Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ling LiuGeorgia Institute of TechnologyVerified email at cc.gatech.edu
- M. Emre GursoyAssistant Professor of Computer Science, Koç UniversityVerified email at ku.edu.tr
- Wenqi WeiFordham University, ex-IBMerVerified email at fordham.edu
- Ka-Ho ChowThe University of Hong KongVerified email at cs.hku.hk
- Lei YuRensselaer Polytechnic InstituteVerified email at rpi.edu
- Yanzhao WuFlorida International UniversityVerified email at cs.fiu.edu
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
- Margaret LoperGeorgia Tech Research InstituteVerified email at gtri.gatech.edu
- Martine De CockProfessor, University of Washington TacomaVerified email at uw.edu
- Thomas SteinkeGoogle DeepMindVerified email at google.com
- Rui ZhangFormerly IBM Research - AlmadenVerified email at us.ibm.com
- Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Verified email at pitt.edu
- Yi ZhouResearch Staff Member, IBM ResearchVerified email at ibm.com
- Ankur TeredesaiUniversity of WashingtonVerified email at uw.edu
- Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
- Shanu SushmitaNortheastern UniversityVerified email at uw.edu
- Vale TolpeginUndergraduate Research Assistant at Georgia Institute of TechnologyVerified email at gatech.edu
- Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechVerified email at cc.gatech.edu
- Rafael DowsleyMonash UniversityVerified email at monash.edu