Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Sanjit A. SeshiaProfessor of EECS, University of California, BerkeleyVerified email at eecs.berkeley.edu
Sarah M. LoosGoogleVerified email at google.com
Leander TentrupSaarland University, Saarland Informatics CampusVerified email at cs.uni-saarland.de
Kshitij Bansalkshitij.ioVerified email at kshitij.io
Cesar SanchezAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Sven ScheweProfessor of Computer Science, University of LiverpoolVerified email at liverpool.ac.uk
Yuhuai(Tony) WuGoogle / StanfordVerified email at stanford.edu
Dennis LeeGoogleVerified email at google.com
Christopher HahnStanford UniversityVerified email at stanford.edu
Frederik SchmittPh.D. student at CISPA Helmholtz Center for Information Security and Saarland UniversityVerified email at cispa.de
Wenda LiUniversity of CambridgeVerified email at cam.ac.uk
Kristopher MicinskiSyracuse UniversityVerified email at syr.edu
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
Rayna DimitrovaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Aditya PaliwalGoogle ResearchVerified email at iiitb.org
Peter FaymonvilleZF GroupVerified email at faymonville.de
Edward A. LEEProfessor of Electrical Engineering and Computer Sciences, University of California at BerkeleyVerified email at berkeley.edu
John FearnleyUniversity of LiverpoolVerified email at liverpool.ac.uk
Albert X. JiangAssistant Professor of Computer Science, Trinity UniversityVerified email at trinity.edu