Ph.D, University of California, Los Angeles, Computer Science (2013)
Chunyi Peng's research interests are in the broad areas of mobile networking, system and security, with a recent focus on 4G/5G mobile network architecture, protocols, and technologies for emerging/demanding applications, mobile network/system security, network data analytics, and mobile sensing and computing systems.
2022 ACM MobiCom Best Community Paper Award Runner-up
2022 ACM MobiCom Outstanding PC Member Award
2021 IEEE INFOCOM distinguished TPC Member
2019 Award from Google Android Security on reporting WiFi calling’s vulnerability
2018 NSF CAREER Award
2018 ACM MobiCom Best Demo Award
2018 IEEE CNS Best Paper Award
2017 ACM MobiCom Best Community Paper Award
2017 Facebook’s Bounty on reporting a vulnerability on SMS for Facebook
2016 ACM MobiCom Best Community Paper Award
2016 IEEE INFOCOM distinguished TPC Member
2015 Finalist for Qualcomm Innovation Fellowship (Co-mentor)
2013 Northrup-Grumman Outstanding Graduate Student Award, UCLA
2011 IBM Ph.D. Fellowship Award
2009 UCLA Chancellor’s Prize with Graduate Fellowship (2009-2011)
2008 ACM MobiSys Best Demo Award
2007 ACM SenSys Best Demo Award
2007 ACM MobiSys Best Demo Award
I am an Associate Professor in Dept. of Computer Science at Purdue University. Previously, I was an Assistant Professor in the Dept. of Computer Science and Engineering at the Ohio State University after I received my Ph.D. in Computer Science at University of California, Los Angeles. Prior to UCLA, I worked as an Associate/Assistant Researcher at Wireless Networking Group at Microsoft Research Asia. I received a M.Eng and B.Eng in Automation from Tsinghua University, both with highest honors. In the past, I held internships at IBM TJ Watson Research Center, Microsoft Research Redmond and Microsoft Research Asia.
My current research interests are in the broad areas of mobile networking, system and security, with a recent focus on renovating 5G/6G mobile network architecture/protocols/technologies, mobile network analytics, network verification, network security (real attacks and defense), and efficient visual sensing and computing for IoTs (mainly for drones).