Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hemanta K. MajiDepartment of Computer Science, Purdue UniversityVerified email at purdue.edu
Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Anat Paskin-CherniavskyAriel University, IsraelVerified email at ariel.ac.il
Hai H. NguyenETH ZurichVerified email at purdue.edu
Saeed MahloujifarFAIR, MetaVerified email at meta.com
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
Rohit SinhaSwirlds LabsVerified email at berkeley.edu
YINUO ZHANGUC BerkeleyVerified email at berkeley.edu
Divya GuptaPrincipal Researcher, Microsoft Research IndiaVerified email at microsoft.com
Hamidreza Amini KhorasganiDepartment of Computer Science, Purdue UniversityVerified email at purdue.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Aarushi GoelPost-Doctoral Fellow, NTT ResearchVerified email at ntt-research.com
Guru Vamsi PolicharlaUniversity of California, BerkeleyVerified email at berkeley.edu
Albert YuPurdue UniversityVerified email at purdue.edu
Jaiden FairozeUC BerkeleyVerified email at berkeley.edu
Himanshi MehtaAppleVerified email at apple.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Sruthi SekarComputer Science and Engineering, IIT BombayVerified email at iitb.ac.in