Dan DeLaurentis F design of systems of systems, situational awareness
Carolin Frueh situational awareness (satellites, debris and near earth objects, ground surveillance), object 3d formation from image/video (shape inversion), satellite guidance, navigation and control, astrodynamics, sensor tasking, low observability systems, information quantification and retrieval.
Inseok Hwang controlling multiple-vehicle systems, analysis of multiple dynamical systems which have inherently decentralized structures, path planning (computing optimal
trajectories of vehicles from starting positions to destinations) and conflict detection and resolution
Mary Johnson sustainability analysis in aviation, aviation emissions analysis, aviation fuels testing and analysis, general aviation data analysis, strategic justification of technologies, and enterprise performance and improvement.
John Mott statistical process modeling and simulation,
aviation applications of bayesian inference,
acquisition and analysis of distributed transportation data
Lorraine Kisselburgh F communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in stem careers; digital identities
Smriti Bhatt cyber security and information assurance, security and privacy in cloud-enabled internet of things (ce-iot), access control and communication control models and architectures, cloud computing and internet of things (iot) security, cyber security education, stem education
Robert Deadman technology use in academic dishonesty detection and prevention, use of virtual networks and software defined networking
Tom Hacker high performance computer, grid computing, operating systems, and distributed systems
Nicole Hands application of basic cybersecurity principles of confidentiality, integrity and availability to cyber pedagogy (teaching best practices) as well as to academic honesty.
Umit Karabiyik digital forensics, cybersecurity, user and data privacy, artificial intelligence, computer and network security
James Lerums information security, cyber forensics, cyber security operations, social economic and legal aspects of information security, “right-sizing” cyber security solutions and implementations, cyber warfare, cyber risk, cyber exercises, physical security exercises
Deepak Nadig network security
ai/ml applications to networking
cloud-native infrastructure
Romila Pradhan responsible data science, data management, machine learning
Phillip Rawles network systems administration, enterprise network management, and network application architectures
Marcus K. Rogers F psychological profiling, applied cyber-forensics,
cyber-terrorism
Kathryn Seigfried-Spellar behavioral analysis of digital evidence
personality & motivation of cyberdeviants
code of ethics in digital forensics
John Springer biomedical high performance computing, biomedical information assurance and security
Wenhai Sun data security and privacy, decentralized trust and infrastructure, cyber-physical system security, and applied cryptography
Julia (Taylor) Rayz F natural language understanding, knowledge discovery and representation, computational recognition of salient information in texts, uncertainty management
Sudip Vhaduri leading interdisciplinary collaborative research teams consisting of researchers from a range of disciplines, including sociology, psychology, medical sciences, laryngology, otolaryngology, speech-language pathology, communication sciences and disorders, health sciences, behavioral sciences, statistics, mathematics, and electrical engineering
Jin Wei-Kocsis cyber-physical system cyber security artificial intelligence biologically inspired intelligent system design smart energy systems. cognitive networking design
Baijian "Justin" Yang information security, end system security, network security, security policies; mobile computing, distributed computing.
Daniel Aliaga computer graphics, computer vision, visualization
Walid Aref database technologies for emerging applications, spatial/multimedia/genomics/sensor-based databases, data mining, scalable media servers, gis.
Mike Atallah F assurable software and architecture
identification, authentication, privacy
cryptology and rights management
Aniket Bera computer graphics, augmented intelligence, social robotics, autonomous agents, cognitive modeling
Bharat Bhargava F assurable software and architecture
enclave and nework security
identification, authentication, privacy
Antonio Bianchi computer security
mobile security
android
binary analysis
ctf
Berkay Celik design and evaluation of security for software and systems, safety, security and privacy of iot systems.
William Cleveland statistics, data visualization, machine learning,
massive datasets, computer networking, cybersecurity
Chris Clifton F privacy issues in information management, data mining, data security, database support for text, and heterogeneous databases.
Benjamin J Delaware program synthesis and verification, mechanized reasoning, verified systems software, decision procedures, advanced modularity
Sonia Fahmy network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
Pedro Fonseca operating systems, hypervisors and distributed systems
Christina Garman practical and applied cryptography, namely the design and analysis of real world cryptographic systems
David Gleich high performance and large scale computations with a focus on enabling previously infeasible analysis of data from biology, social networks, and scientific simulations
Dan Goldwasser natural language processing and machine learning, with a specific interest on natural language semantics
Ananth Grama parallel and distributed computing architectures, algorithms, and applications
Ninghui Li F access control, trust management, security in distributed systems, applied cryptography
Hemanta Maji cryptography and algorithms; with special emphasis on secure computation and information-theoretic cryptography.
Lorenzo Martino service-oriented architectures, software as a service
Jennifer Neville data mining and machine learning for relational data, fraud detection, social networks
Kihong Park scalable qos provisioning in ip internets, self-similar and multimedia traffic control, and network security and fault-tolerance. his research is supported by grants from both government and industry, including nsf, darpa, and cerias
Mathias Payer research interests: system security, exploitation, sfi, and virtualization.
Chunyi Peng chunyi peng's research interests are in the broad areas of mobile networking, system and security, with a recent focus on 4g/5g mobile network architecture, protocols, and technologies for emerging/demanding applications, mobile network/system security, network data analytics, and mobile sensing and computing systems.
