Members
Research areas: Genomic and Health Data Privacy and Blockchain Technology, Social and Ethical Implications of Big Data and AI, Connected/Autonomous Vehicles, Privacy, and Cybersecurity, Robotics and Ethics, Privacy, Ethics, and Trust in Health Data and Intelligent Systems, China’s Innovative Technology and AI Policies, Cross-Cultural Long-distance Caregiving Read More
Research areas: Sensors & Signal Conditioning, Control Systems, Robotics, Medical Devices and Diagnostics, Applied Energy/Electro-mechanical Systems, Engineering Education Read More
Research areas: Power system modeling, analysis, control, optimization and economics, System vulnerability and resiliency assessment, Integration of renewable and distributed energy resources in a smart grid, microgrid, and market environment Read More
Research areas: Cyber threat intelligence. Cybersecurity automation, Application security, AI and cybersecurity Read More
My focus is on understanding how people’s security attitudes and social environments weigh in their decision to adopt – or not adopt – secure behaviors (such as sharing passwords securely or ignoring UX cues to scams and “fake news”). I employ a mix of qualitative and quantitative methods from social science, computer science, and design.
Dr. Liyue Fan’s research is at the intersection of data privacy and spatio-temporal databases. She was named one of the “Rising Stars in EECS” by MIT in 2015. Her recent research work has focused on developing privacy-preserving methods for computer vision, behavioral, and health data, by working with theoretically well-grounded privacy models such as differential […]
My research interests mainly span the security and privacy of Internet of Things and Artificial Intelligence. I am currently committed to carrying out research on securing Smart Home Systems (SHS) and Industrial Control Systems (ICS), which involve anomaly detection and vulnerability discovery.
My research is to advance the state of the art of formal methods for correctness and security of computer systems, especially cyber-physical systems (CPSs), and to develop tools and techniques to help construct systems that are correct and secure. Formal methods are crucial for security goals, because they can show that no attack strategy will […]
Research areas: Smart Grid Design, Renewable Energy Integration, Power Grid Modernization, Real-time Modeling and Control of Energy Systems and Devices, Energy Storage and Wind Energy Modeling and Control, Microgrid Management Read More
Research areas: Usable Security and Privacy – the intersection of Human Computer Interaction and information security and privacy Read More
Research areas: Data and text analytics, Knowledge discovery, Search behavior, and Interactive information retrieval Read More
Research areas: Business Analytics, Information Security, Digital economy, and Supply chain management Read More
Research areas: Statistics, Machine learning, Cybersecurity, Political forecasting, and Arms proliferation
Research areas: IoT security, Hardware security and trust, Supply chain risk management and security, Physical unclonable functions (PUF) based authentication, High performance computing and hardware accelerators design using FPGAs for small and resources constrained embedded electronic devices
Research areas: Reconfigurable Computing for High-Performance Systems Read More
Research areas: Information Privacy and Security, Access Control and Authentication, Usable Security and Privacy, Application Security Read More
Research areas: program analysis and verification, model-checking, in-lined reference monitoring (binary instrumentation), security policies, language design and analysis, program equivalence, language-based solutions for web, mobile security, and IoT security, program-proof co-development, security for cyber-physical systems Read More
Research interests: Network Security, Web Security, 5G Security, Cyber-physical System Security and IoT Security, Wireless Networking and Wireless Communication, Machine Learning for Cybersecurity, Trustworthy Machine Learning, and Adversarial Machine Learning