Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Florian SchaubUniversity of MichiganVerified email at umich.edu
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Lorrie Faith CranorFORE Systems Professor, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityVerified email at wesleyan.edu
Donald PerlisProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Kanthashree Mysore SathyendraAmazonVerified email at amazon.com
Noah A. SmithUniversity of Washington; Allen Institute for Artificial IntelligenceVerified email at cs.washington.edu
Frederick LiuGoogleVerified email at google.com
Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
Fei LiuEmory UniversityVerified email at emory.edu
Peter StoryAssistant Professor, Clark UniversityVerified email at clarku.edu
Michael L. AndersonProfessor, Dept. of Philosophy and Brain and Mind Institute, University of Western OntarioVerified email at uwo.ca
Tim OatesProfessor of Computer Science, University of Maryland Baltimore CountyVerified email at umbc.edu
Saranga KomanduriCarnegie Mellon UniversityVerified email at cs.cmu.edu
Idris AdjeridAssociate Professor, Virginia TechVerified email at vt.edu
Darsana JosyulaBowie State UniversityVerified email at cs.umd.edu
Matthew D. SchmillAssistant Research Scientist, University of Maryland Baltimore CountyVerified email at schmill.net
Rebecca BalebakoGoogleVerified email at google.com
Follow