Openings for Ph.D. students with RAs
Multiple openings are available for Ph.D. students in my research group (with research assistantships (RAs)).
Highly motivated students having backgrounds in Computer Science/Engineering, Electrical Engineering, Electronics and Telecommunications Engineering or
related fields are being sought.
The positions would allow students to work on interdisciplinary research problems in areas including networks and communications,
signal processing, and cybersecurity and
would provide opportunities for collaborating with various industrial and governmental organizations.
Interested students should contact me with their CV.
Welcome to my homepage
I am an Associate Professor (tenured) in the Department of Computer Science (CS) at the University of Cincinnati (UC).
Earlier, I was a tenured Associate Professor at Tennessee State University (TSU).
Before joining TSU, I used to be with the Department of Electrical Engineering and Computer Science (EECS) at Syracuse University,
first as a Post Doctoral Research Associate and then as a Research Assistant Professor.
My research focuses on the design of secure and efficient networked, information, and social systems, with my current work having the following main thrusts:
812F Rhodes Hall, Department of Computer Science
College of Engineering and Applied Science (CEAS), University of Cincinnati, Cincinnati, OH 45221
Phone: (513) 556-3121 (Office)
My research is funded by various agencies, including the National Science Foundation (NSF), U.S. Army Research Office (ARO), U.S. Department of Agriculture (USDA), and the U.S. Air Force Research Laboratory (AFRL).
- Networked Systems: Cyber-Physical-Social Systems (CPSS), Internet-of-Things (IoT), Cloud and Edge computing, Cognitive Radio (CR), Sensor networks, Wired/Wireless networks, Resource management
- Human-in-the-Loop (HITL) Systems: Human-Machine integrated intelligent systems, Human-powered
sensing, Social computing, Cognitive psychology
- Cybersecurity: Cyber deception, Moving target defense, Cyber supply-chain security, Hardware Trojan threats, Insider threats, Byzantine attacks, Sybil threats, Physical layer security, Jamming attacks, Mechanism design for security, Mission assurance, Network resilience
- Signal processing: Statistical signal processing, Detection and Estimation theory, Data fusion and analytics, Distributed inference networks, Target localization and tracking, Adversarial signal processing
- Game theory: Incomplete and imperfect information games, Stable matching, Algorithmic game theory,
Mechanism design, Auction theory, Differentiated service pricing, Network economics