Get my own profile
Public access
View all11 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechVerified email at cc.gatech.edu
Suchendra BhandarkarProfessor of Computer Science, The University of Georgia Verified email at cs.uga.edu
David K LowenthalUniversity of ArizonaVerified email at cs.arizona.edu
zhenyu zhongBaidu SecurityVerified email at baidu.com
Haixin Duan, 段海新Tsinghua UniversityVerified email at tsinghua.edu.cn
Roberto PerdisciAssociate Professor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Steve WebbWeb GnomesVerified email at cc.gatech.edu
Lakshmish RamaswamyProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Danesh IraniGoogle IncVerified email at google.com
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Molly H Shor, PhD MBAE8 AngelsVerified email at e8angels.com
Bryan VealIntel CorporationVerified email at intel.com
Larry PetersonPrinceton University / ONFVerified email at cs.princeton.edu
Ashvin GoelUniversity of TorontoVerified email at eecg.toronto.edu
Baochun LiProfessor of Electrical and Computer Engineering, University of TorontoVerified email at ece.toronto.edu
Jian JiangResearch Scientist, Shape Security
Bo LiChair Professor at hong kong university of science and technologyVerified email at cse.ust.hk