Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Florian SchaubUniversity of MichiganVerified email at umich.edu
- Pranav Narayanan VenkitPhD Student, Pennsylvania State UniversityVerified email at psu.edu
- Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Mukund SrinathPhD Student at Penn State UniversityVerified email at psu.edu
- Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
- Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityVerified email at wesleyan.edu
- Frederick LiuGoogleVerified email at google.com
- Kanthashree Mysore SathyendraAmazonVerified email at amazon.com
- Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
- Donald PerlisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Noah A. SmithUniversity of Washington; Allen Institute for Artificial IntelligenceVerified email at cs.washington.edu
- Peter StoryAssistant Professor, Clark UniversityVerified email at clarku.edu
- Fei LiuEmory UniversityVerified email at emory.edu
- Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
- Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
- Michael L. AndersonProfessor, Dept. of Philosophy and Brain and Mind Institute, University of Western OntarioVerified email at uwo.ca
- Darsana JosyulaBowie State UniversityVerified email at cs.umd.edu
- Tim OatesProfessor of Computer Science, University of Maryland Baltimore CountyVerified email at umbc.edu
Follow