Projects

See a listing of selected, sponsored projects, projects, recent journal publications, conference papers and conference program committee participation.

  • A Core Cybersecurity Course Development: Secure Programming in an Immersive Learning Environment. The 1 year project, sponsored by National Security Agency (NSA), will develop an immersive learning based curriculum on Software Security & Secure Programming. A pilot course will be offered to PNW CIT/CS senior students and graduate students in summer 2017.
  • NSF REU Project: This REU Site offers an intensive 9-week summer residential program, to be hosted at Purdue University Northwest (PNW), on the research of sustainable wireless communication. Participants will work closely with faculty mentors. The goals of this program are to increase participants’ knowledge of recent advancements in related academic research and cutting-edge technology.
  • NSA/NSF GenCyber Summer Camps: Purdue University Northwest is a NSA/DHS designated National Center of Academic Excellence in Cyber Defense Education. The Department of Computer Information Technology and Graphics at Purdue University Northwest is offers a 1-week FREE NSA/NSF GenCyber Summer Camp for high school students & high school teachers.
  • NSF SFS Capacity Building Project: This grant will enable a 3-year project to develop course curriculum modules, including virtual reality 3-dimensional games, robotic programming games, and practical labs based on simulated cases, for cybersecurity teaching in high school classrooms and extracurricular activities. The goal is to broaden the participation in the cybersecurity workforce and give high school students the awareness of future education pathways.
  • NSA CAE Cybersecurity Workforce Education (CNAP) Project: This grant will support two 1-year projects: a pathway development project and an education methodology development project. The pathway development project is to collaborate with Ivy Tech Community College to develop seamless pathway for students enrolled in Ivy Tech’s 2 Year AAS Cybersecurity program to be transferred to PNW’s CIT 4 Year program. The mechanisms to be developed including course mapping, articulation agreement development, collaborative student extra-curricular activities.
    The education methodology development project will develop an immersive learning based approach for cybersecurity higher education. In this project, virtual reality (VR) educational games will be designed based on cyber hacking cases simulating real world scenarios. The VR games will be integrated with the classroom teaching activities to provide an immersive learning environment for learners.
  • Project Title: A Core Cybersecurity Course Development: Secure Programming in an Immersive Learning Environment
    The 1 year project, sponsored by National Security Agency (NSA), will develop an immersive learning based curriculum on Software Security & Secure Programming. A pilot course will be offered to PNW CIT/CS senior students and graduate students in summer 2017. Through the education and training of the proposed course curriculum, students are expected to be proficient with the secure software programming knowledge, skills, and abilities.
    Three objectives will be achieved.

    • Identify topics suitable for the software security and secure programming course, and align them with NICE NCWF KSAs.
    • Design and implement course modules with simulated programming cases and interactive hands-on labs. Specifically, re-programmable software programs will be developed for each selected topic to allow students to acquire knowledge and skills. A GUI based game will be developed to integrate software programs into a single package. Game play and lectures will be seamlessly embedded into class activities to facilitate knowledge acquisition.
    • Assess the effectiveness of the immersive learning secure programming curriculum developed in this project through a pilot course at PNW in summer 2017.

    Through the sharing and dissemination of the course material to the CAE community and other higher institutions, this project can broaden the participation of cybersecurity and software security education which can contribute the development of a cybersecurity-aware citizenry that are capable of advancing national economic prosperity and security.
    Target Students: Basic knowledge and skills of computer programming and object oriented programming.
    What Will Students Benefit?: Be proficient with the secure programming knowledge, skills, & abilities that are required by the NIST defined work roles “Software developer” & “Secure Software Assessor”.

