Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- James JoshiProfessor, SCI, University of Pittsburgh; Expert NSF-TIPVerified email at pitt.edu
- Chao LiBeijing Jiaotong University | University of PittsburghVerified email at pitt.edu
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Nathalie BaracaldoIBM Almaden Research Center, Senior Research Staff Member, Ph.D.Verified email at pitt.edu
- Ali AnwarAssistant Professor, University of MinnesotaVerified email at umn.edu
- Yi ZhouResearch Staff Member, IBM ResearchVerified email at ibm.com
- Balaji PalanisamyAssociate Professor, School of Computing and Information, University of PittsburghVerified email at pitt.edu
- Bo LangBUAAVerified email at buaa.edu.cn
- Prashant KrishnamurthyProfessor, University of PittsburghVerified email at pitt.edu
- Jinlai XuByteDance USVerified email at bytedance.com
- Swanand R. KadheIBM ResearchVerified email at ibm.com
- Jiqiang LiuProfessor of Computer ScienceVerified email at bjtu.edu.cn
- Hayim ShaulmitVerified email at mit.edu
- David TipperSchool of Computing and Information, University of PittsburghVerified email at tele.pitt.edu
- Yuya Jeremy OngIBM ResearchVerified email at ibm.com
- laura wynterIBM Watson Research CenterVerified email at us.ibm.com
- Jianxin LiSchool of Computer Science & Engineering, Beihang UniversityVerified email at act.buaa.edu.cn
- Eyal KushnirCryptography researcher at IBM Research Israel, MSc student at TechnionVerified email at ibm.com
- Timothy CastigliaPhD student at Rensselaer Polytechnic InstituteVerified email at rpi.edu
- Shiqiang WangIBM T. J. Watson Research CenterVerified email at us.ibm.com