Faculty & Research Staff


CERIAS involves over 100 researchers from across Purdue’s four campuses including 7 colleges and 25 departments.
F = CERIAS Fellow


Departments

Aeronautical Engineering

  • Dan DeLaurentis F
    design of systems of systems, situational awareness
  • Carolin Frueh
    situational awareness (satellites, debris and near earth objects, ground surveillance), object 3d formation from image/video (shape inversion), satellite guidance, navigation and control, astrodynamics, sensor tasking, low observability systems, information quantification and retrieval.
  • Inseok Hwang
    controlling multiple-vehicle systems, analysis of multiple dynamical systems which have inherently decentralized structures, path planning (computing optimal trajectories of vehicles from starting positions to destinations) and conflict detection and resolution
  • Shaoshuai Mou
    multi-agent networks; distributed control; uas cooperation; autonomy
  • Dengfeng Sun
    systems, control, and optimization; resilient cyber-physical systems; unmanned aerial vehicle systems; intelligent transportation systems.

Aviation and Transportation Technology

  • Mary Johnson
    sustainability analysis in aviation, aviation emissions analysis, aviation fuels testing and analysis, general aviation data analysis, strategic justification of technologies, and enterprise performance and improvement.
  • John Mott
    statistical process modeling and simulation, aviation applications of bayesian inference, acquisition and analysis of distributed transportation data

CERIAS

  • Lorraine Kisselburgh F
    communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in stem careers; digital identities

Communication

  • Josh Boyd
    online security communication, rhetorical theory and criticism, public relations, trust.
  • Sorin Matei
    collaborative implications of location aware technologies, on-line social interaction and communities.
  • Howard Sypher
    software diffusion, communication, time and technology, e-health web site usability, digital identity

Computer and Information Science (IUPUI)

  • Arjan Durresi
    networking & security
  • Xukai Zou
    communication networks and security, applied cryptography, security and reliability for grid computing, wireless network security

Computer and Information Technology

  • Smriti Bhatt
    cyber security and information assurance, security and privacy in cloud-enabled internet of things (ce-iot), access control and communication control models and architectures, cloud computing and internet of things (iot) security, cyber security education, stem education
  • Robert Deadman
    technology use in academic dishonesty detection and prevention, use of virtual networks and software defined networking
  • Tom Hacker
    high performance computer, grid computing, operating systems, and distributed systems
  • Nicole Hands
    application of basic cybersecurity principles of confidentiality, integrity and availability to cyber pedagogy (teaching best practices) as well as to academic honesty.
  • Umit Karabiyik
    digital forensics, cybersecurity, user and data privacy, artificial intelligence, computer and network security
  • James Lerums
    information security, cyber forensics, cyber security operations, social economic and legal aspects of information security, “right-sizing” cyber security solutions and implementations, cyber warfare, cyber risk, cyber exercises, physical security exercises
  • Deepak Nadig
    network security ai/ml applications to networking cloud-native infrastructure
  • Romila Pradhan
  • Phillip Rawles
    network systems administration, enterprise network management, and network application architectures
  • Marcus K. Rogers F
    psychological profiling, applied cyber-forensics, cyber-terrorism
  • Kathryn Seigfried-Spellar
    behavioral analysis of digital evidence personality & motivation of cyberdeviants code of ethics in digital forensics
  • John Springer
    biomedical high performance computing, biomedical information assurance and security
  • Wenhai Sun
    data security and privacy, decentralized trust and infrastructure, cyber-physical system security, and applied cryptography
  • Julia (Taylor) Rayz F
    natural language understanding, knowledge discovery and representation, computational recognition of salient information in texts, uncertainty management
  • Sudip Vhaduri
    leading interdisciplinary collaborative research teams consisting of researchers from a range of disciplines, including sociology, psychology, medical sciences, laryngology, otolaryngology, speech-language pathology, communication sciences and disorders, health sciences, behavioral sciences, statistics, mathematics, and electrical engineering
  • Jin Wei-Kocsis
    cyber-physical system cyber security artificial intelligence biologically inspired intelligent system design smart energy systems. cognitive networking design
  • Baijian "Justin" Yang
    information security, end system security, network security, security policies; mobile computing, distributed computing.

