DANFENG (DAPHNE) YAO
|
|
|
- Arron Gibson
- 10 years ago
- Views:
Transcription
1 RESEARCH INTERESTS DANFENG (DAPHNE) YAO Network and system security and assurance, including anomaly detection in networked systems and programs, system integrity, malware program analysis, security of mobile systems, cyberphysical system security, usable Internet of Things security and privacy, botnet detection, data exfiltration prevention; Human behaviors in cybersecurity and cybersecurity education. EDUCATION Ph.D., Computer Science, Brown University, Providence, RI 2007 Thesis: Privacy-aware Authentication and Authorization in Trust Management Advisor: Roberto Tamassia, Plastech Professor of Computer Science. M.S., Computer Science, Indiana University, Bloomington, IN 2002 M.A., Chemistry, Princeton University, Princeton, NJ 2000 B.S., Chemistry, Peking University, Beijing, China 1998 EMPLOYMENT Department of Computer Science, Virginia Tech, Blacksburg VA Associate Professor and L-3 Faculty Fellow Associate editor for IEEE Transactions on Dependable and Secure Computing Jun Present Jul Present Department of Computer Science and Engineering, Jan Jul University of California, San Diego Sabbatical Department of Computer Science, Virginia Tech, Blacksburg VA Jan May 2014 Assistant Professor Department of Computer Science, Rutgers University, New Brunswick, NJ Jan Dec Assistant Professor Department of Computer Science, Brown University Aug Dec Research assistant (With Roberto Tamassia, Plastech Professor) CERIAS, Purdue University, West Lafayette IN Sep Dec Visiting scholar (With Professor Elisa Bertino and Mikhail J. Atallah) HP Systems Security Lab, Princeton, NJ May 2006 Aug Research intern (With Dr. Stuart Haber) IAM Technology Inc., Providence, RI Apr May Consultant (With David Croston, CEO) Center of Genomics and Bioinformatics, Indiana University, Bloomington May Aug Research assistant (With Dr. Donald Gilbert) HONORS AND AWARDS Nomination for Elizabeth and James Turner Fellowship, Virginia Tech CoE Dec L-3 Communications Cyber Faculty Fellow Oct Young Investigator Award, Army Research Office Aug Outstanding New Assistant Professor Award, Virginia Tech College of Engineering Feb CAREER Award, National Science Foundation Jan Best Paper Awards ICNP 12, CollaborateCom 10, ICICS 06 Best Poster Awards ACM CODASPY 15, WOCC 09 Award for Technological Innovation, Brown University Apr University Fellowship, Brown University Sep Graduate with the Highest Honors, Peking University Jul SONY, IEC and Outstanding Student Fellowships, Peking University
2 PATENTS 1. Stuart Haber, William Horne, Tomas Sander, and Danfeng Yao. Integrity Verification of Pseudonymized Documents. Filed by HP Labs. Sep U.S. Patent No. 8,266, Danfeng Yao, Deian Stefan, and Chehai Wu. Systems and Methods for Malware Detection. Filed by Rutgers University. U.S. Patent No. 8,763,127. Jun Danfeng Yao and Hao Zhang. Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery. Continuation-in-Part (CIP) Patent forthcoming. Filed by Virginia Tech. 14/267,422. Jul SELECT MEDIA REPORTS 1. Featured news in Communications of ACM on program anomaly detection. Jan HPC Wire, Government Security News on detecting stealth attacks with program anomaly detection. Oct new-research-method-identifies-stealth-attacks-on-complicated-computer-systems/ 3. Computer World, TMC Net, IT Weekly Newsletter on causality-based insider threat detection. Oct researcher-builds-system-to-protect-against-malicious-insiders.html 4. Data-leak detection research highlight by Software Security Engineering Research Center (S2ERC), a NSF I/UCRC. Aug NSF, HPC Wire, Examiner, Federal Computer Week on network traffic causality reasoning for detecting stealthy malware activities. Jun vt-unveils-approach-detect-malicious-software-networked-computers-data/ malware-protection-based-on-semantic-reasoning-proven-successful 6. Phys.org, and Supercomputing Online on quantitative anomaly detection and award-winning network traffic analysis work. Mar virginia-techs-danfeng-yao-awarded from-onr-to-improve-cy.html virginia-techs-danfeng-yao-awarded from-onr-to-improve-cyber-security 7. International Business Times, Homeland Security News Wires, PHYSORG (United Kingdom) on our award-winning keystroke dynamic security work. Nov tech-malware-hacking-virginia-tech-hackers-computer-security.htm keystroke-biometric-solution-will-protect-against-hacking 2
3 8. NSF news and ACM Technews on our activity-based authentication. Nov TEACHING Computer Science Department Virginia Tech CS/ECE 5984 System and Application Security. Spring 2015 I created CS/ECE 5984 (permanent number CS/ECE 5590), which is the first graduate-level system and application security course at VT. CS6204 Recent Advances in System and Application Security. Spring 2014 CS/ECE 4264 Principles of Computer Security. Fall 2015, 2014, 2013 I created CS/ECE 4264, which is the first undergraduate-level course on foundations of computer security at VT. CS4984 Introduction to Computer Security. Fall 2012, 2011, 2010 CS3114 Data Structures and Algorithms. Spring 2012 CS6204 Recent Advances in Cyber Security. Spring 2012 CS5984 Theory and Practice of Web Security and Privacy. Spring 2011 CS6204 Advanced Computer Security and Privacy Spring 2010 Computer Science Department Rutgers University CS673 Recent Advances in Computer Security Fall 2009 CS672 Information Security Fall 2008 CS352 Internet Technology Spring 2008, Spring 2009 CS500:04 Light Seminar: Secure Information Sharing Spring 2008 GRANTS FUNDED Total personal share (including gifts): $2.35 million. 1. Rutgers University Pervasive Computing Initiative. Secure and Flexible Information Sharing for Crisis Communication in Pervasive Computing Environments. PI: Danfeng Yao. Co-PI: James Garnett. $50,000. Mar Feb Personal share: $40, National Science Foundation. CT - ISG: ROME: Robust Measurement in Sensor Networks. PI: Yanyong Zhang. Co-PI: Danfeng Yao and Hui Xiong. $400,000. Sep Aug Personal share: $133, Rutgers University Academic Excellence Fund. The Rutgers University Research Initiative on Cybersecurity Economics (RICE). PI: Rebecca Wright. Co-PIs: Vijay Atluri, Richard McLean, and Danfeng Yao. $60,000. Jun May Personal share: $15, Department of Homeland Security. Center of Excellence for Command, Control and Interoperability. PI: Fred Roberts. Danfeng Yao is among the Rutgers researchers. Aug Jul Personal share: $40, National Science Foundation. CAREER: Human-Behavior Driven Malware Detection. PI: Danfeng Yao. $530,000. Feb Jan Personal share: $530, Virginia Tech. VT College of Engineering CAREER Incentive Grant. PI: Danfeng Yao. $16,000. Apr Present. 7. Army Research Office. Exploring Personalized Security With Novel Learning Techniques for Host-Based Anomaly Detection. PI: Danfeng Yao. $50,000. May April Personal share: $50,000. 3
4 8. Virginia Tech ICTAS. Novel Games for Analyzing Cyber-Security Behaviors: An Interdisciplinary Approach. $60,000. PI: Danfeng Yao. Co-PI: Scott Geller and Manuel Perez-Quinones. Jul Jun Personal share: $45, National Science Foundation. Cyber Security Industry/University Cooperative Research Center. PI: T. Charles Clancy. Co-PIs: Danfeng Yao, Joseph Tront, Michael Hsiao, and Jung-Min Park. Aug Jul Awarded amount: $149,940 (as of Sep. 2013). Personal share: $ Security and Software Engineering Research Center (S2ERC). User-Centric Dependency Analysis in Programs for Identifying Malware. $40,000. PI: Danfeng Yao. Jan Dec Personal share: $40, National Science Foundation (NSF). REU Supplemental Fund. $16,000. PI: Danfeng Yao. $16,000. Apr Mar Personal share: $16, Office of Naval Research (ONR). Real-Time Anomaly Detection and Quantitative Assurance for Securing Systems. PI: Danfeng Yao. $450,000. Jan Dec Personal share: $450, Security and Software Engineering Research Center (S2ERC). Detection of Data Exfiltration in Enterprise Environments. $38,643. PI: Danfeng Yao. May May Personal share: $38, Security and Software Engineering Research Center (S2ERC). Advanced Dependence Analysis For Android Malware Classification. $30,000. PI: Danfeng Yao. Co-PI: Barbara G. Ryder. Jul Jun Personal share: $26, VT Ted and Karyn HUME Center for National Security and Technology and L-3 Communications. Causality-Based Traffic Reasoning Methodology for Proactive Network Defense and Mission Assurance. PI: Danfeng Yao. $40,900. Apr Security and Software Engineering Research Center (S2ERC). Cloud-based Screening of Massive Data for Security Leaks in Enterprise Environments. $40,000. PI: Danfeng Yao. Aug Jul Army Research Office Young Investigator Program. Causality-Based Traffic Reasoning for Securing Large-Scale Networks. PI: Danfeng Yao. $150,000. Aug Aug Virginia Tech. Eminent Scholar Salary Supplement through L-3 Faculty Fellowship. PI: Danfeng Yao. $5,000 per year. Sep present. 19. Virginia Tech. College of Engineering Incentive Grant for Expanding Graduate Enrollment. PI: Danfeng Yao. $34,000. Sep May Defense Advanced Research Projects Agency (DARPA). Detection of Malware Collusion with Static Dependence Analysis on Inter-App Communication. PI: Danfeng Yao, Co-PI: Barbara Ryder. $430,000. Mar May National Science Foundation CRISP program. CRISP Type 2: Collaborative Research: Towards Resilient Smart Cities. Walid Saad (PI) (VT ECE), Danfeng Yao is among the VT co-pis. $1,100,000. Personal share: $206,347. Jan Dec GIFT FUNDS RECEIVED 1. From Northrop Grumman. to support undergraduate research in cyber security. PI: Danfeng Yao. $10,000 in 2010, $10,000 in 2011, $5,000 in 2012, 2013, Personal share: $35,000. 4
