Faculty & Research Staff
CERIAS involves over
100 researchers from across Purdue’s four campuses including
7 colleges and
25 departments.
F = CERIAS Fellow
-
Abdel-Khalik, Hany
-
Aggarwal, Vaneet
-
Akdere, Mesut
-
Alge, Bradley
-
Aliaga, Daniel
-
Anderson, James
F
-
Aref, Walid
-
Atallah, Mike
F
-
Bagchi, Saurabh
F
-
Bermel, Peter
-
Bhargava, Bharat
F
-
Bhatt, Smriti
-
Bianchi, Antonio
-
Blocki, Jeremiah
-
Boyd, Josh
-
Brinton, Christopher
-
Brunswicker, Sabine
-
Caldwell, Barrett
-
Calix, Ricardo
-
Celik, Berkay
-
Chaturvedi, Alok
-
Chen, Victor (Yingjie)
-
Cleveland, William
-
Clifton, Chris
F
-
Davis, Jamie
-
Deadman, Robert
-
Dejoie, Roy
-
DeLaurentis, Dan
F
-
Delaware, Benjamin J
-
Delp, Edward
F
-
Elliott, Stephen
F
-
Evans, Jeffrey
-
Fahmy, Sonia
-
Feng, Yiheng
-
Fonseca, Pedro
-
Frueh, Carolin
-
Gao, Jing
-
Garman, Christina
-
Ghafoor, Arif
F
-
Gleich, David
-
Goldwasser, Dan
-
Grama, Ananth
-
Guo, Xiaonan
-
Hacker, Tom
-
Hands, Nicole
-
Hartman, Nathan
-
Hwang, Inseok
-
Inouye, David
-
Jagannathan, Suresh
-
Johnson, Mary
-
Jung, Changhee
-
Justice, Connie
-
Kannan, Karthik
F
-
Karabiyik, Umit
-
Kate, Aniket
-
Kisselburgh, Lorraine
F
-
Krogmeier, James
-
Kulkarni, Milind
-
Lee, Byoungyoung
-
Lerums, James
-
Li, Feng
-
Li, Ninghui
F
-
Li, Yeni
-
Lin, Guang
-
Lin, Xiaojun
-
Love, David
-
Lu, Yung-Hsiang
-
Machiry, Aravind
-
Maji, Hemanta
-
Martino, Lorenzo
-
Matei, Sorin
-
Meunier, Pascal
-
Moh, Tzuong-Tsieng
-
Mott, John
-
Mou, Shaoshuai
-
Nadig, Deepak
-
Nan, Yuhong
-
Neville, Jennifer
-
Ngambeki, Busiime Ida
-
Nof, Shimon
-
Panchal, Jitesh
-
Panigrahi, Suranjan
-
Paré, Philip
-
Park, Kihong
-
Payer, Mathias
-
Peng, Chunyi
-
Pitts, Brandon
-
Prabhakar, Sunil
-
Pradhan, Romila
-
Proctor, Robert
F
-
Raghunathan, Vijay
-
Rao, Sanjay
-
Raskin, Victor
F
-
Rawles, Phillip
-
Ribeiro, Bruno
-
Rogers, Marcus K.
F
-
Rompf, Tiark
-
Salvo, Michael
-
Samanta, Roopsha
-
Seigfried-Spellar, Kathryn
-
Sen, Shreyas
-
She, Yu
-
Siskind, Jeffrey
-
Spafford, Gene
F
-
Springer, John
-
Su, Lu
-
Sun, Dengfeng
-
Sun, Wenhai
-
Sundaram, Shreyas
-
Sypher, Howard
-
Szpankowski, Wojciech
-
Tan, Lin
-
(Taylor) Rayz, Julia
F
-
Tian, Dave (Jing)
-
Torres-Arias, Santiago
-
Tsoukalas, Lefteri
-
Tu, Manghui "Michael"
-
Ukkusuri, Satish
-
Vhaduri, Sudip
-
Vijaykumar, T.N.
