Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Pankaj RohatgiGoogleVerified email at google.com
Douglas SchalesSTSM, IBM ResearchVerified email at us.ibm.com
Marc Ph. StoecklinIBM ResearchVerified email at zurich.ibm.com
Dakshi AgrawalIBM Fellow, IBMVerified email at us.ibm.com
Ian MolloyIBM ResearchVerified email at us.ibm.com
Mihai ChristodorescuGoogleVerified email at christodorescu.org
Xin HuOpenAIVerified email at us.ibm.com
Jiyong JangResearch Scientist, IBM ResearchVerified email at us.ibm.com
Dhilung KiratResearch Scientist, IBM ResearchVerified email at us.ibm.com
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Chung-Sheng LiTaiwan Semiconductor Manufacturing Company LimitedVerified email at ieee.org
Ashish KunduHead of Cybersecurity Research, Cisco ResearchVerified email at acm.org
Hubertus FrankeDistinguished Research Scientist, IBM ResearchVerified email at us.ibm.com
Pradeep DubeyIntel CorporationVerified email at intel.com
Atri RudraKatherine Johnson Chair in AI, Professor, CSE, University at BuffaloVerified email at buffalo.edu
Rangachari AnandResearch Staff Member, IBMVerified email at us.ibm.com
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Olivier VerscheureSwiss Data Science Center @ EPFL & ETH ZurichVerified email at datascience.ch
Lisa AminiIBM ResearchVerified email at us.ibm.com
Srinivasan ParthasarathyProfessor of Computer Science and Engineering, The Ohio State UniversityVerified email at cse.ohio-state.edu