5 JOURNALS 1. Hao Zhang, Danfeng Yao, Naren Ramakrishnan, and Zhibin Zhang. Causality Reasoning about Network Events for Detecting Stealthy Malware Activities. Computers & Security. Conditional accept. 2. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng. Fast Detection of Transformed Data Leaks. IEEE Transactions on Information Forensics & Security (TIFS). To appear. Nov Shorter version received Best Poster Award at ACM CODASPY Hussain Almohri, Layne T. Watson, Danfeng Yao, and Xinming Ou. Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. IEEE Transactions on Secure and Dependable Computing (TDSC). To appear. Mar Xiaokui Shu, Danfeng Yao, and Elisa Bertino. Privacy-Preserving Detection of Sensitive Data Exposure with Applications to Data-Leak Detection as a Service. IEEE Transactions on Information Forensics & Security (TIFS). 10(5) May Karim O. Elish, Xiaokui Shu, Danfeng Yao, Barbara Ryder, and Xuxian Jiang. Dependency-Based Static Program Profiling for Android Malware Detection. Computers & Security. 49, March, Hussain Almohri, Danfeng Yao, and Dennis Kafura. Process Authentication for High System Assurance. IEEE Transactions on Dependable and Secure Computing (TDSC). 11(2), March/April Kui Xu, Patrick Butler, Sudip Saha, and Danfeng Yao. DNS for Massive-Scale Command and Control. IEEE Transactions on Dependable and Secure Computing (TDSC). 10(3), May/June Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, and Danfeng Yao. Data-Provenance Verification For Secure Hosts. IEEE Transactions on Dependable and Secure Computing (TDSC). 9(2), March/April Deian Stefan, Xiaokui Shu, and Danfeng Yao. Robustness of Keystroke-Dynamics Based Biometrics Against Synthetic Forgeries. Computers & Security. 31(1), Elsevier. 10. Jerry Rick Ramstetter, Yaling Yang, and Danfeng Yao. Applications and Security of Next-Generation User-Centric Wireless Systems. Future Internet, Special Issue on Security for Next Generation Wireless and Decentralized Systems. Editors: Ralf Steinmetz and André Koenig. Jun Invited paper. 11. Qian Yang, Danfeng Yao, Kaitlyn Muller, and James Garnett. Using a Trust Inference Model for Flexible and Controlled Information Sharing During Crises. Journal of Contingencies and Crisis Management. 18(4), Dec Wiley-Blackwell. 12. Roberto Tamassia, Danfeng Yao, and William H. Winsborough. Independently-Verifiable Decentralized Role-Based Delegation. IEEE Transactions on Systems, Man, and Cybernetics, Part A. 40(6), Nov Danfeng Yao and Roberto Tamassia. Compact and Anonymous Role-Based Authorization Chain. ACM Transactions on Information and System Security (TISSEC). 12(3) Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao. Notarized Federated Identity Management for Increased Trust in Web Services. Journal of Computer Security, 16(4): Danfeng Yao, Keith Frikken, Mike Atallah, Roberto Tamassia. Private Information: To Reveal or Not To Reveal. ACM Transactions on Information and System Security (TISSEC). 12(1) Feb
6 16. Yunhua Koglin, Danfeng Yao, and Elisa Bertino. Secure Content Distribution by Parallel Processing from Cooperative Intermediaries. IEEE Transactions on Parallel and Distributed Systems (TPDS). 19(5): BOOK CHAPTERS 1. Xiaokui Shu, Fang Liu, and Danfeng Yao. Rapid Screening of Big Data Against Inadvertent Leaks. In Big Data: Theories, Applications and Concepts. Editors: Shui Yu and Song Guo. Springer. Accepted. Jul Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya. Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes. In Cryptology and Information Security Series on Identity-Based Cryptography. Editors: Marc Joye and Gregory Neven. IOS Press. Oct PEER-REVIEWED CONFERENCES/WORKSHOPS 1. Xiaodong Yu, Wu-chun Feng, Danfeng Yao, and Michela Becchi. O3FA: A Scalable, Finite Automata-based, Pattern-Matching Engine for Out-of-Order Packet Inspection in IDS. In Proceedings of The 12th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 16). Santa Clara, CA. Mar (Acceptance rate: 21%). 2. Xiaokui Shu, Nikolay Laptev, and Danfeng Yao. DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution. In Proceedings of 19th International Conference on Extending Database Technology (EDBT), co-located with International Conference on Database Theory (ICDT). Mar., Bordeaux, France. 3. Xiaokui Shu, Danfeng Yao, and Barbara Ryder. A Formal Framework for Program Anomaly Detection. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Kyoto, Japan. Nov (Acceptance rate: 23.5%.) 4. Xiaokui Shu, Danfeng Yao, and Naren Ramakrishnan. Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS). Denver, Colorado. Oct (Acceptance rate: 19.8%.) 5. Kui Xu, Danfeng Yao, Barbara Ryder, and Ke Tian. Probabilistic Program Modeling for High-Precision Anomaly Classification. In Proceedings of the 2015 IEEE Computer Security Foundations Symposium (CSF). Verona, Italy. Jul (Acceptance rate: 35%.) 6. Karim Elish, Danfeng Yao, and Barbara Ryder. Static Characterization of Pairwise Android Inter-Component Communications for Collusion Detection. In Proceedings of Mobile Security Technologies (MoST), in conjunction with the IEEE Symposium on Security and Privacy. San Jose, CA. May (Acceptance rate: 30%) 7. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng. Rapid and Parallel Content Screening for Detecting Transformed Data Exposure. In Proceedings of the International Workshop on Security and Privacy in Big Data (BigSecurity), co-located with IEEE INFOCOM. Hong Kong. April, (Acceptance rate: 26%) 8. Hao Zhang, Maoyuan Sun, Danfeng Yao, and Chris North. Visualizing Traffic Causality for Analyzing Network Anomalies. In Proceedings of International Workshop on Security and Privacy Analytics (SPA), co-located with ACM CODASPY. San Antonio, TX. Mar Fang Liu, Xiaokui Shu, Danfeng Yao, and Ali Butt. Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce. In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Mar (Acceptance rate: 21%) 6
7 10. Yanzhi Dou, Kexiong (Curtis) Zeng, Yaling Yang, and Danfeng Yao. MadeCR: Correlation-based Malware Detection for Cognitive Radio. In Proceedings of IEEE Conference on Computer Communications (INFOCOM). Hong Kong. Apr (Acceptance rate: 19%) 11. Britton Wolfe, Karim Elish, and Danfeng Yao. High Precision Screening for Android Malware with Dimensionality Reduction. In Proceedings of the 13th International Conference on Machine Learning and Applications (ICMLA 14). Detroit, MI. Dec (Acceptance rate: 35%) 12. Kui Xu, Danfeng Yao, Manuel A. Perez-Quinones, Casey Link, and E. Scott Geller. Role-Playing Games for Security Evaluation: A Case Study on Secrecy. In Proceedings of 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014). Miami, FL. Oct (Acceptance rate: 20%). 13. Britton Wolfe, Karim Elish, and Danfeng Yao. Comprehensive Behavior Profiling for Proactive Android Malware Detection. In Proceedings of the 7th International Conference on Information Security (ISC). Hong Kong. Oct Lecture Notes in Computer Science (LNCS) 8783, (Acceptance rate: 19%). 14. Hao Zhang, Danfeng Yao and Naren Ramakrishnan. Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan. Jun (Acceptance rate: 20%). 15. Hussain Almohri, Danfeng Yao, and Dennis Kafura. DroidBarrier: Know What is Executing on Your Android. In Proceedings of the ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Mar (Acceptance rate: 23.5%). 16. Xiaokui Shu, John Smiy, Danfeng Yao, and Heshan Lin. Massive Distributed and Parallel Log Analysis For Organizational Security. In Proceedings of the First International Workshop on Security and Privacy in Big Data (BigSecurity), in conjunct with Globecom. Atlanta, GA. Dec (Acceptance rate: 35%). 17. Huijun Xiong, Qingji Zheng, Xinwen Zhang, and Danfeng Yao. CloudSafe: Securing Data Processing within Vulnerable Virtualization Environment in Cloud. In Proceedings of the IEEE Conference on Communications and Network Security (CNS). Washington, D.C. Oct (Acceptance rate: 28%) 18. Karim Elish, Yipan Deng, Danfeng Yao and Dennis Kafura. Device-Based Isolation for Securing Cryptographic Keys. In Proceedings of the 3rd International Symposium on Internet of Ubiquitous and Pervasive Things (IUPT). Halifax, Canada. Jun Yipeng Wang, Xiaochun Yun, M. Zubair Shafiq, Alex X. Liu, Zhibin Zhang, Liyan Wang, Danfeng Yao, Yongzheng Zhang, and Li Guo. A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols. In Proceedings of 20th IEEE International Conference on Network Protocols (ICNP). Austin, TX. Oct Best Paper Award. (Acceptance rate: 23%). 20. Xiaokui Shu and Danfeng Yao. Data Leak Detection As a Service. In Proceedings of the 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM). Padua, Italy. Sep (Acceptance rate: 29%). 21. Hao Zhang, William Banick, Danfeng Yao and Naren Ramakrishnan. User Intention-Based Traffic Dependence Analysis For Anomaly Detection. In Proceedings of Workshop on Semantics and Security, in conjunction with the IEEE Symposium on Security and Privacy. San Francisco, CA. May Karim O. Elish, Danfeng Yao, and Barbara G. Ryder. User-Centric Dependence Analysis For Identifying Malicious Mobile Apps. In Proceedings of the Workshop on Mobile Security Technologies (MoST), in conjunction with the IEEE Symposium on Security and Privacy. San Francisco, CA. May
