Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Insup LeeProfessor, Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
John HatcliffUniversity Distinguished Professor, Department of Computing and Information Sciences, Kansas StateVerified email at ksu.edu
Denis Foo KuneAmazon AGI, Responsible AIVerified email at amazon.com
Krishna VenkatasubramanianThe University of Rhode IslandVerified email at uri.eduDavid MohaisenProfessor, University of Central FloridaVerified email at ucf.edu
Julian M GoldmanMassachusetts General HospitalVerified email at mgh.harvard.edu
Sandy WeiningerUS FDAVerified email at fda.hhs.govMax SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
Oleg SokolskyUniversity of PennsylvaniaVerified email at cis.upenn.edu
Michael RobkinHIT and Medical Device ExecutiveVerified email at mdpnp.org
Eric Chan-TinAssociate Professor of Cybersecurity, Loyola University ChicagoVerified email at cs.luc.edu
Eleanor SayreKansas State UniversityVerified email at ksu.edu
Andrew L KingUniversity of PennsylvaniaVerified email at cis.upenn.edu
Pascal HitzlerUniversity Distinguished Professor, Lloyd T. Smith Creativity in Eng. Chair, Kansas State UniversityVerified email at ksu.edu
Qais TasaliGraduate Research/Teaching Assistant, Kansas State UniversityVerified email at ksu.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
George AmariucaiKansas State UniversityVerified email at ksu.edu
Adrita BaruaGraduate Research Assistant, Data Semantics LabVerified email at ksu.edu