Students
The Cyber Security Education Club (CSEC) is a student-run organization at the 糖心logo入口. Members and leaders of the club are currently pursuing studies in computer engineering or electrical engineering.
Student Fellowships
Fall 2025
- , CSIS PhD, Lance Fiondella, Resilience of Machine learning Enabled Autonomous Systems
- , EAS-CSIS PhD, Gokhan Kul, Dual-Ledger: A Ledger-Verified Security Layer for Storage Systems
- William Kelley, EAS-CSIS PhD, Gokhan Kul, Teaching Side-Channel Attacks through ISA Programming
- , EAS-CSIS PhD, Jiawei Yuan, Robust UAV Object Tracking in Adversarial Environment
- , EAS PhD, Long Jiao, 6G Wireless Sensing, and Large Language Model-Based Security for 6G Wireless Sensing
- , EE PhD, Ruolin Zhou, Deep Learing-Based Multi-Source Angle-of-Arrival Estimation and Spectrum Awareness
- , MLDS PhD, Lance Fiondella, Resilience Modeling using Logistic Curves
- , PhD, Liudong Xing and Lance Fiondella, Collusion Tolerance in Voting-Bases Systems Considering Imperfect Spot Checking
- , PhD, Liudong Xing, Mission reliability of UAV swarm system with random failure cascading time
- , EAS-CSIS PhD, Jiawei Yuan, Jailbreaking LLM-driven Robot Control
- , MLDS PhD, Lance Fiondella, Time-varying Covariate Modeling for Cyber Resilience
- , CpE PhD, Ruolin Zhou, Entropy-Based Behavioral Analysis of Honeypot Attack Data
- , CIS MS, Gavin Fay, A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability Detection
- Andrew Bajumpaa, CIS MS, Gokhan Kul, Privacy-Preserving Computer Memory Organizer
- , CIS MS, Roulin Zhou, EMS Security with FPGA Accelerated Machine Learning
- , CIS MS, Gokhan Kul, Signal Manipulation Detection through UAV Sensor Data
- , CIS MS, Gokhan Kul, Non-Invasive Fairness Drift Monitor for Machine Learning Models using Conformance Constraints
- , CIS MS, Gokhan Kul, Teaching Encryption Key Estimation via Side-Channel Attack Games
- , EAS, Long Jiao, Vision-Language Model RAG Poisoning Attack Defense
- , CIS MS, Gokhan Kul, Dynamic Evaluation of Software Behavior Against Cyber Attacks
- , MSCPE, Hong Liu, Study of Model Poisoning in Federated Learning Applications
- , MSCPE, Ruolin Zhou, Cross Cyber-EMS Attack Vectors
- , MSCPE, Hong Liu, Secure Federated Learning Against Data Poison Attack: Aggregator-Level Neuron Masking with Oracle-Labeled Clients
- , DS MS, Gokhan Kul, MITRE ATT&CK-based Attack Chain Prediction for Risk Assessment
- , CIS MS, Gavin Fay, A Multi-Modal Pre-Training for Code Stylometry-Augmented Vulnerability Detection
- , MSME, Md Habibor Rahman, A Decision-Support Framework for Understanding and Prioritizing Human-Induced Vulnerabilities in Smart Manufacturing Systems
- , DS MS, Gokhan Kul, DQN-IDS: A Deep Reinforcement Learning Approach for Open Set-Enabled Intrusion Detection
- , CIS MS, Gokhan Kul, Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel Samples
- , CIS MS, Gokhan Kul, Model Evaluation for Radio-Frequency Signal Modulation Classifiers in the Existence of Novel Samples
- , CIS MS, Gokhan Kul, Automated Dataset Anonymization and Privacy Protection
- , EAS, Long Jiao, Multimodal Large Language Model Backdoor Detection and Defense
- , CS Undergraduate, Jiawei Yuan, Analysis of LLM Ability to Identify Software Vulnerabilities
Summer 2025
- , CIS PhD, Jiawei Yuan, Robust UAV Object Tracking in Adversarial Environment.
- , CIS MS, Long Jiao, Enhancing Security in Retrieval-Augmented Generation (RAG) through Neuron Attribution-Based Countermeasures
Spring 2025
- , CIS PhD, Jiawei Yuan, Jailbreaking LLM-controlled UAVs.
- , CIS MS, Long Jiao, In-Context Learning for Policy-Aware Language Models.
- , CPE PhD, Ruolin Zhou, Unsupervised Prototype Learning for RF Signal Modulation Classification.
- , CPE MS, Ruolin Zhou, Adaptive Incremental Learning Assessment.
- , CIS MS, Long Jiao, Security of LLM RAG Systems.
- , CPE PhD, Liudong Xing, Reliability and Performance Analysis for Mitigating Overloading Risks in Storage Area Networks.
Fall 2024
- , CIS MS, Long Jiao, In-Context Learning for Policy-Aware Language Models.
- , CIS MS, Long Jiao, In-Context Learning for Policy-Aware Language Models.
