Research Expertise | Faculty |
Protocol Security Analysis | Kemal Akkaya, Jason Liu, S. S. Iyengar |
Systems Security Analysis | Ruimin Sun, Selcuk Uluagac, Raju Rangaswami, Mohammad Ashiqur Rahman, Amin Kharraz, S. S. Iyengar |
Formal Methods | Ruimin Sun, Jason Liu, Mohammad Ashiqur Rahman, S. S. Iyengar |
Malware Analysis | Ruimin Sun, Amin Kharraz, S. S. Iyengar, Selcuk Uluagac, Alexander Pons |
Cryptography | Hadi Amini, Tauhidur Rahman, S. S. Iyengar |
Information Theory | Fahrad Shirani, Sukumar Ganapati, Tauhidur Rahman, S. S. Iyengar |
Coding Theory | Fahrad Shirani, S. S. Iyengar |
Authentication | Kemal Akkaya, Selcuk Uluagac, Xuyu Wang, Christian Poellabauer, Amin Kharraz, Bogdan Carbunar, S. S. Iyengar |
Machine / Deep Learning | Kemal Akkaya, Selcuk Uluagac,Ruimin Sun, Xuyu Wang, Hadi Amini, Christian Poellabauer, Jason Liu, Mark Finlayson, Yanzhao Wu, Fahrad Shirani, Mohammad Ashiqur Rahman, Bogdan Carbunar, S. S. Iyengar, Julio Ibarra |
Game Theory | Kemal Akkaya, Xuyu Wang, Mohammad Ashiqur Rahman, S. S. Iyengar |
Social Engineering | Amin Kharraz, Selcuk Uluagac |
Reverse Engineering | Ruimin Sun, Tauhidur Rahman, Amin Kharraz, S. S. Iyengar, Alexander Pons |
Digital Forensics Process | Kemal Akkaya, Selcuk Uluagac, Alexander Pons, Raju Rangaswami, Amin Kharraz, S. S. Iyengar |
Hardware Security Analysis | Mohammad Ashiqur Rahman, Tauhidur Rahman, |
Differential Privacy | Xuyu Wang, Hadi Amini, Yanzhao Wu, Fahrad Shirani |
Secure Multi-party Computation | Kemal Akkaya, Fahrad Shirani |
Homomorphic Encryption | Kemal Akkaya |
Zero-Knowledge proofs | S. S. Iyengar |
LLMs | Ruimin Sun, Xuyu Wang, Mark Finlayson, Yanzhao Wu, Raju Rangaswami, Mohammad Ashiqur Rahman |
Consensus Algorithms | Hadi Amini, Fahrad Shirani, S. S. Iyengar |
Graph Theory | Kemal Akkaya, Hadi Amini, Fahrad Shirani, Amin Kharraz, S. S. Iyengar |
Usable Security/Privacy, User studies / surveys | Kemal Akkaya, Selcuk Uluagac, Ruimin Sun, Mark Finlayson, Sukumar Ganapati, S. S. Iyengar |
Organizational Behavior | Sukumar Ganapati, S. S. Iyengar, Donavon A. Johnson |
Natural Language Processing | Mark Finlayson |
Network Traffic Flow Analysis | Julio Ibarra |