Computer Scientist | Machine Learning & Security
 
salvatore-stolfo-impact.jpg

M Y   S T U D E N T S 

Ph.D. Graduates


Daniel_P_Miranker.png

DANIEL MIRANKER 

Professor, University Texas at Austin


"Treat: A New and Efficient Match Algorithm for AI Production Systems," 1987.

 


stephen-taylor.png

STEPHEN TAYLOR

Professor, Dartmouth College

"Parallel Logic Programming Systems (Completed at Technion)," 1987.

 


alexander-pasik.png

ALEXANDER PASIK 

(deceased)

"A Methodology for Programming Production Systems and Its Implications on Parallelism," 1989.

 


MIchael_VanBiema.jpg

MICHAEL VAN BIEMA 

"Constraint-Based Invocation: Integrating the Object-Oriented and Rule-Based Paradigms," 1990.

 


russell-mills.png

RUSSELL MILLS 

(degree awarded posthumously) 

"llC: A Hierarchial Parallel Programming Language," 1992.

 


NathanielPolish.jpg

NATHANIEL POLISH

Daedulus Technology Group

"Mixed Distance Measures for the Optimization of Concatenative Vocubularies in Speech Synthesis," 1993.

 


HasanatDewan.gif

HASANAT DEWAN 

"Runtime Reorganization of Parallel and Distributed Expert Database Systems," 1994.

 


JasonGlazier.jpg

JASON GLAZIER

Thompson Financial

" Dynamic Neighborhood Bounding: An Error Reduction Technique for Monte Carlo Simulation," 1994.

 


david-espinosa.png

DAVID ESPINOSA

UNK

"Semantic Lego: A Modular Theory of Interpreters," 1995.

 


MauricioHernandez.jpg

MAURICIO HERNANDEZ

IBM Research Almaden

"A Generalization of Band Join and its Application to the Merge/Purge Problem," 1996.

 


phillip-chan.png

PHILIP CHAN

Professor, Florida Tech

"An Extensible Meta-Learning Approach for Scalable and Accurate Inductive Learning," 1997.

 


DavidOhsie.jpg

DAVID OHSIE

Smarts

"Codebook-based Fault Diagnosis in Network Management," 1998

 


Andreas_image.jpg

ANDREAS PRODROMIDIS

Programize, LLC.

"Efficiency and Scalability of Distributed Data Mining, Pruning and Bridging Multiple Models," 1998.

 

 

 


wenke-lee.png

WENKE LEE

Professor, GA Tech

"A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems," 1999.

 


wei-fan.png

DAVE (WEI) FAN

IBM Hawthorne research

"Cost-sensitive, scalable adaptive learning," 2000.

 


EleazarEskin.jpg

ELEAZAR ESKIN (THE ZAR) 

 Professor, UCLA

"Probabilistic methods in Intrusion Detection and Genomics," 2002.

 


ShlomoHershkop.jpg

SHLOMO HERSHKOP

Director of Engineering, Allure Security Technology

"The Yank Spam Detection System," 2004.

 


GermanCreamer.jpg

GERMAN CREAMER

Professor, Steven Institute of Technology

"On the use of boosting in financial prediction," (co-advisor: Y. Freund) 2005.

 

 

KeWang.jpg

KE WANG

Google

"Network Payload-based Anomaly Detection and Content-based Alert Correlation," 2006.

 


JanekParekh.jpg

JANAK PAREKH

Google

"Privacy-preserving Distributed Event Corroboration," 2007.

 


wei-leni.png

WEI-JEN LI

Goldman Sachs

"Malcode-bearing Documents", 2008.

 


 
 
frias-martinez.png

VANESSA FRIAZ-MARTINEZ

 University Maryland,  College Park.

"Behavior-based Access Control," 2008.

 


GabrielaCretuCicolarie.jpg

GABRIELA CRETU-CIOCARLIE

SRI

"STAND Anomaly Detection Learning Strategies," 2009.

 


BrianBowen.jpg

BRIAN BOWEN

Sandia National Labs

"Decoy Networking," 2010.

 


malek-ben-salom.png

MALEK BEN SALEM

Accenture

"Insider Threat, 2011"

 


yinkbo-song.png

YINGBO SONG

"Privatizing Network Traces, 2012"

 


AngCui.jpg

ANG CUI

"Symbiotic Embedded Machine and Embedded Device Insecurity", 2015

 


NathanielBoggs.jpg

NATHANIEL BOGGS

Relative Metrics of Security for Defense in Depth Architectures, 2015

 


JillJermyn.jpg

JILL JERMYN 

Google

Discovering Network Control Vulnerabilities in Evolving Networks, 2017.

 


AdrianTang.jpg

ADRIAN TANG 

Columbia

On the Security of Commodity Hardware-Software Interfaces, 2018

 


YuanKang.jpg

YUAN KANG 

Google

Combining Programs to Enhance Security Software, 2018

 


PreetamDutta.jpg

PREETAM DUTTA

Columbia  Simulated User Bots,