PhD Students
Current PhD Students:
Former PhD Students:
- Leila Karimi
- Jinlai Xu
- Runhua Xu
- Chao Li
- Nathalie Baracaldo
- Xuelian Long
- Lei Jin
- Tanapat Anusas-amornkul
- Carlos E. Caicedo
- Chalermpol Charnsripinyo
- Yu Liu
- Chutima Prommak
- Phongsak Prasithsangaree
- Nattapong Swangmuang
- Hassan Takabi
- Yipeng Wang
- Yue Zhang
- Amirreza Masoumadeh
- Saman Taghavi Zargar
Former Postdocs:
- Youna Jung (PhD, Ajou University, Korea)
- Minsoo Kim (PhD, Ajou University, Korea)
IA-Related PhD Dissertations (More...)
- H. Takabi, "A Semantic Based Policy Management Framework for Cloud Computing Environments", Ph.D. Information Science, University of Pittsburgh, defended Jul. 12, 2013
- Y. Zhang, "An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments", Ph.D. Information Science, University of Pittsburgh, defended Nov. 4, 2010.
- K. Panyim, "Secure Connectivity Through Key Predistribution Under Jamming Attacks in Ad Hoc and Sensor Networks," Ph.D. Telecommunications, University of Pittsburgh, defended September 2010.
- T. Hayajneh, "Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks," Ph.D. Telecommunications, University of Pittsburgh, defended August 2009.
- P. Prasithsangaree, "Energy Efficient Security Framework for Mobile Wireless Environments," defended April 2005
- B. Sapsomboon, "Shared Defect Detection: The Effects of Annotations in Asynchronous Software Inspection," Ph.D. Information Science, University of Pittsburgh, 2000.
- C. Charnsripinyo, "Design of Survivable Wireless Access Networks," Ph.D. Telecommunications, University of Pittsburgh, defended Sept. 29, 2003.
- Y. Liu, "Spare Capacity Allocation: Model, Analysis and Algorithms," Ph.D. Telecommunications, University of Pittsburgh, defended Dec. 2001.
- B. Jager, "Traffic Restoration in Survivable Wide Area Communication Networks," Ph.D. Informatics, University of Bergen, Bergen, Norway (co-advisor), Sept., 2000.
- A. Al-Rumaih, "A Spare Capacity Planning Methodology for Wide Area Survivable Networks," Ph.D. Information Science, University of Pittsburgh, defended May 1999.
Current Students:
Education
- Ph.D. Student, Information Sciences, University of Pittsburgh
- M.S., Information Science, Middle East Technical University, Turkey
- B.S., Industrial Engineering, TOBB University of Economics and Technology, Turkey
- B.S., Economics, TOBB University of Economics and Technology, Turkey
Interests
Nuray's research interests include, but are not limited to:
- Big Data Security
- Access Control
- Malware Detection
- Machine Learning and Data Mining
Contact
nub2justignorethis@nospampleasepitt.edu
Education
- Ph.D. Student, Information Sciences, University of Pittsburgh
- M.S., Information Science, University of Pittsburgh
- B.S., Information Technology, Qassim University
Interests
Abdulrahman's research interests include, but are not limited to:
- Metaverse & Digital Twins
- Data Security
- Blockchain
- Integer Factorization
Contact
aba70justignorethis@nospampleasepitt.edu
Education
- Ph.D. Student, Information Sciences, University of Pittsburgh
- M.S.,Statistics, National University of Singapore
- B.S., Economics, Nanjing Audit University
Interests
Ying's research interests include, but are not limited to:
- Data Privacy
- Algorithmic Fairness
- Network Science
- Causal Reasoning
Contact
yis121justignorethis@nospampleasepitt.edu
Education
- Ph.D. Student, Information Sciences, University of Pittsburgh
- M.S Information Science, University of Pittsburgh
- B.E Computer Science & Technology, Zhengzhou University
Interests
Jingzhe's research interests include, but are not limited to:
- Distributed System
- Optimization
- Information Security & Privacy
- Blockchain
Contact
jiw148justignorethis@nospampleasepitt.edu
Education
- Ph.D. Student, Information Science and Technology, University of Pittsburgh
- M.S., Information Science, University of Pittsburgh
- B.S., Information Security, Chengdu Univ of Tech, China
Interests
Peilin's research interests include, but are not limited to:
- AI-powered Security
- Quantum Computing
- Cryptography
Contact
peilin.he@pitt.edu