Crea il mio profilo
Accesso pubblico
Visualizza tutto27 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Wenchao ZhouGeorgetown UniversityEmail verificata su cs.georgetown.edu
- Boon Thau LooRCA Professor of Computer and Information Science, Associate Dean, UPennEmail verificata su seas.upenn.edu
- Tavish VaidyaGoogleEmail verificata su google.com
- Andreas HaeberlenUniversity of PennsylvaniaEmail verificata su cis.upenn.edu
- Clay ShieldsGeorgetown UniversityEmail verificata su georgetown.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Yuankai ZhangResearch Scientist, FacebookEmail verificata su fb.com
- Adam J AvivThe George Washington UniversityEmail verificata su email.gwu.edu
- Aaron JohnsonU.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Paul SyversonMathematician, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- David WagnerProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- William MarczakUC BerkeleyEmail verificata su cs.berkeley.edu
- Ang ChenUniversity of MichiganEmail verificata su umich.edu
- Zachary G. IvesChair & Professor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Linh Thi Xuan PhanAssociate Professor, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Kevin ButlerUniversity of FloridaEmail verificata su ufl.edu
- Pratyush MishraUniversity of PennsylvaniaEmail verificata su seas.upenn.edu
- Nicholas CarliniGoogle DeepMindEmail verificata su google.com
- Adam BatesAssistant Professor, University of Illinois at Urbana-ChampaignEmail verificata su illinois.edu