Get my own profile
Public access
View all28 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Wenchao ZhouGeorgetown UniversityVerified email at cs.georgetown.edu
- Boon Thau LooRCA Professor of Computer and Information Science, Senior Associate Dean, UPennVerified email at seas.upenn.edu
- Tavish VaidyaGoogleVerified email at google.com
- Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
- Clay ShieldsGeorgetown UniversityVerified email at georgetown.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Yuankai ZhangResearch Scientist, FacebookVerified email at fb.com
- Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
- Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Ang ChenUniversity of MichiganVerified email at umich.edu
- William MarczakUC BerkeleyVerified email at cs.berkeley.edu
- Zachary G. IvesChair & Professor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Linh Thi Xuan PhanAssociate Professor, University of PennsylvaniaVerified email at cis.upenn.edu
- Kevin ButlerUniversity of FloridaVerified email at ufl.edu
- Pratyush MishraUniversity of PennsylvaniaVerified email at seas.upenn.edu
- Nicholas CarliniGoogle DeepMindVerified email at google.com
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu