Get my own profile
Public access
View all55 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Emily TsengPostdoctoral Researcher, Microsoft ResearchVerified email at cornell.edu
Madeline R. Sterling, MD, MPH, MSWeill Cornell Medical CollegeVerified email at med.cornell.edu
Aditya VashisthaAssistant Professor @ Cornell UniversityVerified email at cornell.edu
Deborah EstrinProfessor of Computer Science, Cornell Tech, Cornell UniversityVerified email at cornell.edu
Damon McCoyProfessor of Computer Science and Engineering, New York UniversityVerified email at nyu.edu
Fabian OkekeUX Researcher @ MetaVerified email at cornell.edu
Ariel AvgarCornell UniversityVerified email at cornell.edu
Neha KumarAssociate Professor @Georgia TechVerified email at gatech.edu
Anthony PoonUniversity of WashingtonVerified email at uw.edu
Rosanna BelliniAssistant Professor, Computer Science, New York UniversityVerified email at nyu.edu
Syed Ishtiaque AhmedUniversity of TorontoVerified email at cs.toronto.edu
Karen LevyCornell UniversityVerified email at cornell.edu
Sam HavronGraduate Security Researcher, Cornell TechVerified email at cs.cornell.edu
Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
Richard J. AndersonProfessor of Computer Science and Engineering, University of WashingtonVerified email at cs.washington.edu
MD Romael HaqueVisiting Assistant Professor, Purdue University Fort WayneVerified email at purdue.edu
Rama Adithya VaranasiFaculty Fellow & Adjunct Faculty | New York UniversityVerified email at nyu.edu
Nora McDonaldGeorge Mason UniversityVerified email at gmu.edu
Francois GuimbretiereProfessor, Cornell UniversityVerified email at cs.cornell.edu