8 23. Hussain Almohri, Danfeng Yao, and Dennis Kafura. Identifying Native Applications With High Assurance. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Feb (Acceptance rate: 25%). 24. Huijun Xiong, Xinwen Zhang, Wei Zhu, and Danfeng Yao. Towards End-to-End Secure Content Storage and Delivery with Public Cloud. In Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY). San Antonio, TX. Feb (Acceptance rate: 25%). 25. Kui Xu, Danfeng Yao, Qiang Ma, and Alex Crowell. Detecting Infection Onset With Behavior-Based Policies. In Proceedings of the International Conference on Network and System Security (NSS). Pages Milan, Italy. Sep (Acceptance rate: 22%). 26. Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy. K2C: Cryptographic Cloud Storage With Lazy Revocation and Anonymous Access. In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Volume 96, Part 2, Sep London, UK. Springer. (Acceptance rate: 24%). 27. Huijun Xiong, Xinwen Zhang, Wei Zhu and Danfeng Yao. CloudSeal: End-to-End Content Protection in Cloud-based Storage and Delivery Services. In Proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks (SecureComm). Lecture Notes in Computer Science (LNCS). Sep London, UK. (Acceptance rate: 37%). 28. Patrick Butler, Kui Xu, and Danfeng Yao. Quantitatively Analyzing Stealthy Communication Channels. In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS). Lecture Notes in Computer Science. Jun Nerja, Spain. (Acceptance rate: 18%) 29. Yipeng Wang, Zhibin Zhang, Danfeng Yao, Buyun Qu, and Li Guo. Inferring Protocol-State Machine from Network Traces: A Probabilistic Description Method. In Proceedings of International Conference on Applied Cryptography and Network Security (ACNS). Lecture Notes in Computer Science. Jun (Acceptance rate: 18%). 30. Deian Stefan and Danfeng Yao. Keystroke-Dynamics Authentication Against Synthetic Forgeries. In Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Chicago, IL. Nov Best Paper Award. (Acceptance rate: 38%). 31. Deian Stefan, Chehai Wu, Danfeng Yao, and Gang Xu. Knowing Where Your Input is From: Kernel-Level Data-Provenance Verification. In Proceedings of the 8th International Conference on Applied Cryptography and Network Security (ACNS). Pages Beijing China. Jun., (Acceptance rate: 23%). 32. Chih-Cheng Chang, Brian Thompson, Hui Wang, Danfeng Yao. Towards Publishing Recommendation Data With Predictive Anonymization. In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS) Apr Beijing, China. (Acceptance rate: 23%). 33. Huijun Xiong, Prateek Malhotra, Deian Stefan, Chehai Wu, and Danfeng Yao. User-Assisted Host-Based Detection of Outbound Malware Traffic. In Proceedings of International Conference on Information and Communications Security (ICICS 09). Pages Beijing, P.R. China. Dec Lecture Notes in Computer Science Springer. (Acceptance rate 19%). 34. Nitya H. Vyas, Anna Squicciarini, Chih-Cheng Chang, and Danfeng Yao. Towards Automatic Privacy Management in Web 2.0 with Semantic Analysis on Annotations. In Proceedings of International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Washington DC. Nov (Acceptance rate: 34.6%). 8
9 35. Anitra Babic, Huijun Xiong, Danfeng Yao, and Liviu Iftode. Building Robust Authentication Systems With Activity-Based Personal Questions. In Proceedings of ACM Workshop on Assurable & Usable Security Configuration (SafeConfig). Collocated with the ACM Conference on Computer and Communications Security. Chicago, IL. Nov Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy. Privacy-aware Identity Management for Client-side Mashup Applications. In Proceedings of the Fifth ACM Workshop on Digital Identity Management (DIM). Collocated with the ACM Conference on Computer and Communications Security. Chicago, IL. Nov Pages Brian Thompson, Danfeng Yao, Stuart Haber, William G. Horne, and Tomas Sander. Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. In Proceedings of the 9th Privacy Enhancing Technologies Symposium (PETS). Seattle, WA. Aug Lecture Notes in Computer Science Pages (Acceptance rate: 25.6%). 38. Tzvika Chumash and Danfeng Yao. Detection and Prevention of Insider Threats in Database Driven Web Services In Proceedings of The Third IFIP WG International Conference on Trust Management (IFIPTM). Pages Jun West Lafayette, IN. 39. Brian Thompson and Danfeng Yao. Union-Split Clustering Algorithm and Social Network Anonymization. In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS). Pages Mar Sydney, Australia. (Acceptance rate: 27%). 40. Tuan Phan and Danfeng Yao. SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. In Proceedings of the International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom). Nov., Orlando, FL. (Acceptance rate: 37%). Invited paper. 41. Saman Zarandioon, Danfeng Yao, and Vinod Ganapathy. Design and Implementation of an Open Framework for Secure Communication in Mashup Applications. In Proceedings of Annual Computer Security Applications Conference (ACSAC). Dec. 8-12, 2008, Anaheim, CA. Pages (Acceptance rate: 24.3%). 42. Vivek Pathak, Danfeng Yao, and Liviu Iftode. Securing Location Aware Services Over VANET Using Geographical Secure Path Routing. In Proceedings of International Conference on Vehicular Electronics and Safety (ICVES). Columbus, Ohio. September 22-24, Vivek Pathak, Danfeng Yao, and Liviu Iftode. Improving Trustworthiness through Social-Group Key Authentication. Proceedings of the Fifth Conference on and Anti-Spam (CEAS). Microsoft Research Silicon Valley, Mountain View, California. Aug 21-22, Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezuka, and Danfeng Yao. Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In Proceedings of ACM Symposium on Information, Computer & Communication Security (ASIACCS). Pages Mar (Acceptance rate: 25.2%). 45. Danfeng Yao, Roberto Tamassia, and Seth Proctor. Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust. In Proceedings of IFIPTM 2007 Joint itrust and PST Conferences on Privacy, Trust Management and Security. Moncton, New Brunswick, Canada. Jul Isabel F. Cruz, Roberto Tamassia, and Danfeng Yao. Privacy-Preserving Schema Matching Using Mutual Information. In Proceedings of the 21th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 07) Redondo Beach, CA. Jul Danfeng Yao, Yunhua Koglin, Elisa Bertino, and Roberto Tamassia. Decentralized Authorization and Data Security in Web Content Delivery. In Proceedings of the 22nd ACM Symposium on Applied 9
