Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Pankaj RohatgiGoogleVerified email at google.com
Douglas SchalesSTSM, IBM ResearchVerified email at us.ibm.com
Marc Ph. StoecklinIBM ResearchVerified email at zurich.ibm.com
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Mihai ChristodorescuGoogleVerified email at christodorescu.org
Ian MolloyIBM ResearchVerified email at us.ibm.com
Xin HuIBM T.J. Watson Research Center at Yorktown Heights, NYVerified email at us.ibm.com
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Jiyong JangResearch Scientist, IBM ResearchVerified email at us.ibm.com
Chung-Sheng LiTaiwan Semiconductor Manufacturing Company LimitedVerified email at ieee.org
Dhilung KiratResearch Scientist, IBM ResearchVerified email at us.ibm.com
Hubertus FrankeDistinguished Research Staff Member, IBM ResearchVerified email at us.ibm.com
Ashish KunduHead of Cybersecurity Research, Cisco ResearchVerified email at acm.org
Pradeep DubeyIntel CorporationVerified email at intel.com
Atri RudraProfessor, CSE, University at BuffaloVerified email at buffalo.edu
Rangachari AnandResearch Staff Member, IBMVerified email at us.ibm.com
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Olivier VerscheureSwiss Data Science Center @ EPFL & ETH ZurichVerified email at datascience.ch
Lisa AminiIBM ResearchVerified email at us.ibm.com