Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
William H SandersCarnegie Mellon UniversityVerified email at cmu.edu
Adam BatesAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu
Samuel JeroSystems Security Researcher, MIT Lincoln LaboratoryVerified email at ll.mit.edu
Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
Jiwon KimPurdue UniversityVerified email at purdue.edu
Dave (Jing) TianPurdue UniversityVerified email at purdue.edu
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Indranil GuptaProfessor, Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Dhiraj SahariaPhD Student @ Georgetown UniversityVerified email at georgetown.edu
Ang ChenUniversity of MichiganVerified email at umich.edu
Diogo BarradasUniversity of WaterlooVerified email at uwaterloo.ca
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Ben WeintraubPhD Candidate, Northeastern UniversityVerified email at northeastern.edu