Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sharad MalikProfessor of Electrical and Computer Engineering, Princeton UniversityVerified email at princeton.edu
Sanjit A. SeshiaProfessor of EECS, University of California, BerkeleyVerified email at eecs.berkeley.edu
Sayak RaySecurity Researcher, Intel CorporationVerified email at intel.com
Ashish TiwariComputer Scientist, SRI International; Researcher MicrosoftVerified email at csl.sri.com
Adrią GascónGoogle ResearchVerified email at google.com
Nestan TsiskaridzeResearch Engineer at Stanford UniversityVerified email at stanford.edu
Erik LarssonLunds UniversitetVerified email at eit.lth.se
Virendra SinghAssociate Professor of Electrical Engineering, Indian Institute of Technology BombayVerified email at ee.iitb.ac.in
Yakir VizelTechnionVerified email at cs.technion.ac.il
Kewal SalujaProfessor of Electrical and Computer Engineering, University of Wisconsin - MadisonVerified email at ece.wisc.edu
Natarajan ShankarSRI International Computer Science LaboratoryVerified email at csl.sri.com
Wenchao LiAssociate Professor, Boston UniversityVerified email at bu.edu
Aarti GuptaPrinceton UniversityVerified email at cs.princeton.edu
Sujit Kumar MuduliPhD Student, IIT KanpurVerified email at cse.iitk.ac.in
Rohit SinhaHashgraphVerified email at berkeley.edu
Ilia Lebedevgradient.tech, MITVerified email at gradient.tech
Dillon ReismanVerified email at nyu.edu
Cameron RasmussenUC BerkeleyVerified email at berkeley.edu
Hongce ZhangHong Kong University of Science and Technology (Guangzhou)Verified email at ust.hk
Dejan JovanovićAmazon Web ServicesVerified email at amazon.com