Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David BrumleyComputer Science, Carnegie Mellon UniversityVerified email at cmu.edu
Thanassis AvgerinosForAllSecure, Inc.Verified email at forallsecure.com
Maverick WooSystems Scientist, Carnegie Mellon UniversityVerified email at cmu.edu
Sang Kil ChaSchool of Computing, KAISTVerified email at kaist.ac.kr
Claire Le GouesCarnegie Mellon UniversityVerified email at cs.cmu.edu
Jeremy LacomisPh.D. Student, Carnegie Mellon UniversityVerified email at cmu.edu
Choongwoo HanMicrosoftVerified email at microsoft.com
Manuel EgeleBoston UniversityVerified email at bu.edu
Valentin J.M. ManèsInformation Security ResearcherVerified email at kaist.ac.kr
HyungSeok HanGeorgia TechVerified email at gatech.edu
Bogdan VasilescuAssociate Professor at Carnegie Mellon UniversityVerified email at cmu.edu
Stephanie Elzer SchwartzMillersville UniversityVerified email at millersville.edu
Graham NeubigCarnegie Mellon University, Inspired CognitionVerified email at cs.cmu.edu
Pengcheng YinGoogleVerified email at google.com
Miltiadis AllamanisGoogle Deep MindVerified email at google.com
Qibin ChenApple AI/MLVerified email at apple.com
Ipek OzkayaCarnegie Mellon University Software Engineering InstituteVerified email at sei.cmu.edu
Forrest ShullCarnegie Mellon University, Software Engineering InstituteVerified email at computer.org
Rick KazmanUniversity of HawaiiVerified email at hawaii.edu
Jorge A NavasCertoraVerified email at certora.com