Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ling LiuGeorgia Institute of TechnologyEmail verificata su cc.gatech.edu
- M. Emre GursoyAssistant Professor of Computer Science, Koç UniversityEmail verificata su ku.edu.tr
- Wenqi WeiFordham University, ex-IBMerEmail verificata su fordham.edu
- Ka-Ho ChowThe University of Hong KongEmail verificata su cs.hku.hk
- Lei YuRensselaer Polytechnic InstituteEmail verificata su rpi.edu
- Yanzhao WuFlorida International UniversityEmail verificata su cs.fiu.edu
- Heiko LudwigResearch Manager, IBM ResearchEmail verificata su us.ibm.com
- Ali AnwarAssistant Professor, University of MinnesotaEmail verificata su umn.edu
- Martine De CockProfessor, University of Washington TacomaEmail verificata su uw.edu
- Margaret LoperGeorgia Tech Research InstituteEmail verificata su gtri.gatech.edu
- Thomas SteinkeGoogle DeepMindEmail verificata su google.com
- Rui ZhangFormerly IBM Research - AlmadenEmail verificata su us.ibm.com
- Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Email verificata su pitt.edu
- Yi ZhouResearch Staff Member, IBM ResearchEmail verificata su ibm.com
- Ankur TeredesaiUniversity of WashingtonEmail verificata su uw.edu
- Anderson C. A. NascimentoHead of Security Research - VisaEmail verificata su visa.com
- Shanu SushmitaNortheastern UniversityEmail verificata su uw.edu
- Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechEmail verificata su cc.gatech.edu
- Vale TolpeginUndergraduate Research Assistant at Georgia Institute of TechnologyEmail verificata su gatech.edu
- Rafael DowsleyMonash UniversityEmail verificata su monash.edu