Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechVerified email at cc.gatech.edu
Suchendra BhandarkarProfessor of Computer Science, The University of GeorgiaVerified email at uga.edu
zhenyu zhongBaidu SecurityVerified email at baidu.com
Haixin Duan, 段海新Tsinghua UniversityVerified email at tsinghua.edu.cn
Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
David K LowenthalUniversity of ArizonaVerified email at cs.arizona.edu
Steve WebbWeb GnomesVerified email at cc.gatech.edu
Lakshmish RamaswamyProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Danesh IraniGoogle IncVerified email at google.com
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Molly H Shor, PhD MBAE8 AngelsVerified email at e8angels.com
Larry PetersonPrinceton University / ONFVerified email at cs.princeton.edu
Ashvin GoelUniversity of TorontoVerified email at eecg.toronto.edu
Bryan VealIntel CorporationVerified email at intel.com
Baochun LiProfessor of Electrical and Computer Engineering, University of TorontoVerified email at ece.toronto.edu
Jian JiangResearch Scientist, Shape Security
Bo LiChair Professor at hong kong university of science and technologyVerified email at cse.ust.hk