Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David BrumleyComputer Science, Carnegie Mellon UniversityVerified email at cmu.edu
Thanassis AvgerinosUniversity of AthensVerified email at di.uoa.gr
Maverick WooSystems Scientist, Carnegie Mellon UniversityVerified email at cmu.edu
Sang Kil ChaSchool of Computing, KAISTVerified email at kaist.ac.kr
Claire Le GouesCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jeremy LacomisPostdoctoral Fellow, Carnegie Mellon UniversityVerified email at cmu.edu
Bogdan VasilescuAssociate Professor at Carnegie Mellon UniversityVerified email at cmu.edu
Choongwoo HanMicrosoftVerified email at microsoft.com
Manuel EgeleBoston UniversityVerified email at bu.edu
Valentin J.M. ManèsInformation Security ResearcherVerified email at kaist.ac.kr
HyungSeok HanSamsung Research AmericaVerified email at samsung.com
Graham NeubigCarnegie Mellon University, All Hands AIVerified email at cs.cmu.edu
Stephanie Elzer SchwartzMillersville UniversityVerified email at millersville.edu
Pengcheng YinGoogle DeepmindVerified email at google.com
Miltiadis AllamanisGoogle DeepMindVerified email at google.com
Qibin ChenApple AI/MLVerified email at apple.com
Ipek OzkayaCarnegie Mellon University Software Engineering InstituteVerified email at sei.cmu.edu
Forrest ShullCarnegie Mellon University, Software Engineering InstituteVerified email at computer.org
Jorge A NavasCertoraVerified email at certora.com
Arie GurfinkelUniversity of WaterlooVerified email at uwaterloo.ca