Get my own profile
Public access
View all43 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Nicolas PapernotUniversity of Toronto and Vector InstituteVerified email at utoronto.ca
Matt FredriksonCarnegie Mellon UniversityVerified email at cs.cmu.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Selcuk UluagacFlorida International UniversityVerified email at fiu.edu
Muslum Ozgur OzmenAssistant Professor of Computer Science, Arizona State UniversityVerified email at asu.edu
Gang TanProfessor of computer science and engineering, Penn State UniversityVerified email at cse.psu.edu
Dongyan XuSamuel Conte Professor of Computer Science and Director of CERIAS, Purdue UniversityVerified email at purdue.edu
Antonio BianchiAssistant Professor, Purdue UniversityVerified email at purdue.edu
Leonardo BabunSenior Cybersecurity Researcher at The Johns Hopkins University Applied Physics LabVerified email at jhuapl.edu
Habiba FarrukhUniversity of California, IrvineVerified email at uci.edu
Ian GoodfellowDeepMindVerified email at deepmind.com
Amit Kumar SikderAssistant Professor, Iowa State UniversityVerified email at iastate.edu
Hyungsub KimIndiana University BloomingtonVerified email at postech.ac.kr
Arjun ArunasalamPh.D. Candidate, Purdue UniversityVerified email at purdue.edu
Raymond Muller IIPurdue UniversityVerified email at purdue.edu
Ryan M GerdesVirginia TechVerified email at vt.edu
Abbas AcarHarbor LabsVerified email at harborlabs.com
Ming LiProfessor of ECE, The University of ArizonaVerified email at arizona.edu
Khaled SeragScientist, Qatar Computing Research InstituteVerified email at purdue.edu
Follow
Z. Berkay Celik
Assistant Professor of Computer Science, Purdue University
Verified email at purdue.edu - Homepage