Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Vyas SekarTan Family Chair in Electrical and Computer Engineering, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
- Yifei YuanupennVerified email at cis.upenn.edu
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityVerified email at duke.edu
- Jonathan M. SpringCybersecurity and Infrastructure Security AgencyVerified email at cisa.dhs.gov
- Rahul Anand SharmaCarnegie Mellon UniversityVerified email at cmu.edu
- Yucheng YinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Sujata BanerjeeVMwareVerified email at banerjee.net
- Wenfei WuPeking UniversityVerified email at pku.edu.cn
- Ying ZhangFacebookVerified email at fb.com
- Mihalis YannakakisPercy K. and Vida L. W. Hudson Professor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Jeffrey HeltPrinceton UniversityVerified email at cs.princeton.edu
- Zinan LinMicrosoft Research (Redmond), Carnegie Mellon UniversityVerified email at microsoft.com
- Giulia FantiCarnegie Mellon University, ECE DepartmentVerified email at andrew.cmu.edu
- Sekar KulandaivelRobert BoschVerified email at us.bosch.com
- Ruben MartinsCarnegie Mellon UniversityVerified email at cs.cmu.edu