Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Syed Rafiul HussainAssistant Professor of Computer Science and Engineering, Penn StateVerified email at psu.edu
- Gowtham BellalaPrincipal Data Scientist, FlipkartVerified email at flipkart.com
- Ehsanul KabirPenn State UniversityVerified email at psu.edu
- Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
- Anand MudgerikarMicrosoft Security ResearchVerified email at microsoft.com
- Shahriar NirjonAssistant Professor of Computer Science, UNC Chapel Hill, NCVerified email at cs.unc.edu
- Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
- Kang GuDartmouth CollegeVerified email at dartmouth.edu
- M Sohel RahmanCSE, BUETVerified email at cse.buet.ac.bd
- Md Rafi ur RashidDepartment of CSE, Penn State UniversityVerified email at psu.edu
- Soroush VosoughiAssistant Professor of Computer Science, Dartmouth. Ex Postdoc/PhD at MIT. Ex fellow at HarvardVerified email at mit.edu
- Zeyu SongCSE, Pennsylvania State UniversityVerified email at psu.edu
- Imranur RahmanNorth Carolina State UniversityVerified email at ncsu.edu
- Shohrab HossainDept of CSE, BUETVerified email at cse.buet.ac.bd