Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sharad MalikProfessor of Electrical and Computer Engineering, Princeton UniversityVerified email at princeton.edu
Aarti GuptaPrinceton UniversityVerified email at cs.princeton.edu
Hongce ZhangHong Kong University of Science and Technology (Guangzhou)Verified email at ust.hk
Yakir VizelTechnionVerified email at cs.technion.ac.il
Pramod SubramanyanIndian Institute of Technology KanpurVerified email at cse.iitk.ac.in
Patrice GodefroidLaceworkVerified email at lacework.net
Hung-Yu WeiProfessor, Dept. of Electrical Engineering, National Taiwan UniversityVerified email at ntu.edu.tw
Chih-Yu WangResearch Center for Information Technology Innovation, Academia SinicaVerified email at citi.sinica.edu.tw
Shih-Tang SuUniversity of MichiganVerified email at umich.edu
Jason M FungSenior Director, Offensive Security Research & Academic Research Engagement, Intel CorporationVerified email at intel.com
Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
Zachary TatlockUniversity of WashingtonVerified email at cs.washington.edu
Gu-Yeon WeiRobert and Suzanne Case Professor of EE and CS, Harvard UniversityVerified email at eecs.harvard.edu
Gus Henry SmithUniversity of WashingtonVerified email at cs.washington.edu
Yue XingPrinceton UniversityVerified email at princeton.edu
Akash GaonkarPrinceton UniversityVerified email at princeton.edu
Yu ZengPrinceton UniversityVerified email at princeton.edu
Yi-Hsiang LaiAmazon Web Services, Inc.Verified email at amazon.com
Jie-Hong Roland JiangProfessor of Electrical Engineering, National Taiwan UniversityVerified email at ntu.edu.tw