Get my own profile
Public access
View all42 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Nicolas PapernotUniversity of Toronto and Vector InstituteVerified email at utoronto.ca
Matt FredriksonCarnegie Mellon UniversityVerified email at cs.cmu.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
Selcuk UluagacFlorida International UniversityVerified email at fiu.edu
Muslum Ozgur OzmenAssistant Professor of Computer Science, Arizona State UniversityVerified email at asu.edu
Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu
Leonardo BabunSenior Cybersecurity Researcher at The Johns Hopkins University Applied Physics LabVerified email at jhuapl.edu
Antonio BianchiAssistant Professor, Purdue UniversityVerified email at purdue.edu
Ian GoodfellowDeepMindVerified email at deepmind.com
Habiba FarrukhUniversity of California, IrvineVerified email at uci.edu
Amit Kumar SikderAssistant Professor, Iowa State UniversityVerified email at iastate.edu
Hyungsub KimIndiana University BloomingtonVerified email at postech.ac.kr
Raymond Muller IIPurdue UniversityVerified email at purdue.edu
Arjun ArunasalamPh.D. Candidate, Purdue UniversityVerified email at purdue.edu
Ryan M GerdesVirginia TechVerified email at vt.edu
Abbas AcarHarbor LabsVerified email at harborlabs.com
Khaled SeragScientist, Qatar Computing Research InstituteVerified email at purdue.edu
Ming LiProfessor of ECE, The University of ArizonaVerified email at arizona.edu
Follow
Z. Berkay Celik
Assistant Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage