Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu
Chao LiBeijing Jiaotong University | University of PittsburghVerified email at pitt.edu
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Verified email at pitt.edu
Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
Yi ZhouResearch Staff Member, IBM ResearchVerified email at ibm.com
Balaji PalanisamyAssociate Professor, School of Computing and Information, University of PittsburghVerified email at pitt.edu
Bo LangBUAAVerified email at buaa.edu.cn
Prashant KrishnamurthyProfessor, University of PittsburghVerified email at pitt.edu
Jinlai XuByteDance USVerified email at bytedance.com
Swanand R. KadheIBM ResearchVerified email at ibm.com
Jiqiang LiuProfessor of Computer ScienceVerified email at bjtu.edu.cn
Hayim ShaulmitVerified email at mit.edu
David TipperSchool of Computing and Information, University of PittsburghVerified email at tele.pitt.edu
Yuya Jeremy OngIBM ResearchVerified email at ibm.com
laura wynterIBM Watson Research CenterVerified email at us.ibm.com
Jianxin LiSchool of Computer Science & Engineering, Beihang UniversityVerified email at act.buaa.edu.cn
Eyal KushnirCryptography researcher at IBM Research Israel, MSc student at TechnionVerified email at ibm.com
Timothy CastigliaPhD student at Rensselaer Polytechnic InstituteVerified email at rpi.edu
Shiqiang WangIBM T. J. Watson Research CenterVerified email at us.ibm.com