Stephen R. Tate, Ph.D.
Professor of Computer Science

Vita

Also available in PDF.

STEPHEN R. TATE

Areas of expertise: Computer Security and Cryptography, Software Security, Algorithm Analysis, On-Line Algorithms, Algebraic Algorithms, Data Compression, Computer Science Education

EDUCATION

Year Degree Major Institution
1991 Ph.D. Computer Science Duke University
1986 B.E. Computer Science/Electrical Eng./Mathematics Vanderbilt University

PROFESSIONAL EXPERIENCE

Dates Position Organization Location
Aug 2007 - present Professor UNC Greensboro Greensboro, NC
Aug 2007 - Jul 2019 Department Head UNC Greensboro Greensboro, NC
Aug 1999 - Jul 2007 Associate Professor University of North Texas Denton, TX
Aug 1993 - Jul 1999 Assistant Professor University of North Texas Denton, TX
Aug 1991 - Jul 1993 Asst. Research Professor Duke University Durham, NC
Jan 1991 - Aug 1991 Research Associate Duke University Durham, NC
Sep 1987 - Dec 1990 Research Assistant Duke University Durham, NC

MAJOR PROFESSIONAL ACTIVITIES

  • Founding Department Head for the newly-formed Department of Computer Science at UNC Greensboro (September 2007 - July 2019), after existing computer science programs split from the former Department of Mathematical Sciences. Oversaw massive program growth, from approximately 145 students to 540 students. Hired five new tenure-track faculty, twelve full-time non-tenure-track instructors, three administrative staff, and multiple part-time adjunct instructors. Oversaw curriculum efforts such as the addition of Data Science and Big Data concentrations at both the undergraduate and graduate levels.
  • Founder and Director of the Center for Information and Computer Security (CICS) at UNT (founded in 2003). Designated by the NSA and DHS as a "National Center for Academic Excellence in Information Assurance Education" in 2004.
  • Founder and director of the Computer Privacy and Security (CoPS) Lab at UNT (founded in 2001).
  • Editorial board, Journal of Information Assurance and Security (JIAS).
  • Conference organization activities:
    • Program Chair, 10th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), Nov 2011.
    • Vice Program Chair, 2008 International Conference on Autonomic and Trusted Computing.
    • Chair, IEEE Symposium on Security and Privacy, May 2005.
    • Vice-chair, IEEE Symposium on Security and Privacy, May 2004.
    • Founder and organizer of the South Central Information Security Symposium (SCISS '03), held at UNT in April 2003 (also a key organizer in the SCISS '04 in Houston, and SCISS '05 in Austin).
    • Chair (jointly with Wolfgang Bein of UTD) of the Symposium on the Theory of Computing (STOC), held May 1998 in Dallas, TX.
    • Co-organizer of the Workshop on Data and Image Compression Needs and Uses in the Scientific Community, held Dec. 1992 in Greenbelt, MD (organized with Jim Tilton of NASA).
  • Organized and hosted the 2007 Southwest Regional Collegiate Cyber Defense Competition (CCDC).
  • Member of the SIGACT Electronic Publications Board -- managed electronic conference submissions server 1997 - 2002.

HONORS AND AWARDS

  • Ph.D. student Ke Xu received the "Best Dissertation Award" in the UNT College of Engineering, 2005.
  • Recognized at UNT Board of Regents Luncheon (February 2004) for federal certifications (CNSS 4011 and 4013) for computer security course sequence.
  • Created computer security program which won recognition from the National Security Agency (NSA) and the Department of Homeland Security (DHS) for UNT as a "Center of Academic Excellence in Information Assurance Education."
  • Received the "National Security Award" at the Fall 2004 Faculty Convocation -- included receiving a certificate of recognition from Texas Governor Rick Perry.