Computer and Information Technology (IUPUI)

  • Xiaonan Guo
    cyber security and privacy security in mobile devices iot security, intrusion detection using wifi for smart homes mobile healthcare and large data analysis on mobile devices
  • Connie Justice
    network security, security design, risk assessment
  • Feng Li
    network security, trust issues in networks, fault-tolerance

Computer Graphics Technology

  • Victor (Yingjie) Chen
    interactive systems, visual analytics, interactive information visualization, visual provenance
  • Nathan Hartman
    long-term archival (lotar) for cad data model-based definition graphics standards
  • David Whittinghill
    visualization, games, agent-based modeling, digital anti-tampering, robotics, pharmaceuticals, and web development

Computer Information Technology and Graphics (Calumet)

  • Ricardo Calix
    machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
  • Manghui "Michael" Tu
    information assurance, digital forensics, distributed computing, sustainable computing

Computer Sciences

  • Daniel Aliaga
    computer graphics, computer vision, visualization
  • Walid Aref
    database technologies for emerging applications, spatial/multimedia/genomics/sensor-based databases, data mining, scalable media servers, gis.
  • Mike Atallah F
    assurable software and architecture identification, authentication, privacy cryptology and rights management
  • Aniket Bera
    computer graphics, augmented intelligence, social robotics, autonomous agents, cognitive modeling
  • Bharat Bhargava F
    assurable software and architecture enclave and nework security identification, authentication, privacy
  • Antonio Bianchi
    computer security mobile security android binary analysis ctf
  • Jeremiah Blocki
    human authentication, cryptography, data privacy
  • Berkay Celik
    design and evaluation of security for software and systems, safety, security and privacy of iot systems.
  • William Cleveland
    statistics, data visualization, machine learning, massive datasets, computer networking, cybersecurity
  • Chris Clifton F
    privacy issues in information management, data mining, data security, database support for text, and heterogeneous databases.
  • Benjamin J Delaware
    program synthesis and verification, mechanized reasoning, verified systems software, decision procedures, advanced modularity
  • Sonia Fahmy
    network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
  • Pedro Fonseca
    operating systems, hypervisors and distributed systems
  • Christina Garman
    practical and applied cryptography, namely the design and analysis of real world cryptographic systems
  • David Gleich
    high performance and large scale computations with a focus on enabling previously infeasible analysis of data from biology, social networks, and scientific simulations
  • Dan Goldwasser
    natural language processing and machine learning, with a specific interest on natural language semantics
  • Ananth Grama
    parallel and distributed computing architectures, algorithms, and applications
  • Suresh Jagannathan
    programming languages - design, implementation, and analysis
  • Changhee Jung
    compilers and computer architecture with an emphasis on performance, reliability, and security
  • Aniket Kate
    privacy enhancing technologies, anonymity, accountability, applied cryptography, payment networks and cryptocurrencies, trusted computing, distributed trust, multi-party computation, post-quantum cryptography
  • Ninghui Li F
    access control, trust management, security in distributed systems, applied cryptography
  • Hemanta Maji
    cryptography and algorithms; with special emphasis on secure computation and information-theoretic cryptography.
  • Lorenzo Martino
    service-oriented architectures, software as a service
  • Jennifer Neville
    data mining and machine learning for relational data, fraud detection, social networks
  • Kihong Park
    scalable qos provisioning in ip internets, self-similar and multimedia traffic control, and network security and fault-tolerance. his research is supported by grants from both government and industry, including nsf, darpa, and cerias
  • Mathias Payer
    research interests: system security, exploitation, sfi, and virtualization.
  • Chunyi Peng
    chunyi peng's research interests are in the broad areas of mobile networking, system and security, with a recent focus on 4g/5g mobile network architecture, protocols, and technologies for emerging/demanding applications, mobile network/system security, network data analytics, and mobile sensing and computing systems.
  • Sunil Prabhakar
    issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
  • Bruno Ribeiro
    data mining, network science, computer networks, statistical models & inference
  • Tiark Rompf
    applied and fundamental aspects of programming languages and compilers: language design, program analysis, program transformation, program generation and synthesis, type systems, semantics. pl technology in data management, machine learning, and ai.
  • Roopsha Samanta
    program verification, repair and synthesis
  • Gene Spafford F
    executive director emeritus, cerias. security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
  • Wojciech Szpankowski
    analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
  • Lin Tan
    software engineering, software dependability, defect detection and repair, and software text analytics
  • Mohammadkazem Taram
    microarchitectural attacks, high-performance mitigations, and architecture support for security and privacy
  • Dave (Jing) Tian
    embedded systems, operating systems, and trusted computing
  • Samuel Wagstaff F
    cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
  • Dongyan Xu F
    virtualization and security, cloud computing, malware defense, cyberinfrastructure, distributed systems
  • Xiangyu Zhang
    software provenance, malware defense
  • Vassilis Zikas
    cryptography, computer security, blockchain technologies, cryptocurrencies, game theory, distributed computing

