Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Syed Rafiul HussainAssistant Professor of Computer Science and Engineering, Penn StateVerified email at psu.edu
Gowtham BellalaPrincipal Data Scientist, FlipkartVerified email at flipkart.com
Ehsanul KabirPenn State UniversityVerified email at psu.edu
Omar Haider ChowdhuryAssociate Professor of CS at Stony Brook UniversityVerified email at cs.stonybrook.edu
Anand MudgerikarMicrosoft Security ResearchVerified email at microsoft.com
Ninghui LiProfessor of Computer Science, Purdue UniversityVerified email at cs.purdue.edu
Shahriar NirjonAssociate Professor of Computer Science, UNC Chapel Hill, NCVerified email at cs.unc.edu
Kang GuDartmouth CollegeVerified email at dartmouth.edu
Md Rafi ur RashidDepartment of CSE, Penn State UniversityVerified email at psu.edu
Soroush VosoughiAssistant Professor of Computer Science, Dartmouth. Ex Postdoc/PhD at MIT. Ex fellow at HarvardVerified email at mit.edu
M Sohel RahmanCSE, BUETVerified email at cse.buet.ac.bd
Zeyu SongCSE, Pennsylvania State UniversityVerified email at psu.edu
Imranur RahmanNorth Carolina State UniversityVerified email at ncsu.edu
Shohrab HossainDept of CSE, BUETVerified email at cse.buet.ac.bd