Get my own profile
Public access
View all46 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Emily TsengPhD Student, Information Science, Cornell UniversityVerified email at cornell.edu
Madeline R. Sterling, MD, MPH, MSWeill Cornell Medical CollegeVerified email at med.cornell.edu
Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Fabian OkekeUX Researcher @ MetaVerified email at cornell.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Aditya VashisthaAssistant Professor @ Cornell UniversityVerified email at cornell.edu
Neha KumarAssociate Professor @Georgia TechVerified email at gatech.edu
Anthony PoonUniversity of WashingtonVerified email at uw.edu
Karen LevyCornell UniversityVerified email at cornell.edu
Ariel AvgarCornell UniversityVerified email at cornell.edu
Rosanna BelliniCornell Tech, Cornell UniversityVerified email at cornell.edu
Sam HavronGraduate Security Researcher, Cornell TechVerified email at cs.cornell.edu
Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
MD Romael HaqueGraduate Research Assistant, Marquette UniversityVerified email at marquette.edu
Shion GuhaAssistant Professor, University of TorontoVerified email at utoronto.ca
Francois GuimbretiereProfessor, Cornell UniversityVerified email at cs.cornell.edu
Michael SobolevBehavioral Scientist @ Cornell TechVerified email at cornell.edu
Brian DeRenziDimagi, University of Cape Town, University of WashingtonVerified email at cs.uct.ac.za