Michael Bailey
An Associate Professor at the University of Illinois. His research contributes to the sciences of computer security, network architecture and design, network protocols, and distributed systems.
An Associate Professor at the University of Illinois. His research contributes to the sciences of computer security, network architecture and design, network protocols, and distributed systems.
Josh Mason
A Research Scientist whose research interests tend to center around systems and network security, with occasional trysts into natural language processing and machine learning. He holds a Ph.D. in computer science from Johns Hopkins University.
A Research Scientist whose research interests tend to center around systems and network security, with occasional trysts into natural language processing and machine learning. He holds a Ph.D. in computer science from Johns Hopkins University.
Zane Ma
Zane is a fourth year Ph.D. candidate interested in Internet-scale measurement for informing and assessing security practices. He is particularly interested in studying trust-based networks and systems.
Zane is a fourth year Ph.D. candidate interested in Internet-scale measurement for informing and assessing security practices. He is particularly interested in studying trust-based networks and systems.
Deepak Kumar
Deepak is a third year Ph.D. student with an interest in the intersection between distributed systems, networks and computer security. He also has a knack for tricking faculty into thinking he’s more senior than he is.
Deepak is a third year Ph.D. student with an interest in the intersection between distributed systems, networks and computer security. He also has a knack for tricking faculty into thinking he’s more senior than he is.
Joshua Reynolds
Joshua is a second year PhD student focusing on usable security and privacy. He doesn't beleive a security problem is solved until systems help everyday users to make safe choices while causing minimal interruptions to productivity.
Joshua is a second year PhD student focusing on usable security and privacy. He doesn't beleive a security problem is solved until systems help everyday users to make safe choices while causing minimal interruptions to productivity.
Paul Murley
A second year PhD student.
A second year PhD student.
Seoung-kyun (Simon) Kim
A PhD student studying computer science. Simon is mainly interested in network security, forensics, and IT infrastructure management.
A PhD student studying computer science. Simon is mainly interested in network security, forensics, and IT infrastructure management.
Yi Zhou
Master's student.
Master's student.
Kaishen Wang
Master's student.
Master's student.