Get my own profile
Public access
View all21 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
- Wenke LeeJohn P. Imlay Jr. Chair and Professor of Computer Science at Georgia TechVerified email at cc.gatech.edu
- Chaz LeverGeorgia Institute of TechnologyVerified email at gatech.edu
- Yacin NadjiCorelight, IncVerified email at gatech.edu
- Zane MaOregon State UniversityVerified email at oregonstate.edu
- Michael Donald BaileyGeorgia Institute of TechnologyVerified email at gatech.edu
- Zakir DurumericStanford UniversityVerified email at cs.stanford.edu
- Yizheng ChenUniversity of MarylandVerified email at umd.edu
- Mustaque AhamadGeorgia Institute of TechnologyVerified email at cc.gatech.edu
- Athanasios KountourasPhD student, Georgia Institute of technologyVerified email at gatech.edu
- Babak RahbariniaAssistant Professor at Auburn University MontgomeryVerified email at aum.edu
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
- Luca InvernizziStaff Research Scientist @ Google (CH)Verified email at google.com
- Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadVerified email at google.com
- Kurt ThomasResearch Scientist @ GoogleVerified email at google.com
- Rosa Romero GomezSenior Data Visualization Engineer at GraphicacyVerified email at graphicacy.com
- Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
- Xiapu LuoThe Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
- Nikolaos PitropakisAssociate Professor of Cyber Security at Edinburgh Napier UniversityVerified email at napier.ac.uk