Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gennaro ParlatoAssociate Professor of Computer Science, University of MoliseVerified email at unimol.it
Pranav GargAmazonVerified email at amazon.com
Salvatore La TorreUniversitŕ degli Studi di SalernoVerified email at unisa.it
Daniel NeiderTU Dortmund University and Center for Trustworthy Data Science and SecurityVerified email at tu-dortmund.de
Azadeh FarzanAssociate Professor, University of TorontoVerified email at cs.toronto.edu
Mahesh ViswanathanUniversity of Illinois, Urbana-ChampaignVerified email at illinois.edu
Sanjit A. SeshiaProfessor of EECS, University of California, BerkeleyVerified email at eecs.berkeley.edu
P.S. ThiagarajanVisiting Professor, Laboratory of Systems Pharmacology, Harvard Medical SchoolVerified email at hms.harvard.edu
Xiaokang QiuPurdue UniversityVerified email at purdue.edu
Shambwaditya SahaTufts UniversityVerified email at eecs.tufts.edu
Francesco SorrentinoVerified email at uiuc.edu
Anna Lisa FerraraUniversita' del MoliseVerified email at unimol.it
Rishabh SinghResearch Scientist, Google BrainVerified email at google.com
Armando Solar-LezamaMITVerified email at csail.mit.edu
Prithvi BishtWeb Security Researcher, AdobeVerified email at adobe.com
VN VenkatakrishnanProfessor of Computer Science, University of Illinois at ChicagoVerified email at uic.edu
Deepak D'SouzaDepartment of CSA, Indian Institute of ScienceVerified email at iisc.ac.in
Swarat ChaudhuriProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Samuel T KingUniversity of California at DavisVerified email at ucdavis.edu
Sruthi BandhakaviGoogle Inc.Verified email at google.com
Follow
Madhusudan Parthasarathy
Professor of Computer Science, University of Illinois at Urbana-Champaign
Verified email at illinois.edu - Homepage