  • Jin, G., Tu, M., Kim, T, Heffron, J, White, J., and Trekles, A. Development and Evaluation of Cybersecurity Education Games for High School Students. International Journal of Engineering Research and Innovation. 10(1), 25-35. ISSN: 2152-4157. 2018.
  • Jin, G., Tu, M., Kim, T, Heffron, J, and White, J. Evaluation of Game-Based Learning in Cybersecurity Education for High School Students. Journal of Education and Learning (EduLearn). 12(1), 150-158. ISSN: 2089-9823. 2018.
  • Nee, B. and Tu, M.. The Social Economic, Environmental, Human Health, and Cybersecurity Impacts of Wireless and Mobile Computing. Journal of Communications. Vol. 13, No. 1, 2018
  • Su, P.-C., Shen, J., Xu, W., Cheung, S.-C., and Luo, Y. (2018). A Fast and Robust Extrinsic Calibration for RGB-D Camera Networks. Accepted by Imaging Depth Sensors—Sensors, Algorithms and Applications
  • Desai, N. & Stefanek, G. (2017). A Technique for Continuous Evaluation of Student Performance in Two Different Domains: Structural Engineering and Information Technology. American Journal of Engineering Education. December 2017.
  • Tu, M and Xu, D. (2017). A secure and scalable two-level update consistency control protocol for Peer-to-Peer systems. International Journal of peer-to-peer networks. 8(2).
  • Luo, Y. , Cheung, S.-C., Pignata, T., Lazzeretti, R., and Barni, M. (2017). Anonymous subject identification and privacy information management in video surveillance. International Journal of Information Security. 2017, 1-18.
  • Wang, Z., Cheung, S.-C., and Luo, Y.. (2017). Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence. IEEE Transactions on Information Forensics and Security. 12(4), 980-995.
  • Stefanek, G. (2017). The Use of Virtualization Technology to Support Information Technology Programming Courses. Issues in Information Systems. 18(3), 184-194.
  • Xiong, Y., Huang, S., Wu, M., She, J., and Jiang, K. (2017). A Johnson’s-Rule-Based Genetic Algorithm for Two-Stage-Task Scheduling Problem in Data-Centers of Cloud Computing. IEEE Transactions on Cloud Computing.
  • Xiong, Y., She, J., and Jiang, K. (2017). A Lightweight Approach to Access to Wireless Network without Operating System Support. Intelligent Automation & Soft Computing, 1-9.
  • Xu, D., Xu, W. and Tu, M. (2016). Automated Software Integration Testing with Logical Contracts. IEEE Transactions on Reliability. 65 (1), 1205-1222.
  • Xiong, Y., Lu, C., Wu, M., Jiang, K. and Wang, D. A. (2016). A Low Energy-Consumption Storage Method for Cloud Video Surveillance Data Based on SLA Classification. Mobile Information Systems, vol. 2016, 13 pages, Article ID 6270738.
  • Xiong, Y., Wan, S., She, J., Wu, M., He, Y., and Jiang, K. (2016). An energy-optimization-based method of task scheduling for a cloud video surveillance center. Journal of Network and Computer Applications, 59, 63-73.
  • Xiong, Y., Li, L., Jiang, K., and Yu, H. (2016). Third-Party Broker-Based Resource Management in Mobile Computing. Journal of Advanced Computational Intelligence and Intelligent Informatics, 20(2), 262-270.
  • Jin, G., Tu, M., Kim, T., Heffron, J and White, J. Game based Cybersecurity Training for High School Students. Accepted to be published in Proceedings of the ACM SIGCSE 2018 . Baltimore, Maryland, USA. February, 2018.
  • Jin, G., Tu, M., Kim, T, Heffron, J and White. PNW GenCyber Summer Camp: Game based Cybersecurity Education for High School Students. In Proceedings of the ASEE Mid-Atlantic Section Fall 2017 Conference. Reading, PA, USA. October, 2017.
  • Calix, R. A., Gupta, R., Gupta, M., and Jiang, K. (2017). Deep gramulator: Improving precision in the classification of personal health-experience tweets with deep learning. 2017 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), pp. 1154-1159.
  • Jiang, K., Gupta, R., Gupta, M., Calix, R. A., & Bernard, G. R. (2017). Identifying personal health experience tweets with deep neural networks. 39th IEEE Annual International Conference In Engineering in Medicine and Biology Society (EMBC), (pp.1174-1177).
  • Jiang, K., Tang, Y., Cook, G. E., & Madden, M. M. (2017). Discovering Potential Effects of Dietary Supplements from Twitter Data. In Proceedings of the 2017 ACM International Conference on Digital Health (DH), (pp. 119-126).
  • Jiang, K., Feng, S., Gupta, M., Calix, R. A., & Bernard, G. R. (2017). Identifying Tweets of Personal Health Experience with Word Embedding and LTSM, ACM Conference of Information and Knowledge Management (CIKM), Singapore.
  • Jin, G., Jiang, K., & Lee, S. (2017). Development of Virtual Reality Games for Motor Rehabilitation. KSII The 9th International Conference on Internet (ICONI) 2017. December 17-20, 2017, Vientiane, Laos.
  • Natonski, L., Hadden, B., and Kim, T.H., The Effect of Relay Node and Power Control on Performance in Multi-hop Wireless Network, In Proceedings of the 4th National Workshop for REU Research in Networking and System in IEEE MASS, October ,2017.
  • Desai*, N. and Stefanek*, G. (2017, June). An Introductory Overview of Strategies used to Reduce Attrition in Engineering Programs, In Proceedings of 2017 ASEE Annual Conference & Exposition, Columbus, OH. June ,2017.
