Experts Matter. Find Yours.
Connect for media, speaking, professional opportunities & more.
Filters
Lujo Bauer
Professor, Electrical and Computer EngineeringCarnegie Mellon University
Lujo Bauer's research examines many aspects of computer security and privacy.
Vyas Sekar
Professor, Electrical and Computer EngineeringCarnegie Mellon University
Vyas Sekar seeks to develop more rigorous foundations for securing tomorrow’s electric energy grid
Larry Pileggi
Department Head Professor, Electrical and Computer EngineeringCarnegie Mellon University
Larry Pileggi is a specialist in the automation of integrated circuits, and developing software tools for the optimization of power grids.
Audrey Kurth Cronin
Trustees Professor of Security and Technology Director, Carnegie Mellon Institute for Security and TechnologyCarnegie Mellon University
Audrey Kurth Cronin's research explores how governments and private actors use accessible technologies.
Preetam Ghosh, Ph.D.
Professor, Department of Computer ScienceVCU College of Engineering
Professor Ghosh researches complex networks and systems biology, using modeling and simulation, applied-AI and network science.
Jeff Schneider
Research Professor, Robotics InstituteCarnegie Mellon University
Jeff Schneider is researching how to use machine learning to control fusion reactions.
Chris Telmer
Associate Professor, Financial EconomicsCarnegie Mellon University
Chris Telmer's research includes the effect of government subsidies on the financing of renewable energy assets.
Granger Morgan
University ProfessorCarnegie Mellon University
Granger Morgan's research addresses problems in science, technology and public policy.
Zico Kolter
Associate Professor and Director of Machine LearningCarnegie Mellon University
Zico Kolter researches how to make deep learning algorithms more robust, safer, and understand how data impacts how models function.
Richard Reiner
Executive Chairdfuse Platform Inc
Globally recognized thought leader on cloud computing, cloud security, password management, IT security, and IT risk
