Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jonathan SmithProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Andre DeHonUniversity of PennsylvaniaVerified email at acm.org
martin rinardMITVerified email at lcs.mit.edu
Grigoris NtousakisPhD Student, Brown UniversityVerified email at brown.edu
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Jiasi ShenThe Hong Kong University of Science and Technology (HKUST)Verified email at cse.ust.hk
Udit DhawanTurtle Shell Technologies Private LimitedVerified email at uditdhawan.net
Boon Thau LooRCA Professor of Computer and Information Science, Senior Associate Dean, UPennVerified email at seas.upenn.edu
Henri Maxime DemoulinUniversity of PennsylvaniaVerified email at seas.upenn.edu
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Michael PradelProfessor of Computer Science, Head of Software Lab, University of StuttgartVerified email at iste.uni-stuttgart.de
Nathan DautenhahnSerenitixVerified email at serenitix.io
Nick RoesslerUniversity of PennsylvaniaVerified email at seas.upenn.edu
Linh Thi Xuan PhanAssociate Professor, University of PennsylvaniaVerified email at cis.upenn.edu
Isaac PedisichSoftware Developer, University of PennsylvaniaVerified email at seas.upenn.edu
Vincent LiuUniversity of PennsylvaniaVerified email at seas.upenn.edu
Shivam HandaPh.D. student, Massachusetts Institute of TechnologyVerified email at mit.edu
Panagiotis KokkinosDepartment of Digital Systems, Un. of the Peloponnese & ICCS, NTUAVerified email at central.ntua.gr
Orestis AkrivopoulosResearcherVerified email at sparkworks.net