10 Computing (SAC 07), Special Track on Web Technologies ACM Press. Seoul, Korea. Mar Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, and Roberto Tamassia. Point-Based Trust: Define How Much Privacy Is Worth. In Proceedings of the Eighth International Conference on Information and Communications Security (ICICS 06). LNCS 4307, pages Springer. Raleigh, NC. Dec Best Student Paper Award. (Acceptance rate: 32%). 49. Danfeng Yao and Roberto Tamassia. Cascaded Authorization with Anonymous-Signer Aggregate Signatures. In Proceedings of the Seventh Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop (IAW 06). West Point, NY. Jun Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao. Notarized Federated Identity Management for Increased Trust in Web Services. In Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 06). LNCS 4127, pages Springer. Sophia Antipolis, France. Jul Danfeng Yao, Michael Shin, Roberto Tamassia, and William H. Winsborough. Visualization of Automated Trust Negotiation. In Proceedings of the Workshop on Visualization for Computer Security (VizSEC 05) in Conjunction with Vis 2005 and InfoVis Pages IEEE Press. Minneapolis, MN. Oct Danfeng Yao, Roberto Tamassia, and Seth Proctor. On Improving the Performance of Role-Based Cascaded Delegation in Ubiquitous Computing. In Proceedings of the IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 05). Pages IEEE Press. Athens, Greece. Sep (Acceptance rate: 25%). 53. Michael T. Goodrich, Roberto Tamassia, and Danfeng Yao. Accredited DomainKeys: A Service Architecture for Improved Validation. In Proceedings of the Second Conference on and Anti-Spam (CEAS 05). Stanford University, CA. Jul Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, and Anna Lysyanskaya. ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 04). Pages ACM Press. Washington, DC, Oct (Acceptance rate: 18%). 55. Roberto Tamassia, Danfeng Yao, and William H. Winsborough. Role-Based Cascaded Delegation. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT 04). Pages ACM Press. Yorktown Heights, NY, Jun (Acceptance rate: 27%). Google Scholar: NON-PEER-REVIEWED PUBLICATIONS 1. Xiaokui Shu, Nikolay Laptev, and Danfeng Yao. DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Revolution. The Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16). Extended abstract. Phoenix, AZ. Feb Zilong Wang, Danfeng Yao, and Rongquan Feng. Adaptive Key Protection in Complex Cryptosystems with Attributes. IACR Cryptology eprint Archive 2012: 136 (2012). 3. Kui Xu, Qiang Ma, and Danfeng Yao. Detecting the Onset of Infection for Secure Hosts. In Proceedings of the 13th International Symposium On Recent Advances in Intrusion Detection (RAID). Extended abstract. Ottawa, Ontario, Canada. Sep Personal Anomaly Detection and Smart-Phone Security. Huijun Xiong, Danfeng Yao, Lu Han, and Liviu Iftode. In Proceedings of Virginia Tech Annual Symposium on Wireless Communication. June Blacksburg VA. 10
11 5. Huijun Xiong and Danfeng Yao. Characterization of Individual Usage Patterns in Organizational Wireless Networks - A Case Study. In Proceedings of The Eighteenth Wireless and Optical Communications Conference (WOCC). May, 2009, Newark, NJ. 6. Danfeng Yao. An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing. In Proceedings of International Conference on Security and Management (SAM). Pages Las Vegas, NV. July, Stuart Haber, William G. Horne, Tomas Sander, and Danfeng Yao. Privacy-preserving verification of aggregate queries on outsourced database. Research Disclosure. 528: Kenneth Mason Publications. SELECT PRESENTATIONS 1. Detection of Malware Collusion with Static Dependence Analysis on Inter-App Communication. DARPA APAC PI Meeting. Tampa, FL. Oct Probabilistic Program Modeling for High-Precision Anomaly Classification. IEEE CSF. Verona, Italy. Jul Precise Modeling of Benign Program Behaviors for Proactive System Defense. Brown University Computer Science Department Systems Reading Group. Providence, RI. Nov Storytelling Security: Causal-Analysis For Proactive Defense. Grace Hopper Conference (GHC). Oct Phoenix, AZ. 5. Inter-Component and Inter-App Communication Analysis in Android For Advanced Malware Detection. NSF I/UCRC S2ERC Showcase. May Washington D.C. 6. Precise Modeling of Benign Program Behaviors for Proactive System Defense. Apr Departmental seminar. Texas A&M University. College Station, TX. 7. Data Leak Detection in Enterprise Environments. NSF I/UCRC S2ERC Showcase. Nov Pensacola, FL. 8. Advanced Program Analysis for Android App Classification. NSF I/UCRC S2ERC Showcase. Nov Pensacola, FL. 9. Probabilistic Program Modeling for Anomaly Detection. IEEE Security & Privacy Symposium. Short talk. San Francisco. May User-Intention Based Program Analysis for Security. IEEE Security & Privacy Symposium. Short talk. San Francisco. May User-Intention Based Anomaly Detection. Virginia Tech, Department of Electrical and Computer Engineering, Center for Embedded Systems for Critical Applications (CESCA). May User-Intention Based Anomaly Detection. Departmental seminar. Department of Computer Science. Kansas State University. Apr User-Intention Based Anomaly Detection For Cyber Security. 37th annual meeting of the SIAM Southeastern Atlantic Section. Oak Ridge National Lab. Mar User-Intention Based Anomaly Detection. Departmental seminar. Department of Computer Science. University of California, Irvine. Feb User-Intention Based Anomaly Detection. Tianjin University, China. College of Computing. Jun
12 16. User-Intention Based Anomaly Detection and Malware Analysis. Verisign Labs. Reston, VA. Jul Distributed Detection of Data Exfiltration in Enterprise Environments. Security Software and Engineering Research Center Showcase. Arlington, VA. May User-Centric Dependence Analysis in Programs For Identifying Malware. Security Software and Engineering Research Center Showcase. Ames, IA. Nov Fuzzy Fingerprinting For Privacy-Aware Data-Loss Prevention. Huawei America Research Center. Santa Clara, CA. Jul Novel Scalable Data-Loss Prevention Techniques. RackSpace Hosting Inc. Blacksburg VA. Mar User-Centric Security and Privacy. Virginia Tech College of Engineering Advisory Board Meeting. Oct Host-Based Anomaly Detection Based on User Activities. Georgia Tech Information Security Center (GTISC), UNC Chapel-Hill Department of Computer Science, Virginia Tech Department of Electric and Computer Engineering CESCA. Apr Host-Based And User-Centric Approaches For Detecting Drive-By-Download Attacks. Computer Science Departmental Seminar. New Jersey Institute of Technology. Nov Host-Based and User-Centric Detection of Drive-By-Download Attacks. DIMACS Fall Mixer. Rutgers University. Sep Cryptographic Provenance Verification Approach in Malware Detection With Trusted User Inputs. Security and Privacy Day. Rutgers University. May Personalized Security With Trusted User Inputs For Botnet Detection. Virginia Tech Computer Science Departmental Seminar, Blacksburg, VA. May Keystroke Dynamic Authentication With Trusted User Inputs For Human-Behavior Driven Bot Detection. Purdue University Computer Science Departmental Seminar, West Lafayette, IN. Mar Keystroke Authentication and Human-Behavior Driven Bot Detection. DyDAn Student-organized Seminar Series, Rutgers University. Nov Keystroke Dynamics Authentication and Human-Behavior Driven Bot Detection. Departmental Seminar. Stevens Institute of Technology, Department of Electrical and Computer Engineering. Hoboken, NJ. Oct Compact and Anonymous Role-Based Authorization Chains. NIST Workshop on Applications of Pairing Based Cryptography: Identity Based Encryption and Beyond. NIST at Gaithersburg, MD. Jun Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. BSF/DIMACS/DyDAn Workshop on Data Privacy. Rutgers University, NJ. Jan Private Information: To Reveal Or Not To Reveal. Departmental Seminars. Department of Computer Science at Rutgers University, Texas A&M University, Washington University at St. Louis, and Indiana University - Purdue University at Indianapolis; Department of Electrical and Computer Engineering at Iowa State University and Purdue University. Spring Trust and Service Negotiations Using WSPL. Sun Microsystems Lab, Burlington MA. Nov POSTERS/DEMOS 12
13 1. Xiaokui Shu, Danfeng Yao, and Barbara Ryder. A Formal Framework for Program Anomaly Detection. In Proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID). Kyoto, Japan. Nov Nikolay Laptev, Xiaokui Shu, and Danfeng Yao. Demo of DECT: Distributed Evolving Context Tree for Understanding User Behavior Pattern Evolution. The Thirtieth AAAI Conference on Artificial Intelligence (AAAI-16). Feb Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng. Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing. ACM CODASPY. Mar Best Poster Award. 