-
Wagstaff, Samuel
F
-
Wang, Chih-Chun
-
Ward, Mark Daniel
-
Wei-Kocsis, Jin
-
Whittinghill, David
-
Wolfe, Patrick
-
Wu, Wenzhuo
-
Xi, Bowei
-
Xu, Dongyan
F
-
Yang, Baijian "Justin"
-
Zhang, Xiangyu
-
Zikas, Vassilis
-
Zou, Xukai
Departments
-
Dan DeLaurentis
F
Design of Systems of Systems, Situational Awareness
-
Carolin Frueh
Situational Awareness (satellites, debris and near earth objects, ground surveillance), Object 3D formation from image/video (shape inversion), Satellite Guidance, Navigation and Control, Astrodynamics, Sensor Tasking, Low Observability Systems, Information Quantification and Retrieval.
-
Inseok Hwang
-
Shaoshuai Mou
Multi-Agent Networks; Distributed Control; UAS Cooperation; Autonomy
-
Dengfeng Sun
-
Lorraine Kisselburgh
F
Communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in STEM careers; digital identities
-
Josh Boyd
teaches classes in and chairs the area of Public Affairs and Issue Management, and he studies corporate rhetoric
-
Sorin Matei
Collaborative implications of location aware technologies, On-line social interaction and communities.
-
Howard Sypher
-
Xukai Zou
Communication networks and security, Applied cryptography, Security and reliability for Grid Computing, Wireless network security
-
Smriti Bhatt
Cyber Security and Information Assurance, Security and Privacy in Cloud-Enabled Internet of Things (CE-IoT), Access Control and Communication Control Models and Architectures, Cloud Computing and Internet of Things (IoT) Security, Cyber Security Education, STEM Education
-
Robert Deadman
-
Tom Hacker
High Performance Computer, Grid Computing, Operating Systems, and Distributed Systems
-
Nicole Hands
-
Umit Karabiyik
-
James Lerums
-
Deepak Nadig
-
Busiime Ida Ngambeki
Use of information technology in education and policy
-
Romila Pradhan
-
Phillip Rawles
network systems administration, enterprise network management, and network application architectures
-
Marcus K. Rogers
F
Psychological Profiling, Applied Cyber-forensics,
Cyber-terrorism
-
Kathryn Seigfried-Spellar
-
John Springer
-
Wenhai Sun
-
Julia (Taylor) Rayz
F
Natural Language Understanding, Knowledge Discovery and Representation, Computational Recognition of Salient Information in Texts, Uncertainty Management
-
Sudip Vhaduri
-
Jin Wei-Kocsis
-
Baijian "Justin" Yang
Information Security, End system security, network security, security policies; mobile computing, distributed computing.
-
Ricardo Calix
machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
-
Manghui "Michael" Tu
Information Assurance, Digital Forensics, Distributed Computing, Sustainable Computing
-
Daniel Aliaga
-
Walid Aref
developing database technologies for emerging applications, e.g., privacy preservation, spatial, multimedia, genomics, and sensor-based databases.
-
Mike Atallah
F
information security (in particular, software security, secure protocols, and watermarking).
-
Bharat Bhargava
F
theoretical and experimental studies in distributed systems
-
Antonio Bianchi
-
Jeremiah Blocki
-
Berkay Celik
-
William Cleveland
Statistics, Data Visualization, Machine Learning,
Massive Datasets, Computer Networking, Cybersecurity
-
Chris Clifton
F
data mining, data security, database support for text, and heterogeneous databases
-
Benjamin J Delaware
-
Sonia Fahmy
network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
-
Pedro Fonseca
-
Christina Garman
-
David Gleich
-
Dan Goldwasser
-
Ananth Grama
parallel and distributed computing architectures, algorithms, and applications
-
Suresh Jagannathan
-
Changhee Jung
-
Aniket Kate
-
Byoungyoung Lee
-
Ninghui Li
F
computer security and applied cryptography
-
Hemanta Maji
Cryptography and Algorithms; with special emphasis on Secure Computation and Information-theoretic Cryptography.