  • Desai*, N. and Stefanek*, G. (2017, June). An Analysis of Engineering and Technology Faculty Library Usage Patterns and Recommendations for Enhancing Interaction with the Library, In Proceedings of 2017 ASEE Annual Conference & Exposition, Columbus, OH. June ,2017.
  • Desai*, N., & Stefanek*, G. (2017, March). A literature review of the different approaches that have been implemented to increase retention in engineering programs across the United States, In Proceedings of the 2017 ASEE Zone II Conference, San Juan, Puerto Rico, March 2017.
  • Kim, T. H., Fitzgerald, M., and Kurale, M., The Optimal Receiving Signal Strength to Use the Relay Node in Wireless Network”, In Proceedings of 124th ASEE Annual Conference, June 2017.
  • Kim, T. H., Mapa, L., Ramaurthy, D., and Goni, F. (NSF REU Student Fellow), Investigating the Effect of Temperature in RFID Technology”, In Proceedings of 124th ASEE Annual Conference, June 2017.
  • Tu, M., Riordan, K., Xie, G. and Yang, S. A Secure Contact Protocol for the Delay Tolerant Networks. In Proceedings of the 16th IEEE International Conference on Computer and Information Science (ICIS’17). May 2017.
  • Tu, M. and Xiao, L. (2016). Enhance System Resilience through Modularization. In Proceedings of the Win Workshop 16 of the 5th IEEE/CIC International Conference on Communications in China (ICCC 2016), ChengDu, China. July 2016.
  • Calix, R. A., Cabrera, A., & Iqbal, I. (2016). Analysis of Parallel Architectures for Network Intrusion Detection. In Proceedings of the 5th Annual Conference on Research in Information Technology, (pp. 7-12). ACM.
  • Calix, R. A. and Sankaran, R. (2016). On the Feasibility of an Embedded Machine Learning Processor for Intrusion Detection. Proceedings of the 2016 IEEE International Conference on Big Data, Washington D.C.,USA, Dec.5-8, 2016.
  • Iqbal, I. M. and Calix, R. A. (2016). Analysis of a Payload-based Network Intrusion Detection System using Pattern Recognition Processors. In Proceedings of The 2016 International Conference on Collaboration Technologies and Systems (CTS 2016), October 31 – November 04, 2016, Orlando, Florida, USA.
  • Cabrera, A. and Calix, R. A. (2016). On the Anatomy of the Dynamic Behavior of Polymorphic Viruses. In Proceedings of The 2016 International Conference on Collaboration Technologies and Systems (CTS 2016), October 31 – November 04, 2016, Orlando, Florida, USA.
  • Jiang, K., Calix, R. A., & Gupta, M. (2016). Construction of a Personal Experience Tweet Corpus for Health Surveillance. Proceedings of the 15th Workshop on Biomedical Natural Language Processing (BioNLP 2016), pp. 128–135.
  • Fu, D., Xiong, Y., Lu, C., Wu, M. & Jiang, K. (2016). A Task Scheduling Method for Energy-Efficient Cloud Video Surveillance System Using A Time-Clustering-Based Genetic Algorithm. In Proceedings of The 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016), 661-668.
  • Kim, T., Jiang, K. & Rajput, V. S. (2016), Adoption of Container-Based Virtualization in IT Education. Proceedings of the 2016 American Society for Engineering Education Annual Conference & Exposition , June 26- 29, 2016, New Orleans, Louisiana. 10.18260/p.26530.
  • Wang, S., Sen-ching, S. C., & Luo, Y. (2016). Wearable privacy protection with visual bubble. In Proceedings of the 2016 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), (pp. 1-6).
  • Najafian, M., Irvin, D., Luo, Y., Rous, B. S., & Hansen, J. H. (2016). Automatic measurement and analysis of the child verbal communication using classroom acoustics within a child care center. In Proceedings of The 5th Workshop on Child Computer Interaction (WOCCI 2016), 1-6.
  • Najafian, M., Irvin, D.W., Luo, Y., Rous, B., & Hansen, J.H.L. (2016). Employing speech and location information for automatic assessment of child language environments. In Proceedings of Sensing, Processing and Learning for Intelligent Machines (SPLINE). Aalborg, Denmark.
  • Desai, N. and Stefanek, G. (2016), Continuous Evaluation of Student Class Performance Using Group-based, In- class Quizzes. Proceedings of the 2016 American Society for Engineering Education Annual Conference & Exposition, June 26-29, New Orleans, Louisiana.
  • Desai, N. and Stefanek, G. (2016), Equipping Engineering Undergraduate College Students with the Tools Needed to Transition from Solving Textbook Problems to Real-world, Industry Projects. Proceedings of the 2016 American Society for Engineering Education Annual Conference & Exposition, June 26-29, New Orleans, Louisiana
  • Desai, N. & Stefanek, G. (2016). An Analysis of Engineering Faculty Patterns of Usage of Library Resources on a Small Commuter University Campus, Library Technology Conference (LIBTECH 2016), Macalester College, St. Paul, Minnesota, March 2016, USA.
  • M. Tu, S. Wu, and G. Jin. Immersive Learning for Cybersecurity Education: A Case Study with the Advanced Operating System Course. In Proceedings of the 2016 National Cyber Summit (NCS’16), Huntsville, Alabama. June 2016
  • M. Tu, Program Committee for the IEEE International Conference on Computers, Software & Applications Conference (COMPSAC)
  • M. Tu, Program Committee for the International Conference on Digital Forensics, Security, and Law, (ADFSL)
  • M. Tu, Program Committee for the National Workshop for NSF REU Research in Networking and Systems (REUNS)