Faculty & Research Staff

Aeronautical Engineering

  • Dan DeLaurentis F
    Design of Systems of Systems, Situational Awareness
  • Carolin Frueh
    Situational Awareness (satellites, debris and near earth objects, ground surveillance), Object 3D formation from image/video (shape inversion), Satellite Guidance, Navigation and Control, Astrodynamics, Sensor Tasking, Low Observability Systems, Information Quantification and Retrieval.
  • Inseok Hwang
  • Shaoshuai Mou
    Multi-Agent Networks; Distributed Control; UAS Cooperation; Autonomy
  • Dengfeng Sun


  • Lorraine Kisselburgh F
    communication and emerging technologies; privacy in social contexts; geolocational privacy; privacy and security policy; social networks; collaboration in networks; gender in STEM careers; digital identities


  • Josh Boyd
    teaches classes in and chairs the area of Public Affairs and Issue Management, and he studies corporate rhetoric
  • Sorin Matei
    Collaborative implications of location aware technologies, On-line social interaction and communities.
  • Howard Sypher

Computer and Information Science (IUPUI)

  • Xukai Zou
    Communication networks and security, Applied cryptography, Security and reliability for Grid Computing, Wireless network security

Computer and Information Technology

Computer and Information Technology (IUPUI)

Computer Graphics Technology

Computer Information Technology and Graphics (Calumet)

  • Ricardo Calix
    machine learning, automatic understanding of human behavior, biometrics, intrusion detection systems, and natural language processing
  • Manghui "Michael" Tu
    Information Assurance, Digital Forensics, Distributed Computing, Sustainable Computing

Computer Sciences

  • Daniel Aliaga
  • Walid Aref
    developing database technologies for emerging applications, e.g., privacy preservation, spatial, multimedia, genomics, and sensor-based databases.
  • Mike Atallah F
    information security (in particular, software security, secure protocols, and watermarking).
  • Elisa Bertino F
    information security, privacy, trust negotiation
  • Bharat Bhargava F
    theoretical and experimental studies in distributed systems
  • Jeremiah Blocki
  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Chris Clifton F
    data mining, data security, database support for text, and heterogeneous databases
  • Benjamin J Delaware
  • Sonia Fahmy
    network security, including network monitoring, detection of distributed denial of service attacks, and firewall testing
  • Christina Garman
  • David Gleich
  • Dan Goldwasser
  • Ananth Grama
    parallel and distributed computing architectures, algorithms, and applications
  • Suresh Jagannathan
  • Aniket Kate
  • Byoungyoung Lee
  • Ninghui Li F
    computer security and applied cryptography
  • Lorenzo Martino
    Service-oriented architectures, software as a service
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Kihong Park
    scalable QoS provisioning in IP internets, self-similar and multimedia traffic control, and network security and fault-tolerance. His research is supported by grants from both government and industry, including NSF, DARPA, and CERIAS
  • Mathias Payer
    Research interests: system security, exploitation, SFI, and virtualization.
  • Sunil Prabhakar
    issues in large-scale, distributed applications such as multimedia databases, data warehouses, and digital libraries
  • Bruno Ribeiro
  • Tiark Rompf
  • Gene Spafford F
    Executive Director, CERIAS. Security policy, intrusion detection and response, security architecture, computer forensics, vulnerability analysis, counterintelligence/counterespionage
  • Wojciech Szpankowski
    analysis of algorithms, data compression, information theory, analytic combinatorics, random structures, networking, stability problems in distributed systems, modeling of computer systems and computer communication networks, queueing theory, and operations research
  • Lin Tan
  • Samuel Wagstaff F
    cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms.
  • Patrick Wolfe
  • Dongyan Xu F
    Virtualization and security, Cloud computing, Malware defense, Cyberinfrastructure, Distributed Systems
  • Xiangyu Zhang
    software provenance, malware defense

Electrical and Computer Engineering

  • Saurabh Bagchi F
    network security, intrusion tolerance, covert channels
  • Peter Bermel
  • Edward Delp F
    Digital forensics, steganography, image and video compression, multimedia security, medical imaging, multimedia systems, communication and information theory.
  • David Ebert
    Visual analytics, Visualization, Homeland Security
  • Arif Ghafoor F
    parallel and distributed computing, and multimedia information systems
  • Robert Givan
    machine planning, machine learning, knowledge representation, stochastic modeling, and automated reasoning
  • James Krogmeier
  • Milind Kulkarni
  • Xiaojun Lin
    power-grid reliability, renewable integration, demand response and distributed coordination, cyber-physical security for smart grid, communication networks, online algorithms
  • David Love
  • Yung-Hsiang Lu
    Yung-Hsiang Lu is a professor at the School of Electrical and Computer Engineering and Department of Computer Science. His research areas include computer vision, cloud computing, and big data. His research team is building a software infrastructure analyzing the vast amounts of video data from network cameras deployed worldwide. He is an ACM distinguished scientist and speaker. He is the scientific adviser and a co-founder of Perceive Inc, a technology startup for video analytics. He received PhD from Stanford University.
  • Vijay Raghunathan
    wireless and ad hoc networks, sensor networks, intrusion detection, reliability
  • Sanjay Rao
    Peer-to-peer System Design, Cloud systems, Security issues in system migration
  • Shreyas Sen
  • Jeffrey Siskind
  • Shreyas Sundaram
    Analysis, design, and control of resilient and secure large-scale networked systems
  • T.N. Vijaykumar
    computer architecture with emphasis on microarchitectures of general-purpose, high-performance microprocessors.

Engineering Technology


Industrial Engineering


  • Greg Hedrick
  • Pascal Meunier
    Vulnerability analysis, virtualization, automated computer security management, intrusion detection, secure testbeds, formal methods


  • Victor Raskin F
    Computational linguistics, Ontological Semantics, Meaning-based search, Steganography


  • Bradley Alge
    Human/Technology Interaction, Employer/Employee Rights, Strategic human resources, Individuals as Self-Regulators
  • Alok Chaturvedi
    artificial intelligence applications in manufacturing, machine learning, and stereoscopic and immersive visualization of business data
  • Roy Dejoie
  • Karthik Kannan F
    Economics of Information Security, Vulnerability and Breach Disclosure, Policy Development


Mechanical Engineering

  • Jitesh Panchal
    Decision making in engineering design; Secure Co-Design; Mechanism design for systems engineering; Complex networks; Open innovation; Crowdsourcing.

Nuclear Engineering

Psychological Sciences


  • James Anderson F
    Use of Information technology in health care, E-Healthcare, AIDS/STD Prevention


  • William Cleveland
    Statistics, Data Visualization, Machine Learning, Massive Datasets, Computer Networking, Cybersecurity
  • Jennifer Neville
    Data mining and machine learning for relational data, fraud detection, social networks
  • Bowei Xi

Technology Leadership & Innovation

  • Stephen Elliott F
    Biometrics, Signature Verification, Mobile Computing, Electronic and Mobile Commerce Logistics and Supply Chain Management
  • Mihaela Vorvoreanu
    Socio-cultural impacts of new and emerging communication technologies; Social media; Web 2.0