Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Yifei YuanupennVerified email at cis.upenn.edu
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
Rahul Anand SharmaAWS, Carnegie Mellon UniversityVerified email at amazon.com
Yucheng YinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Sujata BanerjeeVMwareVerified email at banerjee.net
Wenfei WuPeking UniversityVerified email at pku.edu.cn
Ying ZhangMetaVerified email at meta.com
Mihalis YannakakisPercy K. and Vida L. W. Hudson Professor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Jeffrey HeltPrinceton UniversityVerified email at cs.princeton.edu
Zinan LinMicrosoft Research (Redmond), Carnegie Mellon UniversityVerified email at microsoft.com
Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
Sekar KulandaivelRobert BoschVerified email at us.bosch.com
Ruben MartinsCarnegie Mellon UniversityVerified email at cs.cmu.edu