associate Professor of Epidemiology and BiostatisticsVerified email at uwo.ca
- Alan TsangCarleton UniversityVerified email at carleton.ca
- Catherine HollowayGraduate Student, Institute for Quantum ComputingVerified email at iqc.ca
- Christopher ErvenCEO, KETS Quantum Security Ltd;Verified email at kets-quantum.com
- Cecylia BocovichThe Tor ProjectVerified email at uwaterloo.ca
- Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
- Hooman Mohajeri MoghaddamPrinceton University, International Computer Science Institute (ICSI),Verified email at princeton.edu
- John ChampaignMassachusetts Institute of TechnologyVerified email at mit.edu
- Darren AbramsonSenior NLP Scientist, AlexiVerified email at alexi.com
- Sawyer WeldenVerified email at wakehealth.edu