Get my own profile
Public access
View all16 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ling LiuGeorgia Institute of TechnologyVerified email at cc.gatech.edu
M. Emre GursoyAssistant Professor of Computer Science, Koç UniversityVerified email at ku.edu.tr
Wenqi WeiFordham University, ex-IBMerVerified email at fordham.edu
Ka-Ho ChowThe University of Hong KongVerified email at cs.hku.hk
Lei YuRensselaer Polytechnic InstituteVerified email at rpi.edu
Yanzhao WuFlorida International UniversityVerified email at cs.fiu.edu
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
Margaret LoperGeorgia Tech Research InstituteVerified email at gtri.gatech.edu
Martine De CockProfessor, University of Washington TacomaVerified email at uw.edu
Thomas SteinkeGoogle DeepMindVerified email at google.com
Rui ZhangFormerly IBM Research - AlmadenVerified email at us.ibm.com
Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Verified email at pitt.edu
Yi ZhouResearch Staff Member, IBM ResearchVerified email at ibm.com
Ankur TeredesaiUniversity of WashingtonVerified email at uw.edu
Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
Vale TolpeginUndergraduate Research Assistant at Georgia Institute of TechnologyVerified email at gatech.edu
Shanu SushmitaNortheastern UniversityVerified email at uw.edu
Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechVerified email at cc.gatech.edu
Rafael DowsleyMonash UniversityVerified email at monash.edu