Faculty & Professional Staff


Aeronautical Engineering

CERIAS

  • Randy Bond
    Managing Director
  • Joel Rasmus
    Director of Strategic Relations
  • Gene Spafford F
    Executive Director, CERIAS. Security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage

Communication

  • Josh Boyd
    teaches classes in and chairs the area of Public Affairs and Issue Management, and he studies corporate rhetoric
  • Hyunyi Cho
  • Lorraine Kisselburgh F
    communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in STEM careers; digital identities
  • Sorin Matei
    Collaborative implications of location aware technologies, On-line social interaction and communities.
  • Howard Sypher

Computer and Information Science (IUPUI)

  • Xukai Zou
    Communication networks and security, Applied cryptography, Security and reliability for Grid Computing, Wireless network security

Computer and Information Technology

  • Melissa Dark F
    post-secondary education, curriculum development, faculty development, training, information security
  • Eric Dietz
    Homeland Security, Intelligence and Decision Making IT, Risk Management with Critical Infrastructure
  • Tom Hacker
    High Performance Computer, Grid Computing, Operating Systems, and Distributed Systems
  • Samuel Liles
  • Phillip Rawles
    network systems administration, enterprise network management, and network application architectures
  • Marc Rogers F
    Psychological Profiling, Applied Cyber-forensics, Cyber-terrorism
  • John Springer
  • Julia Taylor F
    Natural Language Understanding, Knowledge Discovery and Representation, Computational Recognition of Salient Information in Texts, Uncertainty Management
  • Baijian "Justin" Yang
    Information Security, End system security, network security, security policies; mobile computing, distributed computing.

Computer and Information Technology (IUPUI)

  • Connie Justice
    Network security, Security design, Risk Assessment
  • Feng Li
    Network Security, Trust issues in networks, Fault-tolerance

Computer Graphics Technology

Computer Information Technology and Graphics (Calumet)

  • Ricardo Calix
    machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
  • Manghui "Michael" Tu
    Information Assurance, Digital Forensics, Distributed Computing, Sustainable Computing

Computer Sciences

  • Daniel Aliaga
  • Walid Aref
    developing database technologies for emerging applications, e.g., privacy preservation, spatial, multimedia, genomics, and sensor-based databases.
  • Mike Atallah F
    information security (in particular, software security, secure protocols, and watermarking).
  • Elisa Bertino F
    information security, privacy, trust negotiation
  • Bharat Bhargava F
    theoretical and experimental studies in distributed systems
  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Chris Clifton F
    data mining, data security, database support for text, and heterogeneous databases
  • Ahmed Elmagarmid
    applications of database technology to telemedicine, digital government, and electric power management
  • Patrick Eugster
    languages, system support, and algorithms for secure and reliable programming in distributed setttings
  • Sonia Fahmy
    network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
  • Ananth Grama
    parallel and distributed computing architectures, algorithms, and applications
  • Antony Hosking
    programming languages and database systems, focusing on the integration of language and database functionality for efficient data management.
  • J. Tim Korb
  • Ninghui Li F
    computer security and applied cryptography
  • Lorenzo Martino
    Service-oriented architectures, software as a service
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Cristina Nita-Rotaru F
    Secure Group Communication, Security in Ad Hoc Wireless Networks, Secure Overlay Networks, Access Control and Authentication for Groups, Secure and Scalable Distributed Systems.
  • Kihong Park
    scalable QoS provisioning in IP internets, self-similar and multimedia traffic control, and network security and fault-tolerance. His research is supported by grants from both government and industry, including NSF, DARPA, and CERIAS
  • Sunil Prabhakar
    issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
  • Luo Si
    information retrieval, machine learning, text mining, speech and multimedia processing, data mining and privacy preservation, federated search (distributed information retrieval), probabilistic models for information filtering, and text/data mining for life science
  • Gene Spafford F
    Executive Director, CERIAS. Security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
  • Wojciech Szpankowski
    analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
  • Samuel Wagstaff F
    cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
  • Dongyan Xu F
    Virtualization and security, Cloud computing, Malware defense, Cyberinfrastructure, Distributed Systems
  • Xiangyu Zhang
    software provenance, malware defense

Electrical and Computer Engineering

  • Saurabh Bagchi F
    network security, intrusion tolerance, covert channels
  • Edward Delp F
    Digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
  • David Ebert
    Visual analytics, Visualization, Homeland Security
  • Arif Ghafoor F
    parallel and distributed computing, and multimedia information systems
  • Robert Givan
    machine planning, machine learning, knowledge representation, stochastic modeling, and automated reasoning
  • David Love
  • Vijay Raghunathan
    wireless and ad hoc networks, sensor networks, intrusion detection, reliability
  • Sanjay Rao
    Peer-to-peer System Design, Cloud systems, Security issues in system migration
  • Jeffrey Siskind
  • T.N. Vijaykumar
    computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.

Engineering Technology

English

Industrial Engineering

  • Barrett Caldwell
    Situational awareness, privacy, critical infrastructure protection, human factors
  • Shimon Nof
    computer-supported integration and collaboration of distributed work

ITaP

  • Pascal Meunier
    Vulnerability analysis, virtualization, automated computer security management, intrusion detection, secure testbeds, formal methods

Linguistics

  • Victor Raskin F
    Computational linguistics, Ontological Semantics, Meaning-based search, Steganography

Management

  • Bradley Alge
    Human/Technology Interaction, Employer/Employee Rights, Strategic human resources, Individuals as Self-Regulators
  • Alok Chaturvedi
    artificial intelligence applications in manufacturing, machine learning, and stereoscopic and immersive visualization of business data
  • Roy Dejoie
  • Karthik Kannan F
    Economics of Information Security, Vulnerability and Breach Disclosure, Policy Development
  • Jackie (Rees) Ulmer F
    Information Security Policy, Risk Assessment, Artificial Intelligence, Genetic Algorithms, Data Mining, Machine Learning.

Math

Nuclear Engineering

Nursing

Political Science

Psychological Sciences

Sociology

  • James Anderson F
    Use of Information technology in health care, E-Healthcare, AIDS/STD Prevention

Statistics

  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Bowei Xi

Technology

  • Ioannis Papapanagiotou
    Ioannis Papapanagiotou received the Dipl.Ing. degree in Electrical and Computer Engineering from the University of Patras, Greece in 2006. The M.Sc. degree and dual Ph.D. degrees in Computer Engineering and Operations Research from North Carolina State University in 2009 and 2012, respectively. He has been awarded the best paper awards in IEEE GLOBECOM 2007 and IEEE CAMAD 2010. He is also the recipient of the IBM PhD Fellowship, Academy of Athens and A. Metzelopoulos scholarships. He is currently an Assistant Professor in the department of Computer and Information Technology at Purdue University. Before this, he spent 3 years with the IBM Software and Research teams working in the Emerging Technology Institute, an in-house incubator team reporting to the WebSphere CTO and Chief Strategist.

Technology Leadership & Innovation

  • Stephen Elliott F
    Biometrics, Signature Verification, Mobile Computing, Electronic and Mobile Commerce Logistics and Supply Chain Management
  • Linda Naimi
    Ethics, Law
  • Mihaela Vorvoreanu
    Socio-cultural impacts of new and emerging communication technologies; Social media; Web 2.0