Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Shriram RajagopalanGoogleVerified email at google.com
Hani JamjoomPrincipal Research Scientist and Manager, IBM Watson Research, New YorkVerified email at us.ibm.com
Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoVerified email at cs.luc.edu
Alina OpreaNortheastern UniversityVerified email at neu.edu
Ting-Fang YenLaceworkVerified email at lacework.net
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Sanjay ChandrasekaranPhD Candidate, University of California Santa BarbaraVerified email at ucsb.edu
Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
Todd MillsteinProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Ratul MahajanUniversity of WashingtonVerified email at ratul.org
Daniel HalperinAWSVerified email at halper.in
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Seyed K. FayazCMUVerified email at seyedfayaz.com