Sunil Prabhakar issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
Bruno Ribeiro data mining, network science, computer networks, statistical models & inference
Tiark Rompf applied and fundamental aspects of programming languages and compilers: language design, program analysis, program transformation, program generation and synthesis, type systems, semantics. pl technology in data
management, machine learning, and ai.
Gene Spafford F executive director emeritus, cerias. security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
Wojciech Szpankowski analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
Lin Tan software engineering, software dependability, defect detection and repair, and software text analytics
Mohammadkazem Taram microarchitectural attacks, high-performance mitigations, and architecture support for security and privacy
Dave (Jing) Tian embedded systems, operating systems, and trusted computing
Samuel Wagstaff F cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
Dongyan Xu F virtualization and security, cloud computing, malware defense, cyberinfrastructure, distributed systems
Xiaoqi Chen cloud security, communications security, cryptology -- hardware, software, algorithms, cyberphysical systems and iot, network security, operating systems, privacy, security of ai/ml, web services
Jamie Davis safety and security of software-centric systems
Edward Delp F digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
Vijay Gupta communications, networking, signal and image processing, power and energy systems, automatic controls
David Inouye deep distribution alignment
generative probabilistic models
explainable ai
invertible deep learning
iterative/local learning
distribution shift
James Krogmeier signal processing for wireless communications, adaptive filtering and equalization, synchronization, modulation and coding for nonlinear channels, intelligent transportation systems
Milind Kulkarni my research interests lie in the areas of programming languages, compilers and systems. specifically, i am interested in various language features, compiler techniques and run-time system support that will be necessary to unlock the potential of emerging, complex computation platforms such as multicore processors, heterogeneous architectures, sensor networks and distributed systems.
Xiaojun Lin power-grid reliability, renewable integration, demand response and distributed coordination, cyber-physical security for smart grid, communication networks, online algorithms
David Love communications theory, communication systems with feedback, coding theory, information theory, wireless communications, applications of subspace packings
Yung-Hsiang Lu yung-hsiang lu is a professor at the school of electrical and computer engineering and department of computer science. his research areas include computer vision, cloud computing, and big data. his research team is building a software infrastructure analyzing the vast amounts of video data from network cameras deployed worldwide. he is an acm distinguished scientist and speaker. he is the scientific adviser and a co-founder of perceive inc, a technology startup for video analytics. he received phd from stanford university.
Aravind Machiry program analysis, vulnerability detection, iot, trustzone, binary analysis, general system security, machine learning
Suranjan Panigrahi intelligent decison support systems using artificial intelligent techniques including machine learning
innovative products/processes for social challenges in low resource settings via interdisciplinary team approach
smart sensors/sensing systems for automation, quality control, detection and diagnosis applications
Philip Paré mathematical modeling of dynamic networked systems, e.g. epidemiological, biological, economic systems, infrastructure networks, social networks, etc.; stability analysis, control, and identifiability of such systems; model reduction of dynamic systems and clustering; biological applications of control theory
Xiaokang Qiu programming systems, including program logics, decision procedures, automated deduction, program verification, and program synthesis
Vijay Raghunathan wireless and ad hoc networks, sensor networks, intrusion detection, reliability
Sanjay Rao peer-to-peer system design, cloud systems, security issues in system migration
Shreyas Sen sensing and communication circuits/systems, energy-harvested sensor nodes for internet of things (iot), analog/rf, wireless, security, human body-coupled communication
Jeffrey Siskind artificial language, cognitive science, machine vision, computational linguistics, computer systems (including visual event perception, computational models of child language acquisition) and high performance compilation strategies for lisp.
Lu Su i am broadly interested in the general areas of internet of things, cyber-physical systems, wireless, mobile, and crowd sensing systems, big data and cloud computing, data mining and machine learning, as well as security and privacy.
Shreyas Sundaram analysis, design, and control of resilient and secure large-scale networked systems
Yiheng Feng developing innovative modeling techniques, control strategies, and evaluation methods with a focus on the interactions between smart transportation infrastructure and connected and automated vehicles (cavs) for the next generation transportation system
Satish Ukkusuri cyber-transportation modeling, interdependent resilience analysis, network science and network games
Guang Lin big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
Tzuong-Tsieng Moh public key cryptography, jacobian conjecture, and resolution of singularities
Guang Lin big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
Jitesh Panchal decision making in engineering design; secure co-design; mechanism design for systems engineering; complex networks; open innovation; crowdsourcing.
Hany Abdel-Khalik validation and uncertainty quantification;
big data analytics and data assimilation;
cyberattack-resilient control systems;
lwr computational reactor physics;
William Cleveland statistics, data visualization, machine learning,
massive datasets, computer networking, cybersecurity
Guang Lin big data analysis and statistical machine learning
predictive modeling and uncertainty quantification
scientific computing and computational fluid dynamics
stochastic multiscale modeling
Jennifer Neville data mining and machine learning for relational data, fraud detection, social networks
Mark Daniel Ward analysis and design of algorithms and data structures, analytic combinatorics, applied probability, asymptotics, data compression, game theory, information theory, pattern matching, probability theory, probability and analysis, random structures, random walk, symbolic computation, tree structures
Bowei Xi computer science and statistics (data mining, machine learning, computer networks, massive/high dimensional data, computational methods for statistics