Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Shomir WilsonAssistant Professor, Pennsylvania State UniversityVerified email at psu.edu
- Mads Schaarup AndersenSenior Usable Security ExpertVerified email at alexandra.dk
- Florian SchaubUniversity of MichiganVerified email at umich.edu
- Sebastian ZimmeckAssistant Professor of Computer Science, Wesleyan UniversityVerified email at wesleyan.edu
- Norman SadehProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Frederick LiuGoogleVerified email at google.com
- Kanthashree Mysore SathyendraAmazonVerified email at amazon.com
- Joel R. ReidenbergStanley D. and Nikki Waxberg Chair in Law, Fordham UniversityVerified email at law.fordham.edu
- Josef van GenabithDFKI German Research Center for Artificial IntelligenceVerified email at dfki.de
- Yiu-Chang LinAppleVerified email at apple.com
- Declan GrovesSenior Applied Scientist, MicrosoftVerified email at microsoft.com
- Antonio ToralAssistant Professor, University of GroningenVerified email at rug.nl
- Sandipan DandapatMicrosoft, IndiaVerified email at microsoft.com
- Qun LiuNoah's Ark Lab, HuaweiVerified email at huawei.com
- Avinesh P.V.SNLP and ML ScientistVerified email at apple.com