Electrical and Computer Engineering

  • Saurabh Bagchi F
    dependable distributed systems, network security, reliable high performance computing, embedded wireless networks, bioinformatics.
  • Peter Bermel
    several applications of nanophotonics, including photovoltaics, lighting, thermal physics, sources, detectors, and switches.
  • Christopher Brinton
    machine learning, artificial intelligence
  • Jamie Davis
    safety and security of software-centric systems
  • Edward Delp F
    digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
  • Jing Gao
    data mining and machine learning
  • Arif Ghafoor F
    parallel and distributed computing, and multimedia information systems
  • Zahra Ghodsi
    trustworthy machine learning, applied cryptography
  • Vijay Gupta
    communications, networking, signal and image processing, power and energy systems, automatic controls
  • David Inouye
    deep distribution alignment generative probabilistic models explainable ai invertible deep learning iterative/local learning distribution shift
  • James Krogmeier
    signal processing for wireless communications, adaptive filtering and equalization, synchronization, modulation and coding for nonlinear channels, intelligent transportation systems
  • Milind Kulkarni
    my research interests lie in the areas of programming languages, compilers and systems. specifically, i am interested in various language features, compiler techniques and run-time system support that will be necessary to unlock the potential of emerging, complex computation platforms such as multicore processors, heterogeneous architectures, sensor networks and distributed systems.
  • Xiaojun Lin
    power-grid reliability, renewable integration, demand response and distributed coordination, cyber-physical security for smart grid, communication networks, online algorithms
  • David Love
    communications theory, communication systems with feedback, coding theory, information theory, wireless communications, applications of subspace packings
  • Yung-Hsiang Lu
    yung-hsiang lu is a professor at the school of electrical and computer engineering and department of computer science. his research areas include computer vision, cloud computing, and big data. his research team is building a software infrastructure analyzing the vast amounts of video data from network cameras deployed worldwide. he is an acm distinguished scientist and speaker. he is the scientific adviser and a co-founder of perceive inc, a technology startup for video analytics. he received phd from stanford university.
  • Aravind Machiry
    program analysis, vulnerability detection, iot, trustzone, binary analysis, general system security, machine learning
  • Suranjan Panigrahi
    intelligent decison support systems using artificial intelligent techniques including machine learning innovative products/processes for social challenges in low resource settings via interdisciplinary team approach smart sensors/sensing systems for automation, quality control, detection and diagnosis applications
  • Philip Paré
    mathematical modeling of dynamic networked systems, e.g. epidemiological, biological, economic systems, infrastructure networks, social networks, etc.; stability analysis, control, and identifiability of such systems; model reduction of dynamic systems and clustering; biological applications of control theory
  • Xiaokang Qiu
    programming systems, including program logics, decision procedures, automated deduction, program verification, and program synthesis
  • Vijay Raghunathan
    wireless and ad hoc networks, sensor networks, intrusion detection, reliability
  • Sanjay Rao
    peer-to-peer system design, cloud systems, security issues in system migration
  • Shreyas Sen
    sensing and communication circuits/systems, energy-harvested sensor nodes for internet of things (iot), analog/rf, wireless, security, human body-coupled communication
  • Jeffrey Siskind
    artificial language, cognitive science, machine vision, computational linguistics, computer systems (including visual event perception, computational models of child language acquisition) and high performance compilation strategies for lisp.
  • Lu Su
    i am broadly interested in the general areas of internet of things, cyber-physical systems, wireless, mobile, and crowd sensing systems, big data and cloud computing, data mining and machine learning, as well as security and privacy.
  • Shreyas Sundaram
    analysis, design, and control of resilient and secure large-scale networked systems
  • Santiago Torres-Arias
    iot security, software supply chain security, cloud security, applied crypto
  • T.N. Vijaykumar
    computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.
  • Chih-Chun Wang
    network coding, coding theory, information and communication theory, signal processing, control theory

