SNAC Alumni

Visingting Scholars

  1. Dr. Chunming Wu, Southwest University, Chongqing China (12/2016-12/2017)
  2. Oussama Mjihil, Visiting student, Hassan 1st University, Morocco (4/2016-6/2016, 8/2016-8/2017 Fulbright scholar student)
  3. Elmir Iman, Hassan 1st University, Morocco (2/2016-4/2016)
  4. Dr. Xiang Gu, Nantong University, Zhejiang Provence, China (2/2015-2/2016)
  5. Dr. Bo Li, Yunnan University, Yunnan Provence, China (2/2015-3/2016)
  6. Zhiyuan Ma, Visiting PhD students, UESTC, China (9/2014-3/2016)
  7. Dr. Weiping Peng, Henan Polytechnic University, Henan Provence, China (12/2014-12/2015)
  8. Dr. Haihua Zhao, Ba Yin Vocational and Technical College, Kuerle, Xinjiang, China (10/2014-10/2015)
  9. Dr. Jin Wang, Nantong University, China (12/2013-12/2014)
  10. Dr. Aiguo Chen, University of Electronic Science and Technology, China (1/2013-12/2013)
  11. Dr. Jingsong Cui, Wuhan University, China (8/2012-8/2013, 10/2015-9/2016)
  12. Dr. Weijia Wang, Beijing Jiaotong University, China (3/2011-9/2011, 10/2015-11/2016)
  13. Dr. Chunming Wu, Southwest Univesity, China (12/2016-12/2017)

Undergraduate Graduates

    Bridge, Lucas  (NSF IA sholarship receiver, 2015)

Ph.D Graduates

  1. Dr. Duo Lu, Assistant Professor (tenure-track) at Rider University, dissertation title "3D In-Air-Handwriting based User Login and Identity Input Method ", dissertation defense data: July 2, 2021
  2. Dr. Ankur Chowdhary, Security Architect, Lincoln Heritage Life Insurance Company, dissertation title "Software-Defined Situation-aware Cloud Security ", dissertation defense data: November 4, 2020
  3. Dr. Oussama Mjihil (Fulbright scholar), Hassan 1st University, Morocco (co-chaired with Prof Abdelkrim Haqiq), CEO and the founder of ENADEV, dissertation title: "Security Assessment and Countermeasure Selection for Scalable Cloud Computing Environments", dissertation defense date: June 8, 2019
  4. Dr. Adel Alshamrani, joined University of Jeddah as an assistant professor, dissertation title: "Cyber Attacks Detection and Mitigation in SDN Environments", dissertation defense date: November 5, 2018
  5. Dr. Abdullah Alshalan, joined King Saud University as an assistant professor, dissertation title: "MobiVPN: Towards a Reliable and Efficient Mobile VPN", dissertation defense date: August 30, 2017
  6. Dr. Sandeep Pisharody, joined MIT Lincoln Lab as a research staff, dissertation title: "Policy Conflict Management in Distributed SDN Environments", dissertation defense date: May 16, 2017.
  7. Dr. Huijun Wu, joined Twitter, dissertation Title: "Mobile Cloud Application Framework and Offloading Strategies", dissertation defense date: July 22, 2016.
  8. Dr. Bing Li, joined Google, dissertation title: "Anonymity and Access Control in Mobile Network Environment", dissertation defense date: June 1, 2016.
  9. Dr. Zhijie Wang, joined GE, disseration title: "Effective and Privacy-Preserving Mobile Crowd Sensing", dissertation defense date: February 9, 2016.
  10. Dr. Chun-Jen Chung, CTO of startup Athena Network Solutions LLC, dissertation title: "SDN-based Proactive Defense Mechanism in a Cloud System", dissertation defense date: July 20, 2015.
  11. Dr. Tianyi Xing, joined Wal-mart Research Lab, dissertation title: "Establishing the Collaborative Software Defend Networking Based Intrusion Prevention System in MobiCloud Environment", defense date: October 2, 2014.
  12. Dr. Zhibin Zhou, joined Amazon, dissertation title: "On Efficent and Scalable Attribute-Based Security Systems", defense date: April 27, 2011.
  13. Dr. Yang Qin, joined Microsoft, dissertation title: "Anonymous Communications In Wireless Ad Hoc Networks: Protection and Attacks", defense date: September 17, 2010.

Post Docs

  1. Dr. Chun-Jen Chung, Arizona State University, (June 2015 - July 2016, 2017-2018)
  2. Dr. Jiayue Li,  Hong Kong University of Science and Technology, (Oct 2017 to Dec 2019)

Graduated MS Students (with Thesis)

# Name Year Affiliation (after graduation) Thesis Topics
Qiuxiang Dong
Attribute-Based Encryption for Fine-Grained Access Control over Sensitive Data
Abdulhakim Sabur
Analysis and Management of Security State for Large-Scale Data Center Networks
Fanjie Lin
Constructing Knowledge Graph for Cybersecurity Education
Shilpa Nagendra
Commvault Systems
Evaluation of Storage Systems for Big Data Analytics
Bhakti Bohara
Akamai Technologies
Moving Target Defense Using Live Migration of Docker Containers
Janakarajan Natarajan
Analysis and Virtualization of Openflow Rule Conflicts
Ankur Chowdhary
Secure Mobile SDN
Qingyun Li

Constructing an Interactive Multimedia Enabled Virtual Lab Learning Environment on Vlab Platform
Pankaj Kumar Khatkar
Firewall Rule Set Analysis and Visualization
Zhenyang Xiong
An SDN-Based IPS Development Framework in Cloud Networking Environment
Ashwin Narayan Prabhu Verleker
An Ontology Based Approach to Attribute Management in ABAC
Yuli Deng
A Cloud Based Continuous Delivery Software Developing System on Vlab Platform
Dong, Xinyi
Service Oriented Architecture for Mobile Cloud Computing
13 Zhong, Yunji 2011 Microsoft Establishing Distributed Social Network Trust Model in MobiCloud
12 Kadne, Aniruddha 2010 F5 vLab: Virtual Laboratory for Network Security Education
11 Sushma Myneni 2010 Microchip Secure and Efficient Authentication Scheme for EPC Generation 2 Passive RFID Tags
10 Nirav Shah 2010 Intel A-Weor: Communication Privacy Protection for Wireless Mesh Networks Using Encoded Opportunistic Routing
9 Arasan, Vetri 2010 Garmin Establishing Email Based Social network Trust
8 Shere, Swaroop 2009 Forcesale Using Shock Waves to Detect and predict Highway Congestion
7 Nagarajan, Vijayakrishnan 2009 Juniper Networks Using Secure Search Engine to Counter Web-Based Man-in-the-Middle and Phishing Attacks
6 Jagasia, Mukesh 2009 Intel Distributed Protocols to Solve Nonlinear Optimization Problems for Node Localization and Malicious Node Detection in Wireless Sensor Networks
5 Agarwal, Utkarsh 2009 Garmin Watermark Based Attack on the Second Generation Onion Router
4 Kapoor, Harsh 2008 StartUP Using Polynomial Intepolation based Secret Sharing Scheme for Secure Communications
3 Verma, Mayank 2008 Brocade Communications A New Trust Framework for Using Peudonyms and Attribute-based Cryptography for Vehicular Ad Hoc Networks (VANETs)
2 Kandiah, Vinayak 2007 CERNER Constructing Efficient Anonymous Communication schemes: Solutions based on Splitting, Merging, and Polynomial Interpolation
1 Ramachandram, Archana 2007 QualComm Efficient Algorithms and Implementation of Tate Pairing for Wireless Sensors