Get my own profile
Public access
View all29 articles
1 article
available
not available
Based on funding mandates
Co-authors
Wenchao ZhouGeorgetown UniversityVerified email at cs.georgetown.edu
Boon Thau LooRCA Professor of Computer and Information Science, Senior Associate Dean, UPennVerified email at seas.upenn.edu
Tavish VaidyaGoogleVerified email at google.com
Andreas HaeberlenUniversity of PennsylvaniaVerified email at cis.upenn.edu
Clay ShieldsGeorgetown UniversityVerified email at georgetown.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Adam J AvivThe George Washington UniversityVerified email at email.gwu.edu
Yuankai ZhangResearch Scientist, FacebookVerified email at fb.com
Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Ang ChenUniversity of MichiganVerified email at umich.edu
William MarczakUC BerkeleyVerified email at cs.berkeley.edu
Zachary G. IvesChair & Professor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Linh Thi Xuan PhanAssociate Professor, University of PennsylvaniaVerified email at cis.upenn.edu
Kevin ButlerUniversity of FloridaVerified email at ufl.edu
Pratyush MishraUniversity of PennsylvaniaVerified email at seas.upenn.edu
Nicholas CarliniGoogle DeepMindVerified email at google.com
Adam BatesAssociate Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu