Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Syed Rafiul HussainAssistant Professor of Computer Science and Engineering, Penn StateVerified email at psu.edu
Gowtham BellalaPrincipal Data Scientist, FlipkartVerified email at flipkart.com
Ehsanul KabirPenn State UniversityVerified email at psu.edu
Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
Kang GuDartmouth CollegeVerified email at dartmouth.edu
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Md Rafi ur RashidDepartment of CSE, Penn State UniversityVerified email at psu.edu
Sayanton DibboPhD Candidate, Computer Science, Dartmouth College | Ex-intern @LANL, @FINRAVerified email at dartmouth.edu
Anand MudgerikarMicrosoft Security AI ResearchVerified email at microsoft.com
Shahriar NirjonAssociate Professor of Computer Science, UNC Chapel Hill, NCVerified email at cs.unc.edu
Soroush VosoughiAssistant Professor of Computer Science, Dartmouth. Ex Postdoc/PhD at MIT. Ex fellow at HarvardVerified email at mit.edu
Najrin SultanaPh.D. Student at Pennsylvania State UniversityVerified email at psu.edu
Zeyu SongCSE, Pennsylvania State UniversityVerified email at psu.edu
M Sohel RahmanCSE, BUETVerified email at cse.buet.ac.bd
Vishnu Asutosh DasuThe Pennsylvania State UniversityVerified email at psu.edu
Ye WangMitsubishi Electric Research LaboratoriesVerified email at merl.com
Toshiaki Koike-AkinoMERLVerified email at merl.com
Chongyang GaoNorthwestern UniversityVerified email at u.northwestern.edu
Imranur RahmanNorth Carolina State UniversityVerified email at ncsu.edu