Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Pranav Narayanan VenkitPhD Student, Pennsylvania State UniversityVerified email at psu.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Mukund SrinathPhD Student at Penn State UniversityVerified email at psu.edu
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityVerified email at wesleyan.edu
Frederick LiuGoogleVerified email at google.com
Kanthashree Mysore SathyendraAmazonVerified email at amazon.com
Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
Donald PerlisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Peter StoryAssistant Professor, Clark UniversityVerified email at clarku.edu
Noah A. SmithUniversity of Washington; Allen Institute for Artificial IntelligenceVerified email at cs.washington.edu
Fei LiuEmory UniversityVerified email at emory.edu
Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
Michael L. AndersonProfessor, Dept. of Philosophy and Brain and Mind Institute, University of Western OntarioVerified email at uwo.ca
Darsana JosyulaBowie State UniversityVerified email at cs.umd.edu
Tim OatesProfessor of Computer Science, University of Maryland Baltimore CountyVerified email at umbc.edu
Follow