Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Calton PuProfessor and J.P. Imlay, Jr. Chair in Software, School of Computer Science, Georgia TechEmail verificata su cc.gatech.edu
- Suchendra BhandarkarProfessor of Computer Science, The University of GeorgiaEmail verificata su uga.edu
- zhenyu zhongBaidu SecurityEmail verificata su baidu.com
- Roberto PerdisciProfessor of Computer Science, University of GeorgiaEmail verificata su cs.uga.edu
- David K LowenthalUniversity of ArizonaEmail verificata su cs.arizona.edu
- Haixin Duan, 段海新Tsinghua UniversityEmail verificata su tsinghua.edu.cn
- Steve WebbWeb GnomesEmail verificata su cc.gatech.edu
- Lakshmish RamaswamyProfessor of Computer Science, University of GeorgiaEmail verificata su cs.uga.edu
- Danesh IraniGoogle IncEmail verificata su google.com
- Chao ZhangTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Molly H Shor, PhD MBAE8 AngelsEmail verificata su e8angels.com
- Larry PetersonPrinceton University / ONFEmail verificata su cs.princeton.edu
- Ashvin GoelUniversity of TorontoEmail verificata su eecg.toronto.edu
- Bryan VealIntel CorporationEmail verificata su intel.com
- Baochun LiProfessor of Electrical and Computer Engineering, University of TorontoEmail verificata su ece.toronto.edu
- Jian JiangResearch Scientist, Shape Security
- Bo LiChair Professor at hong kong university of science and technologyEmail verificata su cse.ust.hk