Get my own profile
Public access
View all46 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Emily TsengPhD Student, Information Science, Cornell UniversityVerified email at cornell.edu
Madeline R. Sterling, MD, MPH, MSWeill Cornell Medical CollegeVerified email at med.cornell.edu
Fabian OkekeUX Researcher @ MetaVerified email at cornell.edu
Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Aditya VashisthaCornell UniversityVerified email at cornell.edu
Damon McCoyAssociate Professor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Neha KumarAssociate Professor @Georgia TechVerified email at gatech.edu
Anthony PoonUniversity of WashingtonVerified email at uw.edu
Karen LevyCornell UniversityVerified email at cornell.edu
Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
Sam HavronGraduate Security Researcher, Cornell TechVerified email at cs.cornell.edu
Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
Ariel AvgarCornell UniversityVerified email at cornell.edu
Trevor PerrierUniversity of WashingtonVerified email at cs.washington.edu
MD Romael HaqueGraduate Research Assistant, Marquette UniversityVerified email at marquette.edu
Francois GuimbretiereProfessor, Cornell UniversityVerified email at cs.cornell.edu
Shion GuhaAssistant Professor, University of TorontoVerified email at utoronto.ca
Brian DeRenziDimagi, University of Cape Town, University of WashingtonVerified email at cs.uct.ac.za
Edward (Ed) CutrellSr. Principal Researcher, Microsoft ResearchVerified email at microsoft.com