4. Danfeng Yao. Storytelling Security: Semantic and Structural Causal Analysis. NSF SaTC PI Meeting. Jan Fang Liu, Xiaokui Shu, Danfeng Yao, and Ali Butt. Cloud-based Screening of Massive Data for Security Leaks in Enterprise Environments. Security and Software Engineering Research Center (S2ERC) Showcase. Muncie, IN. Nov Hao Zhang, Danfeng Yao, Naren Ramakrishnan. A Semantic-aware Approach to Reasoning about Network Traffic Relations. ACM Conference on Computer and Communications Security (CCS). Nov Karim Elish, Danfeng Yao, Barbara Ryder, and Xuxian Jiang. User-Intention Based Android Malware Detection. USENIX Security Symposium. Aug System Anomaly Detection with Program Analysis and Machine Learning Assistance. Kui Xu, Danfeng Yao, and Barbara Ryder. IEEE Security & Privacy Symposium. May High Performance Data Leak Detection. Xiaokui Shu, Jing Zhang, Danfeng Yao, and Wu-Chun Feng. IEEE Security & Privacy Symposium. May Dynamic and Fine-Grained Permission Systems for Android. Joshua Martin, Xiaokui Shu, and Danfeng Yao. Virginia Tech Undergraduate Research on Computer Science (VTURCS). Apr Detection of Data Exfiltration in Enterprise Environments. Danfeng Yao. Security and Software Engineering Research Center (S2ERC) Showcase. Muncie, IN. Nov PCM: Program Causal Map For Mobile Software Assurance. Danfeng Yao and Barbara Ryder. Security and Software Engineering Research Center (S2ERC) Showcase. Muncie, IN. Nov User-Centric Dependency Analysis in Programs for Identifying Malware. Karim Elish, Danfeng Yao, and Barbara Ryder. Security and Software Engineering Research Center (S2ERC) Showcase. Muncie, IN. Nov Kernel Level Sandbox of Application Processes with High Assurance. Hussain Almohri, Danfeng Yao, and Dennis Kafura. USENIX Security Symposium. Aug Demo of Privacy-Preserving Data Leak Detection. Xiaokui Shu and Danfeng Yao. Technology Showcase and Commercialization Symposium by VT-IDEA. Arlington, VA. Jun Distributed Detection of Data Exfiltration in Enterprise Environments. Xiaokui Shu and Danfeng Yao. Security Software and Engineering Research Center Showcase. Arlington, VA. May Privacy-Preserving Data-Leak Prevention. Xiaokui Shu and Danfeng Yao. Security and Software Engineering Research Center (S2ERC) Showcase. Ames, IA. Nov User-Centric Dependency Analysis in Programs for Identifying Malware. Karim Elish, Yiwei Shi, Danfeng Yao, and Barbara Ryder. Security and Software Engineering Research Center (S2ERC) Showcase. Ames, IA. Nov. 2011, Arlington, VA. May
14 19. Cyber Game for Behavior and Privacy Studies. Casey Link, Kui Xu, and Danfeng Yao. Virginia Tech Undergraduate Research on Computer Science (VTURCS). Apr Best Poster Award. 20. Overview Of Yao Group Research on Cyber Security (posters and demos). Virginia Tech Computer Science 40-th Anniversary. Nov Know What Your Application Does: Detecting User-Level Malware. Matt Banick, Danfeng Yao. Virginia Tech Undergraduate Research in Computer Science (VTURCS). Apr Blacksburg, VA. 22. Ensuring Host Integrity With Cryptographic Provenance Verification. Deian Stefan, Chehai Wu, Danfeng Yao, and Gang Xu. ACM Computer and Communications Security (CCS). Chicago, IL. Nov Huijun Xiong, Chih-Cheng Chang, Prateek Malhotra, and Danfeng Yao. Exploring the Human-Behavior Driven Detection Approach in Identifying Outbound Malware Traffic. USENIX Security Symposium. Montreal, Canada. Aug Brian Thompson, Chih-Cheng Chang, Hui Wang, and Danfeng Yao. Privacy-Aware Publishing of Netflix Data. IEEE Symposium on Security and Privacy. Oakland, CA. May Chehai Wu and Danfeng Yao. CompareView - A Provenance Verification Framework for Detecting Rootkit-Based Malware. IEEE Symposium on Security and Privacy. Oakland, CA. May Jiawei Sun, Bernhard Firner, Danfeng Yao, and Yanyong Zhang. Efficient and Fault-Tolerant Detection of Attacks in RFID Asset Tracking Systems. Wireless and Optical Communications Conference (WOCC). Newark, NJ. May Best Poster Award. 27. Deian Stefan, Danfeng Yao, and Gang Xu. Trusted-input for anomaly detection of botnets. The Third Annual DHS University Network Summit. Washington, D.C. Mar Qian Yang and Danfeng Yao. EmAuth: a Framework for Cross-Organizational Vouching. The Eighth New Jersey Universities Homeland Security Research Consortium Symposium. Princeton University, NJ. Dec Huijun Xiong and Danfeng Yao. Human-Behavior Driven Personalized Anomaly Detection. Security and Privacy Day. IBM Research, NY. Dec Brian Thompson and Danfeng Yao. Social Role-Preserving Graph Anonymization Using Clustering. Security and Privacy Day. IBM Research, NY. Dec Nitya H. Vyas and Danfeng Yao. Folksonomy Meets Text Inference: Automatic Privacy Management For Web 2.0. Security and Privacy Day. IBM Research, NY. Dec Tuan Phan and Danfeng Yao. Secure and Efficient Audit Framework for Multi-Player Online Games. Security and Privacy Day. SUNY, Stony Brook. May GRADUATED STUDENTS 1. Hao Zhang (Ph.D. 15, first job as a security engineer at the DB security group of Oracle) Thesis title: Discovery of Triggering Relations and Its Applications in Network Security and Android Malware Detection 2. Karim Elish (Ph.D. 15, first job as an assistant professor at Indiana University-Purdue University Fort Wayne) Thesis title: User-Intention Based Program Analysis for Android Security 3. Kui Xu (Ph.D. 14, first job as a security engineer at Amazon Inc.) Thesis title: Anomaly Detection Through System and Program Behavior Modeling 14
15 4. Hussain Almohri (Ph.D. 13, first job as an assistant professor at Kuwait University) Thesis title: High Assurance Models for Secure Systems 5. Huijun Xiong (Ph.D. 13, currently at Google, first job as a senior researcher at Samsung Research America) Thesis title: Secure Data Service Outsourcing with Untrusted Cloud 6. Saman Zarandioon (Ph.D. 12 from Rutgers University, coadvised with Vinod Ganapathy, first job as a senior software engineer at Amazon Inc.) Thesis title: Improving the Security and Usability of Cloud Services with User-Centric Security Models 7. Yipan Deng (M.S. 11, first job as an engineer at Intel) Thesis title: DeviceGuard: External Device-Assisted System and Data Security 8. Nitya H. Vyas (M.S., 10 from Rutgers University, first job as an engineer at VMTurbo) Thesis title: Usable Web 2.0 Privacy Management and Medical Imaging Search: An Ontology-Based Approach CURRENT POSTDOC, PH.D. and M.S. STUDENTS Haipeng Cai (Postdoc, joined VT in 2015, Ph.D. from University of Notre Dame) Amiangshu Bosu (Postdoc, joined VT in 2015, Ph.D. from University of Alabama) Xiaokui Shu (Ph.D., joined VT in 2010) Fang Liu (Ph.D., joined VT in 2012) Ke Tian (Ph.D., joined VT in 2013) Sazzadur Rahaman (Ph.D., joined VT in 2015) Long Cheng (Ph.D., joined VT in 2015) Daniel Barton (M.S., joined VT in 2014) Alexander Kedrowitsch (M.S., joined VT in 2015) STUDENT AWARDS AND HONORS Xiaokui Shu, Best Poster Award, ACM CODASPY Mar Karim Elish, First Place in VT Computer Science Graduate Research Poster Competition Apr Karim Elish, Finalist for VT COE Torgersen Graduate Research Award Apr Hussain Almohri, Finalist for VT COE Torgersen Graduate Research Award Apr Joshua Martin, Nominated for CRA Outstanding Undergrad Researchers Award by VT CS Mar Hussain Almohri, Kuwait Government Scholarship Karim Elish, 1st Place in VT Graduate Research Competition Mar Casey Link, VTURCS Best Poster Award Apr Brian Thompson, DHS DyDAn Fellowship Jan Aug Deian Stefan, Botnet Biometrics Work Featured in NSF Highlights Jan SELECT UNDERGRADUATE RESEARCH STUDENTS 1. Philip Guzik ( 15, undergraduate at VT CS) on Java String Analysis (JSA) for Android security 2. Zachary Burch ( 15, undergraduate at VT CS) on proof-of-concept collusion malware in Android 3. Lance Chao ( 14, 15, CyberCorp BS/MS student at VT CS) on Java string analysis for Android collusion detection 4. Hannah Roth ( 14, 15, CyberCorp BS/MS student at VT CS) on improving the usability of program anomaly detection 15
16 5. Brendan Avent ( 11, 12, undergraduate at VT CS) on low-cost location tracking for missing children 6. Casey Link ( 11, undergraduate at VT CS) on development of a game system for security education 7. William Matt Banick ( 10, undergraduate at VT CS/Psychology) on user-intention based traffic dependency study 8. Alexander Crowell (DIMACS REU 09, joined University Michigan CS for PhD) on detection of drive-by-download attacks 9. Anitra Babic (DIMACS REU 09, undergraduate at Chestnut Hill College) on -activity based authentication 10. Prateek Malhotra ( 08, undergraduate at Rutgers CS) on parallel universe design of network traffic prediction for anomaly detection 11. Deian Stefan (DIMACS REU 08, joined Stanford CS for PhD) on keystroke dynamic authentication PROFESSIONAL MEMBERSHIPS 1. IEEE Senior Member, ACM Senior Member. 2. Member of Virginia Tech Ted and Karyn Hume Center for National Security and Technology. 3. Member of NSF I/UCRC Security and Software Engineering Research Center (S2ERC). 4. Member in Center for Discrete Mathematics and Theoretical Computer Science (DIMACS), DHS Center of Excellence in Command, Control and Interoperability (CCI). PROFESSIONAL ACTIVITIES 1. Associate editor for IEEE Transactions on Dependable and Secure Computing, Jul. 14 Present. Editorial board member for International Journal of Security and Networks, Jan. 11 Mar Book chapter review for Algorithm Design and Applications. Wiley. Jun Reviewer for IEEE Transactions on Dependable and Secure Computing, ACM Transactions on Information and System Security, Computers & Security, IEEE Systems Journal, ACM Transactions on Computer-Human Interaction, International Journal of Computer Mathematics, Journal of Computer Security, Computer Communications, IEEE Transactions on Knowledge and Data Engineering, IEEE Transactions on Information, Forensics and Security, IET Information Security, British Journal of Mathematics & Computer Science, Journal of Biomedical Informatics, IEEE Transactions on Services Computing, Wireless Networks, Mobile Networks and Applications, Knowledge and Information Systems, Data & Knowledge Engineering Journal, Journal of Information Processing, IEEE Journal on Selected Areas in Communications, Journal of Systems and Software, IEEE Internet Computing. 4. Program Committee member for ACM ASIACCS 16, ACM CODASPY 16, IEEE CNS 16, Smart City Security and Privacy Workshop (SCSP-W 16), IEEE CloudCom 15, ACSAC 15, ACM CCS 15 IEEE CNS 15, Inscrypt 15, NSS 15, ACM CCS MIST Workshop 15, IEEE ICC 15 CISS, IEEE CCNS 15, ACM ASIACCS 15 ACSAC 14, ACM CCS 14, Inscrypt 14, SecureComm 14, ICCCN MobiPST 14, GLOBECOM CISS 14, ACM SACMAT 14, ACM ASIACCS 14, ACM CODASPY 14, MIST Workshop 14, Inscrypt 13, IEEE CNS 13, ACNS 13, ACM ASIACCS 13, ACM CODASPY 13, ISC 13, IEEE GLOBECOM 13, SecureComm 13, SESP 13, MIST 13 16
