Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lin TanMary J. Elmore New Frontiers Professor, Computer Science, Purdue UniversityVerified email at purdue.edu
- Hung Viet PhamAssistant Professor, York UniversityVerified email at yorku.ca
- Nan JiangComputer Science Department, Purdue UniversityVerified email at purdue.edu
- Nenad MedvidovicProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
- Derek RaysideUniversity of WaterlooVerified email at uwaterloo.ca
- Joshua GarciaUniversity of California, IrvineVerified email at uci.edu
- Yaoliang YuUniversity of WaterlooVerified email at uwaterloo.ca
- Weizhen QiUniversity of Science and Technology of ChinaVerified email at mail.ustc.edu.cn
- Nachiappan NagappanFacebookVerified email at fb.com
- Kommy Weldemariam, DirectorAmazonVerified email at cs.queensu.ca
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Jiahao Chen 陳家豪Owner, Responsible AI LLCVerified email at mit.edu
- Cristian CadarImperial College LondonVerified email at imperial.ac.uk
- Tomasz KuchtaComputer Scientist | Mobile Security @ Samsung ElectronicsVerified email at alumni.imperial.ac.uk