Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Omer TrippAmazonVerified email at google.com
Takaaki TateishiIBM Research - TokyoVerified email at jp.ibm.com
Larry KovedFormerly at IBM T.J. Watson Research CenterVerified email at alumni.union.edu
Pietro FerraraAssistant Professor, Università Ca' Foscari di Venezia, ItalyVerified email at unive.it
Julian DolbyIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Shaohan HuJPMorgan Chase & Co.Verified email at jpmchase.com
Paolina CentonzeProfessor of Computer Science, Managing Director of Cybersecurity, Iona University, New RochelleVerified email at iona.edu
Shay ArtziAmazonVerified email at amazon.com
Paul CastroSenior Research Manager and Scientist, IBM ResearchVerified email at us.ibm.com
Stephen FinkIBMVerified email at us.ibm.com
Chun-Fu (Richard) ChenJPMorgan Chase & Co.Verified email at jpmchase.com
Jay M. GambettaIBM QuantumVerified email at us.ibm.com
Manu SridharanProfessor, Computer Science and Engineering, University of California, RiversideVerified email at sridharan.net
Roee HayVulnerability researcherVerified email at securityresear.ch
Frank TipProfessor, Northeastern UniversityVerified email at northeastern.edu
Liu PengUberVerified email at uber.com
Antonio MezzacapoIBM Quantum - Watson Research CenterVerified email at us.ibm.com
Dylan HermanJPMorgan Chase & CoVerified email at jpmchase.com
Pierre MinssenJPMorgan Chase & Co.Verified email at jpmchase.com
Arthur G RattewUniversity of OxfordVerified email at materials.ox.ac.uk