17 ACM ASIACCS 12, ACNS 12, SecureComm 12, ICCS 12, SECRYPT 12, ISPEC 12, SecureComm 11, WPES 11, GLOBECOM 11, CollaborateCom 11, IFIPTM 11, CSA 11, IPDPS 11, MobilPST 11, WWW 10, IEEE CANS 10, GLOBECOM 10, CollaborateCom 10, IEEE ICCCN 10, IFIPTM 10, WWW 09, IEEE ICCCN 09, CollaborateCom 08, ACM SAC 07, IEEE PADM Program co-chair for the Third International Workshop on Security in Cloud Computing, held in conjunction with ASIACCS Serving as a session chair in conferences, including ACM CCS 15, 14 and ASIACCS NSF panelist (multiple times) 8. Co-organizer of Northeast Security and Privacy Day at Rutgers University, May Moderator for the Special Interest Group in S2ERC Showcase (NSF I/UCRC), Nov UNIVERSITY/DEPARTMENT SERVICES Department Head Search Committee, Virginia Tech Computer Science Co-organizer of graduate recruitment weekend 2015 Co-chair of Faculty Search Committee, Virginia Tech Computer Science Faculty Search Committee, Virginia Tech Computer Science , , , , Graduate Program Committee, Virginia Tech Computer Science Diversity Committee, Virginia Tech Computer Science Chair of Computer Science Ph.D. Qualifier Exam Committee Graduate Admission Committee, Virginia Tech Computer Science , , CS/ECE joint cyber security curriculum development , , Qualifier Exam Committee, Virginia Tech Computer Science , Faculty Search Committee, Virginia Tech Electrical and Computer Engineering Publicity and Awards Committee, Rutgers Computer Science Admission Committee, Rutgers Computer Science OUTREACH AND DIVERSITY Organizer of the system reading group at VT CS Fall 2015 Advising a local high school student on steganography research 2015 Panelist for Brown University CS Department Career Workshop for Ph.D. students Nov Grace Hopper Conference Scholarship Application Committee Member 2014 Advising Roanoke Valley Governor s School students on keystroke dynamics authentication Oct Media consultant to Washington Times on cyber security for small businesses May 2014 Women s networking event for recruiting female undergraduates to VT CS major Jan. 2013, 2014 Lectures at Imagination Camps for middle school students, Virginia Tech Jul Recruiting underrepresented students into NSF REU programs May 2012 Exhibition at Kids Tech, Virginia Tech Feb Academic career panel, Virginia Tech Computer Science Oct Presenter for C-Tech 2 High School Girls Summer School 2011 Presented at Women s Preview Weekend of College of Engineering Mar. 2010, Apr Demo at the COE recruiting events for underrepresented high school sophomores Apr Presentation and demo for representatives from General Dynamics, Oct Panelist on the VT CS Graduate Council Academic Job Search Panel Oct Presented in the Meet the Faculty event of Computer Science Dept. Jan. 2010, Jan Signed up as a mentor in Scieneering mentoring program Mar
18 Meet with minority Ph.D. students from Georgia Tech Jan Demos and posters at VT CS 40th anniversary weekend Nov Serving as an e-mentor in Rutgers University Women in Engineering Leadership League DIMACS Career Planning Seminar for graduate students and postdocs Oct
XIAOKUI SHU. PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060
XIAOKUI SHU PERSONAL INFORMATION 2202 Kraft Drive http://xshu.net Blacksburg, VA 24060 [email protected] RESEARCH INTERESTS Anomaly detection in systems and networks e.g., program execution modeling, event
M.S. in Computer Science 2009-2011
Karim O. Elish Assistant Professor Department of Computer Science Indiana University-Purdue University Fort Wayne, IN 46805 [email protected] http://people.cs.vt.edu/~kelish/ RESEARCH INTERESTS Software
Jason A. Duan (Jun Duan)
Jason A. Duan (Jun Duan) McCombs School of Business The University of Texas at Austin One University Station B6700 Austin, TX 78712 Office: CBA 7.250 Office Phone: (512) 232-8323 Fax: (512) 471-1034 Email:
Curriculum Vitae. Xinghao (Shaun) Yan
Curriculum Vitae Xinghao (Shaun) Yan Management Science Ivey Business School 1255 Western Road Western University London, Ontario N6G-0N1 Website: http://www.ivey.uwo.ca/faculty/directory/shaun-yan/ Phone:
June Zhang (Zhong-Ju Zhang)
(Zhong-Ju Zhang) Carnegie Mellon University Dept. Electrical and Computer Engineering, 5000 Forbes Ave. Pittsburgh, PA 15213 Phone: 678-899-2492 E-Mail: [email protected] http://users.ece.cmu.edu/~junez
Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )
Curriculum Vitae Michael Tu Current Employment: (August, 2012 ) Assistant Professor Department of Computer Information Technology and Graphics School of Technology Purdue University Calumet Email: [email protected]
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1 Our History NSA/DHS Center for Excellence in Cyber Security Education
Comprehensive Course Schedule
Comprehensive Course Schedule The following designation and certificate courses are sponsored by BOMI International and BOMA Local Associations. Note that all BOMI International courses are also available
RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics
FENG GU Assistant Professor of Computer Science College of Staten Island, City University of New York 2800 Victory Boulevard, Staten Island, NY 10314 Doctoral Faculty of Computer Science Graduate Center
Ningzhong Li. University of Chicago, Booth School of Business, Chicago, IL MBA, Ph.D. in Accounting 2009
Ningzhong Li Jindal School of Management University of Taxes at Dallas 800 W Campbell Road, Richardson, TX 75080 Phone: (972) 883-5822 Email: [email protected] Education University of Chicago,
Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.
Xianrui Meng MCS 138, 111 Cummington Mall Boston, MA 02215 +1 (857) 540 0460 [email protected] www.xianruimeng.org RESEARCH INTERESTS In my research, I investigate practical privacy-preserving solutions
National Bureau for Academic Accreditation And Education Quality Assurance LINGUISTICS # UNIVERSITY CITY STATE DEGREE MAJOR SPECIALTY RESTRICTION
1 UNIVERSITY OF MASSACHUSETTS - BOSTON ~ BOSTON MA M 1 ARIZONA STATE UNIVERSITY - TEMPE TEMPE AZ MD ~ M for Linguistics is for Residential Program ONLY. The online option is not ~ M in Linguistics is for
Comprehensive Course Schedule
Comprehensive Course Schedule The following designation and certificate courses are sponsored by BOMI International and BOMA Local Associations. Note that all BOMI International courses are also available
ANYI LIU. 125M, 2101 E. Coliseum Blvd. Tel: 1-(260)-481-5426 Indiana Univ. Purdue Univ. Fort Wayne Web: http://web.ics.purdue.
CONTACT ANYI LIU 125M, 2101 E. Coliseum Blvd. Tel: 1-(260)-481-5426 Indiana Univ. Purdue Univ. Fort Wayne Web: http://web.ics.purdue.edu/ liu1010/ Fort Wayne, Indianan 46805 U.S.A. Email: [email protected]
Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders
CYBER SECURITY DIVISION 2013 PRINCIPAL INVESTIGATORS Monitoring Database Management System (DBMS) Activity for Detecting Data Exfiltration by Insiders Northrop Grumman Information Systems Donald Steiner,
Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004
Jin Kocsis (Jin Wei) CURRICULUM VITAE Assistant Professor Department of Electrical and Computer Engineering Auburn Science and Engineering Center, Room 554 The University of Akron Akron, OH, 44325-3905
Keumseok Kang. EMPLOYMENT August 2011 current: Visiting Assistant Professor, College of Business Administration, Florida International University
Keumseok Kang Decision Sciences and Information Systems, College of Business Administration Florida International University, Modesto A. Maidique Campus 11200 S.W. 8th Street, Miami, Florida 33199-0001
C U R R I C U L U M V I T A E T R I V A N L E
C U R R I C U L U M V I T A E T R I V A N L E Department of Computer Science, 253 Love Building Florida State University, Tallahassee, Florida 32306-4530, USA. Phone: (850) 345-6468, Fax: (850) 644-0058.