Summer 2024
- , CIS MS, Gökhan Kul, Empirical Evaluation of GAN-based Oversampling to Improve Data Imbalance for OSR-Based IDS.
- , EAS-CSIS PhD, Gökhan Kul, Mitigating Model Poisoning Attacks on OSR-Based NIDS.
- , CIS MS, Long Jiao, In-Context Learning for Policy-Aware Language Models.
- , CIS MS, Long Jiao, In-Context Learning for Policy-Aware Language Models.
Spring 2024
- , CPE PhD, Lance Fiondella, A Multi-Objective Reinforcement Learning Model for Optimizing Nonstationary Policies within DevSecOps Practices.
- , CPE MS, Lance Fiondella, Bayesian Reward Learning Terrain Preference Modeling under Adversarial Attacks.
- , CIS PhD, Ming Shao, Advancing Cybersecurity with Multimodal Continual Learning.
Summer 2023
- , CIS PhD, Ming Shao, Advancing Cybersecurity with Multimodal Continual Learning.
- , CPE, MS, Hong Liu, Comparative Experiments on Security in Bridge Health Monitoring (BHM): Wireless Sensor Network (WSN) and Wireless Sensing with Drone (WSD).
- , CPE BS, Lance Fiondella, An Agent-Based Model to assist nonviolent actions.
- , ECE, MS, Hong Liu, Comparative Experiments on Security in Bridge Health Monitoring (BHM): Wireless Sensor Network (WSN) and Wireless Sensing with Drone (WSD).
- , CPE MS, Lance Fiondella, Predictive Resilience of a Machine Learning Algorithm under Cyber Attacks.
Spring 2023
- Chencheng Zhou, CPE PhD, Liudong Xing, Dependability and Resilience for Blockchain-Based Systems.
Fall 2022
- , CIS BS, Gökhan Kul, Label Generation for Intrusion Activity on Networks.
- Pahalavan Dheivanayahi, CIS MS, Gökhan Kul, Output and hidden-layer naming in supervised-learning based-on input data labels.
- , CIS MS, Jiawei Yuan, Enhancing Anomaly Detection and Recovery in UAV Systems.
- Chencheng Zhou, CPE PhD, Liudong Xing, Defense Strategies for Selfish Mining Attack on Bitcoin System.
Summer 2022
- , CPE BS, Hong Liu, Efficient and Secure Data Collection with Wireless Sensor Networks (WSN) for Structural Health Monitoring (SHM) of Transportation Infrastructure.
- , ELE BS, Lance Fiondella, Secure Robotics Engineering.
- , CPS BS, Shakhnoza Kayumova, Exploring Artificial Intelligence and Cybersecurity
in K-12 STEM Education.
Summer 2022
- , Gökhan Kul, Building Outsourced Database Security.
Spring 2022
- , Lance Fiondella, Dependability Modeling of Modern Software Practices
- Chencheng Zhou, ECE PhD, Liudong Xing, Dependability and Resilience for Blockchain-Based Systems.
Fall 2021
- , Gökhan Kul, Implementing a Concept Drift based Anomaly Detector.
- , Ming Shao, A Unified Framework towards Open Set Incremental Fewer Shot Learning.
- , Lance Fiondella, Quantitative Resilience Modeling to Support the Test and Evaluation of Cyber Security.
- , Gökhan Kul, Maturity Model Evaluation Tool for Computer Security Event Logs.
Summer 2021
- , Gökhan Kul, Source Code Analysis: A Comparative Study of Feature Creation Methods for Cybersecurity Applications.
- , Ruolin Zhou, Implementation of Incremental Learning in Python-Keras as General Model Structure.
- , Ruolin Zhou, An Adaptive Incremental Learning based Deep Learning Demodulator for Wireless Communications.
- , Jiawei Yuan, Securing UAV Autonomous Operations against Perception Attacks.
Spring 2020
- , Banafsheh Seyed-Aghazadeh and Gokhan Kul, Cyber Resilient Harbor Seal Vibrissae Model with Advanced Threat Detection Technology that responds to Hydrodynamic Stimuli.
- , Lance Fiondella, Quantitative Analysis of the Robustness of Machine Learning Models against Different Attack Types and Modalities.
- , Lance Fiondella, A Framework for Machine Learning Resilience Engineering.
Fall 2020
- , Lance Fiondella, Stable and Efficient Numerical Methods for Covariate Software Reliability Models.
- , Gökhan Kul, An Assessment of Cybersecurity Vulnerability on Service Agreements Using Machine Learning.
- , Gökhan Kul, Measuring Phishing Email Effectiveness in Emergency Situations.
- , Lance Fiondella, A Quantitative Model of Incremental Deployment to Support Performance, Availability, and Security Tradeoff Assessment within DevSecOps Practices.
- , Jiawei Yuan, Rethinking the Security and Privacy Threats from Drones.
- , Lance Fiondella, Quantitative Modeling and Statistical Assessment of DevSecOps Tool Chains.