Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
- Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- Shriram RajagopalanGoogleVerified email at google.com
- Hani JamjoomPrincipal Research Scientist and Manager, IBM Watson Research, New YorkVerified email at us.ibm.com
- Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoVerified email at cs.luc.edu
- Alina OpreaNortheastern UniversityVerified email at neu.edu
- Ting-Fang YenLaceworkVerified email at lacework.net
- Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
- Sanjay ChandrasekaranPhD Candidate, University of California Santa BarbaraVerified email at ucsb.edu
- Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
- Eugene VassermanKansas State UniversityVerified email at ksu.edu
- Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
- Ratul MahajanUniversity of WashingtonVerified email at ratul.org
- Daniel HalperinAWSVerified email at halper.in
- Seyed K. FayazCMUVerified email at seyedfayaz.com