Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechVerified email at cc.gatech.edu
- Suchendra BhandarkarProfessor of Computer Science, The University of GeorgiaVerified email at uga.edu
- zhenyu zhongBaidu SecurityVerified email at baidu.com
- Haixin Duan, 段海新Tsinghua UniversityVerified email at tsinghua.edu.cn
- Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
- David K LowenthalUniversity of ArizonaVerified email at cs.arizona.edu
- Steve WebbWeb GnomesVerified email at cc.gatech.edu
- Lakshmish RamaswamyProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
- Danesh IraniGoogle IncVerified email at google.com
- Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
- Molly H Shor, PhD MBAE8 AngelsVerified email at e8angels.com
- Larry PetersonPrinceton University / ONFVerified email at cs.princeton.edu
- Ashvin GoelUniversity of TorontoVerified email at eecg.toronto.edu
- Bryan VealIntel CorporationVerified email at intel.com
- Baochun LiProfessor of Electrical and Computer Engineering, University of TorontoVerified email at ece.toronto.edu
- Jian JiangResearch Scientist, Shape Security
- Bo LiChair Professor at hong kong university of science and technologyVerified email at cse.ust.hk