Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Franz FranchettiCarnegie Mellon UniversityVerified email at ece.cmu.edu
- Brandon ReagenAssistant Professor, New York UniversityVerified email at nyu.edu
- Negar NedaPh.D. Candidate, New York UniversityVerified email at nyu.edu
- Ben ReynwarResearch Programmer, Information Sciences InstituteVerified email at reynwar.net
- Andrew G. SchmidtUniversity of Southern California Information Sciences InstituteVerified email at isi.edu
- David Bruce CousinsDuality TechnologiesVerified email at dualitytech.com
- Ahmad Al BadawiSenior Scientist in Applied CryptographyVerified email at u.nus.edu
- Yuriy PolyakovPrincipal Scientist, Duality TechnologiesVerified email at dualitytech.com
- Jeremy JohnsonProfessor of Computer Science, Drexel UniversityVerified email at cs.drexel.edu
- Deepraj SoniNew York UniversityVerified email at nyu.edu
- Michail (Mihalis) ManiatakosAssociate Professor, New York University Abu DhabiVerified email at nyu.edu
- Homer GamilCenter for Cyber Security, New York University Abu DhabiVerified email at nyu.edu
- Matthew FrenchResearch Director, Information Sciences InstituteVerified email at isi.edu
- Massoud PedramCharles Lee Powell Professor of Electrical Engineering & Computer Science, Univ of SouthernVerified email at usc.edu
- Viktor K. PrasannaUniversity of Southern CaliforniaVerified email at usc.edu
- Ajitesh SrivastavaResearch Assistant Professor, University of Southern CaliforniaVerified email at usc.edu
- Ajey JacobInformation Sciences Institute, University of Southern CaliforniaVerified email at isi.edu
- Akhilesh JaiswalAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
- Mohammed Nabeel Thari MoopanResearch Engineer, DFX lab, NYUADVerified email at nyu.edu
- Austin EbelColumbia UniversityVerified email at columbia.edu