Best Paper Award, Hawaii International Conference on System Sciences, HICSS-36 (2003)
Curriculum Vitae EDUCATION Monica N. Nicolescu Assistant Professor Department of Computer Science University of Nevada, Reno [email protected] http://www.cs.unr.edu/ monica June 1998 - May 2003: University
Juan (Jenn) Du. Homepage: www4.ncsu.edu/ jdu/ Co-advisors: Dr. Xiaohui (Helen) Gu and Dr. Douglas Reeves
Juan (Jenn) Du CONTACT INFORMATION Juan (Jenn) Du Cell: (919) 645-7772 1015 Katie Ln E-mail: [email protected] Cary, NC 27519 Homepage: www4.ncsu.edu/ jdu/ RESEARCH INTERESTS EDUCATION My general research
Duke University, Fuqua School of Business Durham, North Carolina Associate Professor of Operations Management, Jul. 2013 Present
Robert P. Swinney Duke University Fuqua School of Business [email protected] people.duke.edu/~rps23 100 Fuqua Drive Box 90120 Durham, NC 27708 919-660- 7635 Academic Positions Duke University, Fuqua
Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013
Brent Lagesse, Ph.D. Computing and Software Systems Box 358534 18115 Campus Way NE Bothell, WA 98011-8246 425.352.5313 [email protected] Summary Curriculum Vitae Employment I am a professor at the University
R. Joseph Waddington Curriculum Vitae
R. Joseph Waddington Curriculum Vitae 131 Taylor Education Building Office: (859) 257-8666 579 S. Upper St. Fax: (859) 257-4243 Lexington, KY 40506-0001 E-mail: [email protected] ACADEMIC POSITIONS
ADAM MACNEIL BATES. Areas of specialization. Current Academic Appointment. Education. Honors & Awards
ADAM MACNEIL BATES Ph.D. Candidate Office: E451 CSE Building Department of Computer & Information Sciences & Engineering Gainesville, FL 32653 University of Florida USA email: [email protected] Phone:
XIAOBAI (BOB) LI ACADEMIC EXPERIENCE RESEARCH HIGHLIGHTS TEACHING HIGHLIGHTS
XIAOBAI (BOB) LI Department of Operations & Information Systems Manning School of Business One University Ave., Lowell, MA 01854 Phone: 978-934-2707 Email: [email protected] ACADEMIC EXPERIENCE 2011-present
S 2 ERC @ Virginia Tech Program Overview
S 2 ERC @ Virginia Tech Program Overview T. Charles Clancy, PhD Co-Director, NSF Security and Software Engineering Research Center Associate Professor, Electrical and Computer Engineering http://www.cyber.vt.edu/s2erc
Jan 2015 - Dec 2016 Training Schedule
Alabama Birmingham, AL Aug 31Sep 1 '15 Sep 23 '15 Aug 31Sep 3 '15 Sep 2122 '15 Sep 2324 '15 Arc Flash Electrical Safety NFPA 70E Sep 2325 '15 Dec 1415 '15 Dec 78 '15 Nov 1819 '15 Nov 1617 '15 Dec 910 '15
9700 South Cass Avenue, Lemont, IL 60439 URL: www.mcs.anl.gov/ fulin
Fu Lin Contact information Education Work experience Research interests Mathematics and Computer Science Division Phone: (630) 252-0973 Argonne National Laboratory E-mail: [email protected] 9700 South
Marsha B. Keune June 2015
Marsha B. Keune June 2015 University of Dayton 937-229-4639 School of Business Administration [email protected] Miriam Hall 410 300 College Park Dayton, OH 45469 EDUCATION Wisconsin School of Business,
Richard Joseph Waddington Curriculum Vitae
Richard Joseph Waddington Curriculum Vitae 1015 Flanner Hall (574) 631-3166 Notre Dame, IN 46556 [email protected] EDUCATION Ph.D. Educational Studies, 2012 University of Michigan, Ann Arbor, MI Quantitative
Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona
Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration California State Polytechnic University, Pomona
http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807
Minah Oh CONTACT INFORMATION Department of Mathematics and Statistics 540-568-4929 305 Roop Hall, MSC 1911 [email protected] James Madison University http://educ.jmu.edu/~ohmx/ Harrisonburg, VA 22807 EDUCATION
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
545 Student Services Building #1900 Phone: 510.642.4731
Pnina Feldman Haas School of Business faculty.haas.berkeley.edu/feldman University of California, Berkeley [email protected] 545 Student Services Building #1900 Phone: 510.642.4731 Berkeley, CA
US News & World Report Best Undergraduate Engineering Programs: Specialty Rankings 2014 Rankings Published in September 2013
US News & World Report Best Undergraduate Engineering Programs: Specialty Rankings 2014 Rankings Published in September 2013 Aerospace/Aeronautical/Astronautical 2 Georgia Institute of Technology Atlanta,
Heather C. Smith. Education. Publications. Academic Positions
Heather C. Smith +1 (803) 200 1624 [email protected] people.math.sc.edu/smithhc5 My primary interests lie in combinatorics and graph theory. Current projects include topics of computational complexity,
Universities classified as "very high research activity"
Universities classified as "very high research activity" 108 institutions classified as "RU/VH: Research Universities (very high research activity)" in the 2010 Carnegie Classification of Institutions
2016 Instructor Training & Certification Schedule
2016 Instructor Training & IPC-A-610 Certified IPC Trainer IPC-A-610 The Acceptability of Electronic Assemblies Become certified to train your workforce to identify accept/reject criteria for all three
HAISU ZHANG, Ph.D. September 2012. University of Illinois at Chicago (UIC) Major: Business Administration (Marketing)
Mailing Address: School of Management Purdue University Calumet 2200 169 th Street Hammond, IN 46323 Email: [email protected] Phone: (219) 989-3104 Academic Positions 2012-present Assistant Professor
KARIM CHALAK PERSONAL. Born: March 1982 Webpage: http://people.virginia.edu/~kmc2yf/ Email: [email protected] Phone: 1-434-924-3607
KARIM CHALAK PERSONAL Born: March 1982 Webpage: http://people.virginia.edu/~kmc2yf/ Email: [email protected] Phone: 1-434-924-3607 Department of Economics University of Virginia U.S. mail: P.O. Box 400182
Teaching in School of Electronic, Information and Electrical Engineering
Introduction to Teaching in School of Electronic, Information and Electrical Engineering Shanghai Jiao Tong University Outline Organization of SEIEE Faculty Enrollments Undergraduate Programs Sample Curricula
Ming-Hsing Chiu. Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 EDUCATION
Ming-Hsing Chiu Home: (985)845-2664 340 Chapel Loop Office: (985)549-5313 Mandeville, LA 70471 e-mail: [email protected] EDUCATION Ph.D. in Computer Science, University of Central Florida, May 99. Dissertation
University of Florida
T H E U N I V E R S I T Y O F F L O R I D A G O G R E AT E R University of Florida 1 THE NATION S GREAT PUBLIC RESEARCH UNIVERSITIES UNIVERSITY OF CALIFORNIA, BERKELEY UNIVERSITY OF CALIFORNIA, LOS ANGELES
2015-16 www.cs.purdue.edu. Courtesy Voicu Popescu
2015-16 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
Brian Alan Snyder, Ph. D.
Brian Alan Snyder, Ph. D. Current work address Department of Mathematics and Computer Science Work phone: (906) 635-2658 Lake Superior State Home phone: (906) 253-9822 650 West Easterday Ave. Department
YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015
EDUCATION YONGSEOK JANG 133J Bryan Hall PO Box 117168 Gainesville, FL 32611-7168 (352) 273-0325 [email protected] June 2015 Post-Doctoral Bridge Program, University of Florida, Gainesville, FL, AACSB, Jul,
Mohammad Arzaghi. ([email protected]) http://www.aus.edu/sbm/eco/people/arzaghi%20mohammad.php http://www.nber.org/~arzaghim/
Mohammad Arzaghi ([email protected]) http://www.aus.edu/sbm/eco/people/arzaghi%20mohammad.php http://www.nber.org/~arzaghim/ Office Address (UAE) American University of Sharjah Department of Economics Sharjah,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
VITA: DR. YEN-HUNG HU
VITA: DR. YEN-HUNG HU EXPERIENCE 2011 Present: Director of Information Assurance Center at Hampton University (IAC@HU). http://science.hamptonu.edu/compsci/iac/ Offer a variety of IA courses. Conduct IA
Post-Secondary Schools Offering Undergraduate Programs Including Arabic Language/Literature. University name Location Degree offered
Post-Secondary Schools Offering Undergraduate Programs Including Arabic Language/Literature University name Location Degree offered Abilene Christian University Abilene, TX None (Special Dialektos Program)
Yier Jin RESEARCH INTERESTS
Yier Jin Department of Electrical Engineering and Computer Science University of Central Florida, Orlando, FL 32816 Phone: (407) 823-5321 (Office), (203) 859-1202 (Mobile) Fax: (407) 823-5483 Email: [email protected]
State Annual Report Due Dates for Business Entities page 1 of 10
State Annual Report Due Dates for Business Entities page 1 of 10 If you form a formal business entity with the state, you may be required to file periodic reports on the status of your entity to preserve
CURRICULUM VITAE Herbert L. Dershem
CURRICULUM VITAE Visiting Professor of Computer Science United States Air Force Academy USAF Academy, CO 80840 Phone: (719) 472-3590 Education: B.S. University of Dayton, 1965 M.S. (Computer Science) Purdue
Atlanta Rankings 2014
Atlanta Rankings Major National Magazine and Study Rankings BUSINESS FACILITIES Metro Business Rankings Lowest Cost of Doing Business 2. Orlando, FL 3. Charlotte, NC 4. San Antonio, TX 5. Tampa, FL 6.
