Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sharad MalikProfessor of Electrical and Computer Engineering, Princeton UniversityVerified email at princeton.edu
- Aarti GuptaPrinceton UniversityVerified email at cs.princeton.edu
- Hongce ZhangHong Kong University of Science and TechnologyVerified email at ust.hk
- Yakir VizelTechnionVerified email at cs.technion.ac.il
- Pramod SubramanyanIndian Institute of Technology KanpurVerified email at cse.iitk.ac.in
- Hung-Yu WeiProfessor, Dept. of Electrical Engineering, National Taiwan UniversityVerified email at ntu.edu.tw
- Chih-Yu WangResearch Center for Information Technology Innovation, Academia SinicaVerified email at citi.sinica.edu.tw
- Shih-Tang SuUniversity of MichiganVerified email at umich.edu
- Patrice GodefroidLaceworkVerified email at lacework.net
- Jason M FungSenior Director, Offensive Security Research & Academic Research Engagement, Intel CorporationVerified email at intel.com
- Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
- Zachary TatlockUniversity of WashingtonVerified email at cs.washington.edu
- Gu-Yeon WeiRobert and Suzanne Case Professor of EE and CS, Harvard UniversityVerified email at eecs.harvard.edu
- Gus Henry SmithUniversity of WashingtonVerified email at cs.washington.edu
- Thierry TambeResearch Scientist, NVIDIAVerified email at nvidia.com
- Yue XingPrinceton UniversityVerified email at princeton.edu
- Akash GaonkarPrinceton UniversityVerified email at princeton.edu
- Yu ZengPrinceton UniversityVerified email at princeton.edu
- Yi-Hsiang LaiAmazon Web Services, Inc.Verified email at amazon.com
- Jie-Hong Roland JiangProfessor of Electrical Engineering, National Taiwan UniversityVerified email at ntu.edu.tw