Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Roberto PerdisciProfessor of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Kyu Hyung LeeAssistant Professor of Computer Science, University of GeorgiaVerified email at uga.edu
Karthika SubramaniGeorgia Institute of TechnologyVerified email at gatech.edu
Babak RahbariniaAssistant Professor at Auburn University MontgomeryVerified email at aum.edu
Jienan LiuDepartment of Computer Science, University of GeorgiaVerified email at cs.uga.edu
Bhupendra AcharyaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Manos AntonakakisGeorgia Institute of TechnologyVerified email at gatech.edu
Kang LiBaidu; University of GeorgiaVerified email at cs.uga.edu
Omid SetayeshfarResearch Scientist @MetaVerified email at fb.com
Xingzi YuanPhD of Computer Science, University of GerogiaVerified email at uga.edu
Oleksii StarovStony Brook University, SUNYVerified email at cs.stonybrook.edu
Adam OestAmazonVerified email at asu.edu
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
Follow