5/03/2014. EDUCATION 2005 Ph.D. in Computers and Information Systems
Hila Etzion Assistant Professor of Technology and Operations Stephen M. Ross School of Business University of Michigan 701 Tappan St. Ann Arbor, MI 48109-1234 (734)-358-1854 E-mail: [email protected] EDUCATION
Young E. (Anna) Lee. [email protected]; 646-596-2837 (cell); foreveryoung3051 (Skype ID) 1590 Anderson Ave. Suite 14C, Fort Lee, NJ 07024
EXECUTIVE SUMMARY Young E. (Anna) Lee [email protected]; 646-596-2837 (cell); foreveryoung3051 (Skype ID) 1590 Anderson Ave. Suite 14C, Fort Lee, NJ 07024 My objective is to find a tenure-track position
WEI CHEN. IT-enabled Innovation, Online Community, Open-Source Software, Startup Angel Funding, Interactive Marketing, SaaS Model
WEI CHEN Rady School of Management University of California, San Diego 9500 Gilman Drive, MC 0553 La Jolla, CA 92093-0553 +1(858)337-5951 +1(858)534-0862 [email protected] www.mrweichen.info RESEARCH
Todd D. Kravet. University of Washington, Foster School of Business Ph.D. in Accounting, August 2009 M.S. in Business Administration, June 2008
August, 2015 Todd D. Kravet School of Business University of Connecticut 2100 Hillside Road, Unit 1041a Storrs, CT 06269-1041 Office: (860) 486-1361 Email: [email protected] EDUCATION University
ADAM L. DOUPÉ. University of California, Santa Barbara. Advisor: Giovanni Vigna Topic: Black-Box Web Vulnerability Scanners
ADAM L. DOUPÉ P.O. Box 878809 Tempe, AZ 85287-8809 [email protected] 480-727-5471 EDUCATION 2010 2014 PhD in Computer Science University of California, Santa Barbara Advisor: Giovanni Vigna and Christopher
Curriculum Vitae Beyza Çalışkan Aslan
Curriculum Vitae Beyza Çalışkan Aslan Department of Mathematics & Statistics, University of North Florida 1 UNF Drive, Building 14/2731, Jacksonville, FL 32224 Phone: (904) 620-3713 Fax: (904) 620-2818
Sondra N. Barringer, Ph.D. Institute of Higher Education, University of Georgia Meigs Hall, Athens, GA 30602-6772 [email protected], tel: 281-236-0407
Sondra N. Barringer, Ph.D. Institute of Higher Education, University of Georgia Meigs Hall, Athens, GA 30602-6772 [email protected], tel: 281-236-0407 EDUCATION Ph.D. Sociology, University of Arizona, Tucson,
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
US News & World Report Graduate Program Comparison 1994 2015 Year ranking was published
US News & World Report Graduate Program Comparison Year was published Select Findings from US News and World Report - Engineering Schools MIT Engineering Year that was released Rank 1 1 1 1 1 1 1 1 1 1
Physical Therapy Marketing Success :: physical therapy assistant schools usa
Physical Therapy Marketing Success :: physical therapy assistant schools usa Physical Therapy Marketing Success :: physical therapy assistant schools usa Downloading From Original Website --> http://f-ebook.esy.es/ptsuccess/pdx/fph1
Role Based Encryption with Efficient Access Control in Cloud Storage
Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India
Sarah E. Stein Virginia Polytechnic Institute and State University Pamplin College of Business 3102 Pamplin Hall Blacksburg, VA 24061 sestein@vt.
Sarah E. Stein Virginia Polytechnic Institute and State University Pamplin College of Business 3102 Pamplin Hall Blacksburg, VA 24061 [email protected] ACADEMIC EMPLOYMENT Virginia Polytechnic Institute and
APPENDIX 1: SURVEY. Copyright 2010 Major, Lindsey & Africa, LLC. All rights reserved.
APPENDIX 1: SURVEY Major, Lindsey & Africa Partner Compensation Survey (2010) Dear : Major, Lindsey & Africa invites you to participate in our 2010 MLA Partner Compensation Survey. This Survey, which is
Graduate School Rankings By U.S. News & World Report: PSYCHOLOGY (RESEARCH) - Ph.D.
PSYCHOLOGY (RESEARCH) - Ph.D. Assessment 1 University of California, Berkeley 4.6 1 University of Michigan, Ann Arbor 4.6 3 University of California, Los Angeles 4.4 3 University of Illinois, Urbana-Champaign
EVA ASCARZA (Updated September 2015)
EVA ASCARZA (Updated September 2015) Columbia Business School 3022 Broadway Uris Hall, room 524 New York, NY 10027-6902 Phone: +1 (212) 851-4120 Fax: +1 (212) 854-7647 e-mail: [email protected] Web:
TABLE 37. Higher education R&D expenditures at institutions with a medical school, by state, institutional control, and institution: FY 2011
TABLE 37. Higher education R&D at institutions with a medical school, by state, institutional Alabama U. AL, Birmingham 503,698 369,116 U. South AL 42,233 16,810 Arizona U. AZ 610,565 160,136 Arkansas
MATTEO RIONDATO Curriculum vitae
MATTEO RIONDATO Curriculum vitae 100 Avenue of the Americas, 16 th Fl. New York, NY 10013, USA +1 646 292 6641 [email protected] http://matteo.rionda.to EDUCATION Ph.D. Computer Science, Brown University,
Graduate Physics Degrees Largest Departments and Degree Distribution
Number of Departments www.aip.org/statistics One Physics Ellipse College Park, MD 20740 301.209.3070 [email protected] April 2014 Graduate Physics Degrees Largest Departments and Degree Distribution Patrick
Lei (Edward) Gao. Phone (C): (517)303-3672 Email: [email protected] Website: http://gaolei.myweb.uga.edu
Lei (Edward) Gao The University of Georgia Address:, Phone (C): (517)303-3672 Email: [email protected] Website: http://gaolei.myweb.uga.edu EDUCATION Ph.D. in Finance, University of Georgia, Athens,
Early Childhood Educational Opportunities for Dependents of Emory Graduate Students
Strategy for Graduate Student Recruitment and Retention Early Childhood Educational Opportunities for Dependents of Emory Graduate Students Presented by Rob Rankin, Graduate Student Council President Natalie
JINYU LIU, MSW, PhD School of Social Work Columbia University 1255 Amsterdam Ave. New York, NY, 10027 Phone: (212) 851-2246 jl4658@columbia.
JINYU LIU, MSW, PhD School of Social Work Columbia University 1255 Amsterdam Ave. New York, NY, 10027 Phone: (212) 851-2246 [email protected] Education 2007-2013 Ph.D. University of Iowa, School of Social
National Bureau for Academic Accreditation And Education Quality Assurance PUBLIC HEALTH
1 GEORGE WASHINGTON UNIVERSITY WASHINGTON DC B Athletic Training 1 MA B 1 BROWN UNIVERSITY PROVIDENCE RI B EAST TENNESSEE STATE UNIVERSITY JOHNSON CITY TN B 3 HUNTER COLLEGE NEW YORK NY B 4 UNIVERSITY
Additional information >>> HERE <<< Getting Free Instant Access freight broker training and job placement - Review
Additional information >>> HERE
SUSANNA GALLANI. Harvard Business School 369 Morgan Hall, Soldiers Field, Boston, MA 02163 Phone: (617) 496-8613 Email: sgallani@hbs.
SUSANNA GALLANI 369 Morgan Hall, Soldiers Field, Boston, MA 02163 Phone: (617) 496-8613 Email: [email protected] ACADEMIC POSITIONS Assistant Professor of Business Administration July 2015 Present Department
University Your selection: 169 universities
University Your selection: 169 universities Level of study: bachelor, master Regions: United States, compareuni T eaching & Learning Research Knowledge T ransf er International Orientation Regional Engagement
Cornell Law School February 2014 Public Interest Low Income Protection Plan
Cornell Law School February 2014 Public Interest Low Income Protection Plan INTRODUCTION A large number of Cornell Law School students graduate with high educational debts. Many feel that they must obtain
National Bureau for Academic Accreditation And Education Quality Assurance
1 ARKANSAS STATE UNIVERSITY - STATE UNIV. AR M JONESBORO 2 AUBURN UNIVERSITY - AUBURN AUBURN AL MD 3 BALL STATE UNIVERSITY MUNCIE IN M 4 CALIFORNIA STATE UNIVERSITY - ^ Enrollment to the ESL program and
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
RESEARCH INTERESTS: Computer, Networking and Information Security; Digital topology and image processing
Jianhua Yang Ph.D. Professor TSYS School of Computer Science, Columbus State University 4225 University Ave., Columbus, GA 31907 706-507-8180(office) [email protected], [email protected]
Physical Therapy Marketing Success :: physical therapy assistant schools usa
Physical Therapy Marketing Success :: physical therapy assistant schools usa Physical Therapy Marketing Success :: physical therapy assistant schools usa Downloading From Original Website --> http://f-ebook.esy.es/ptsuccess/pdx/fph1
Yuanjie He. 2011- Associate Professor, Technology and Operations Management Department, California State Polytechnic University, Pomona
Yuanjie He 3801 W. Temple Ave, Pomona, CA 91768 Office: (909) 869-2458 Technology and Operations Management Department College of Business Administration E-mail: [email protected] Professional Experience 2011-
Machine Learning Department, School of Computer Science, Carnegie Mellon University, PA
Pengtao Xie Carnegie Mellon University Machine Learning Department School of Computer Science 5000 Forbes Ave Pittsburgh, PA 15213 Tel: (412) 916-9798 Email: [email protected] Web: http://www.cs.cmu.edu/
Best Poster Award: International Congress on Child and Adolescent Psychiatry 2012
EDUCATION Ph.D. Computer Engineering University of Southern California 1999 MS Computer Engineering University of Southern California 1994 B.S. Electrical Engineering Tehran University 1988 AWARDS & FELLOWSHIPS
2014-15 www.cs.purdue.edu. Courtesy Voicu Popescu
2014-15 www.cs.purdue.edu Courtesy Voicu Popescu 1 Lawson Computer Science Building 2 Lawson Commons The Lawson building was developed with multiple spaces 3 designed to foster collaboration and dialogue.
Physical Therapy Marketing Success :: physical therapy assistant schools usa
Physical Therapy Marketing Success :: physical therapy assistant schools usa Physical Therapy Marketing Success :: physical therapy assistant schools usa Downloading From Original Website --> http://f-ebook.esy.es/ptsuccess/pdx/fph1