Engineering Technology

English

History

  • Ekaterina Babintseva
    history of science and technology and the intersections of human sciences and computing

Industrial Engineering

  • Vaneet Aggarwal
    cloud computing, video streaming, communications and networking, machine learning, and smart grids.
  • Barrett Caldwell
    situational awareness, privacy, critical infrastructure protection, human factors
  • Shimon Nof
    computer-supported integration and collaboration of distributed work
  • Brandon Pitts
    cognitive ergonomics, human-automation interaction, multimodal/multisensory information processing, adaptive displays, aging and technology
  • Yu She
    robotics, mechanism design, tactile perception
  • Wenzhuo Wu
    nanomanufacturing, self-powered nanosystems, renewable energy, human-integrated technologies, smart sensors and electronics
  • Yuehwern Yih
    health supply chains, machine learning and artificial intelligence

Linguistics

  • Victor Raskin F
    computational linguistics, ontological semantics, meaning-based search, steganography

Lyles School of Civil Engineering

  • Yiheng Feng
    developing innovative modeling techniques, control strategies, and evaluation methods with a focus on the interactions between smart transportation infrastructure and connected and automated vehicles (cavs) for the next generation transportation system
  • Satish Ukkusuri
    cyber-transportation modeling, interdependent resilience analysis, network science and network games

Management

  • Bradley Alge
    human/technology interaction, employer/employee rights, strategic human resources, individuals as self-regulators
  • Alok Chaturvedi
    homeland security simulations (e.g., "measured response"), synthetic environments, tera-scale grid computing, computational models of human behaviors, enterprise systems, artificial intelligence applications in manufacturing, machine learning, and visualization of business data.
  • Roy Dejoie
    social/ethical/legal issues, group support systems, collaborative technologies

Math

  • Guang Lin
    big data analysis and statistical machine learning predictive modeling and uncertainty quantification scientific computing and computational fluid dynamics stochastic multiscale modeling
  • Tzuong-Tsieng Moh
    public key cryptography, jacobian conjecture, and resolution of singularities

Mechanical Engineering

  • Guang Lin
    big data analysis and statistical machine learning predictive modeling and uncertainty quantification scientific computing and computational fluid dynamics stochastic multiscale modeling
  • Jitesh Panchal
    decision making in engineering design; secure co-design; mechanism design for systems engineering; complex networks; open innovation; crowdsourcing.

Nuclear Engineering

  • Hany Abdel-Khalik
    validation and uncertainty quantification; big data analytics and data assimilation; cyberattack-resilient control systems; lwr computational reactor physics;
  • Lefteri Tsoukalas
    intelligent systems and control methodologies

Psychological Sciences

Sociology

  • James Anderson F
    use of information technology in health care, e-healthcare, aids/std prevention

Statistics

  • William Cleveland
    statistics, data visualization, machine learning, massive datasets, computer networking, cybersecurity
  • Guang Lin
    big data analysis and statistical machine learning predictive modeling and uncertainty quantification scientific computing and computational fluid dynamics stochastic multiscale modeling
  • Jennifer Neville
    data mining and machine learning for relational data, fraud detection, social networks
  • Mark Daniel Ward
    analysis and design of algorithms and data structures, analytic combinatorics, applied probability, asymptotics, data compression, game theory, information theory, pattern matching, probability theory, probability and analysis, random structures, random walk, symbolic computation, tree structures
  • Bowei Xi
    computer science and statistics (data mining, machine learning, computer networks, massive/high dimensional data, computational methods for statistics

Technology Leadership & Innovation

  • Mesut Akdere
    human resource development leadership development stem workforce development
  • Sabine Brunswicker
    social analytics & social data visualization, social computing, smart energy & blockchain
  • Stephen Elliott F
    biometrics, signature verification, mobile computing, electronic and mobile commerce logistics and supply chain management

Coming Up!

Our annual security symposium will be March 28th and 29th, 2023.
Purdue University, West Lafayette, IN

More Information