-
Lorenzo Martino
Service-oriented architectures, software as a service
-
Yuhong Nan
-
Jennifer Neville
Data mining and machine learning for relational data, fraud detection, social networks
-
Kihong Park
scalable QoS provisioning in IP internets, self-similar and multimedia traffic control, and network security and fault-tolerance. His research is supported by grants from both government and industry, including NSF, DARPA, and CERIAS
-
Mathias Payer
Research interests: system security, exploitation, SFI, and virtualization.
-
Chunyi Peng
-
Sunil Prabhakar
issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
-
Bruno Ribeiro
-
Tiark Rompf
-
Roopsha Samanta
-
Gene Spafford
F
Executive Director, CERIAS. Security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
-
Wojciech Szpankowski
analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
-
Lin Tan
-
Dave (Jing) Tian
-
Samuel Wagstaff
F
cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
-
Patrick Wolfe
-
Dongyan Xu
F
Virtualization and security, Cloud computing, Malware defense, Cyberinfrastructure, Distributed Systems
-
Xiangyu Zhang
software provenance, malware defense
-
Vassilis Zikas
Cryptography, Computer Security, Blockchain Technologies, Cryptocurrencies, Game Theory, Distributed Computing
-
Saurabh Bagchi
F
network security, intrusion tolerance, covert channels
-
Peter Bermel
-
Christopher Brinton
-
Jamie Davis
-
Edward Delp
F
Digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
-
Jing Gao
Data mining and Machine Learning
-
Arif Ghafoor
F
parallel and distributed computing, and multimedia information systems
-
David Inouye
-
James Krogmeier
-
Milind Kulkarni
-
Xiaojun Lin
power-grid reliability, renewable integration, demand response and distributed coordination, cyber-physical security for smart grid, communication networks, online algorithms
-
David Love
-
Yung-Hsiang Lu
Yung-Hsiang Lu is a professor at the School of Electrical and Computer Engineering and Department of Computer Science. His research areas include computer vision, cloud computing, and big data. His research team is building a software infrastructure analyzing the vast amounts of video data from network cameras deployed worldwide. He is an ACM distinguished scientist and speaker. He is the scientific adviser and a co-founder of Perceive Inc, a technology startup for video analytics. He received PhD from Stanford University.
-
Aravind Machiry
Program analysis, vulnerability detection, IoT, Trustzone, Binary Analysis, general System Security, machine learning
-
Suranjan Panigrahi
-
Philip Paré
-
Vijay Raghunathan
wireless and ad hoc networks, sensor networks, intrusion detection, reliability
-
Sanjay Rao
Peer-to-peer System Design, Cloud systems, Security issues in system migration
-
Shreyas Sen
-
Jeffrey Siskind
-
Lu Su
-
Shreyas Sundaram
Analysis, design, and control of resilient and secure large-scale networked systems
-
Santiago Torres-Arias
IoT Security, Software Supply Chain Security, Cloud Security, Applied Crypto
-
T.N. Vijaykumar
computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.
-
Chih-Chun Wang
Network coding, Coding Theory, Information and Communication Theory, Signal Processing, Control Theory
-
Pascal Meunier
Vulnerability analysis, virtualization, automated computer security management, intrusion detection, secure testbeds, formal methods
-
Victor Raskin
F
Computational linguistics, Ontological Semantics, Meaning-based search, Steganography
-
Bradley Alge
Human/Technology Interaction, Employer/Employee Rights, Strategic human resources, Individuals as Self-Regulators
-
Alok Chaturvedi
artificial intelligence applications in manufacturing, machine learning, and stereoscopic and immersive visualization of business data
-
Roy Dejoie
-
Karthik Kannan
F
Economics of Information Security, Vulnerability and Breach Disclosure, Policy Development
-
Guang Lin
-
Jitesh Panchal
Decision making in engineering design; Secure Co-Design; Mechanism design for systems engineering; Complex networks; Open innovation; Crowdsourcing.
-
James Anderson
F
Use of Information technology in health care, E-Healthcare, AIDS/STD Prevention