Get my own profile
Public access
View all54 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
- Emily TsengPostdoctoral Researcher, Microsoft ResearchVerified email at cornell.edu
- Madeline R. Sterling, MD, MPH, MSWeill Cornell Medical CollegeVerified email at med.cornell.edu
- Aditya VashisthaAssistant Professor @ Cornell UniversityVerified email at cornell.edu
- Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
- Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
- Fabian OkekeUX Researcher @ MetaVerified email at cornell.edu
- Ariel AvgarCornell UniversityVerified email at cornell.edu
- Neha KumarAssociate Professor @Georgia TechVerified email at gatech.edu
- Anthony PoonUniversity of WashingtonVerified email at uw.edu
- Rosanna BelliniNew York UniversityVerified email at nyu.edu
- Syed Ishtiaque AhmedUniversity of TorontoVerified email at cs.toronto.edu
- Karen LevyCornell UniversityVerified email at cornell.edu
- Sam HavronGraduate Security Researcher, Cornell TechVerified email at cs.cornell.edu
- Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
- Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
- MD Romael HaqueVisiting Assistant Professor, Purdue University Fort WayneVerified email at purdue.edu
- Nora McDonaldGeorge Mason UniversityVerified email at gmu.edu
- Rama Adithya VaranasiFaculty Fellow & Adjunct Faculty | New York UniversityVerified email at nyu.edu
- Francois GuimbretiereProfessor, Cornell UniversityVerified email at cs.cornell.edu