GRANTS, CONTRACTS, AND OTHER FUNDING (only funded proposals listed - travel awards excluded)

  • Jun 2019 - Jul 2019, Characterizing Reasoning about Software Vulnerabilities, Faculty First Award, UNC Greensboro, $5,000.
  • June 2018, Equipment donation from private company in Maryland, estimated value: $4,800.
  • May 2017 - Dec 2017, Course-based Undergraduate Research Experiences (CURE) development Grant, UNCG Undergraduate Research, Scholarship, and Creativity Office, $2,000 (with co-PI Hamid Nemati).
  • Sep 2013 - Aug 2015, Innovative Active Learning Using Tablets, National Science Foundation, $300,000 (total budget -- UNCG portion is $48,000); co-PI, with PI Lixin Fu and project PI Barry Kurtz (Appalachian State University).
  • 2013, STARS Chapter Support, donation from Greensboro Jaycees, $2,000.
  • Sep 2011 - Aug 2013, STARS Leadership Corps at UNCG, $30,000 plus travel funding, sub-award from an NSF-supported "Broadening Participation in Computing" project at UNC Charlotte; with UNCG co-PIs Lakshmi Iyer and Anthony Chow.
  • 2011, STARS Chapter Support, donation from Greensboro Jaycees, $2,000.
  • Sep 2009 - Aug 2014, Layered Modeling for Design, Analysis, and Implementation of Trusted Platform Applications, National Science Foundation, $498,090.
  • Sep 2006 - Aug 2008, Collaborative Research: A Regional Partnership to Build and Strengthen IA in North Texas, National Science Foundation, $247,183 (total budget -- UNT portion is $128,106); Principal Investigator; with co-PIs Ram Dantu and Matt Wright (University of Texas at Arlington).
  • July 2005 - June 2007, Recruiting and Retention Strategies for Computer Science at UNT, Texas Higher Education Coordinating Board, Texas Technology Workforce Development Grant, $125,322 (Investigator; with PIs Robert Akl and David Keathly, and other Investigators Krishna Kavi, Kathleen Swigger, and Philip Sweany).
  • Aug 2002 - July 2006, Mobile Agent Security Through Multi-Agent Protocols, National Science Foundation, $249,222 (plus $3,840 supplement for SCISS '03 support).
  • June 2002, Equipment donation from Intrusion.com, estimated value: $6,000.
  • Dec 2001, UNT Faculty Research Grant to support establishment of the Computer Privacy and Security (CoPS) Lab, $3,400.
  • Jan 1998 - Aug 2000, Exploiting Coordinate Representation in Non-uniform Spatial Decomposition, Texas Advanced Research Program, $91,076.
  • July 1994 - July 1998, On-Line and Dynamic Algorithms: Computing with an Uncertain Future, National Science Foundation, $67,544.
  • June 1994 - Aug 1994, A Proposal for Research on Molecular Dynamics Algorithms, UNT Junior Faculty Summer Research Fellowship, $3,500.

CONSULTING AND OTHER PAID PROFESSIONAL ACTIVITIES

  • Advisory Board Member, NSF-funded BRIDGES project ("Broadening Identities for Diverse Youth in STEM through Socioenvironmental Problem Solving"), providing expertise on computational thinking exercises (2018 - present)
  • Siemens Science Competition, Computer Science Judge, Silver Spring, MD (2015)
  • Consultant, NC State University and Miami University of Ohio, NSF-funded CPATH project (education research), evaluating technical writing samples (2014)
  • Siemens Science Competition, Computer Science Judge, Princeton, NJ (2014)
  • Consultant, Department Review, Department of Computer Science, Bowling Green State University (2010)
  • Consultant, Computer Science Program Review, Department of Mathematics and Computer Science, University of Arkansas at Pine Bluff (2006-2007)
  • Expert Witness, intellectual property case involving data compression technology. Worked through the Silicon Valley Expert Witness Group. (2002)

PUBLICATIONS

Refereed Journal Papers:

  1. P. Sroufe, S. R. Tate, R. Dantu, E. Celikel. "Experiences During a Collegiate Cyber Defense Competition," Journal of Applied Security Research, Vol. 5, No. 3, 2010, pp. 382-396.
  2. S. P. Joglekar and S. R. Tate. "ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention," Journal of Universal Computer Science (JUCS), Vol. 11, No. 1, 2005, pp. 83-103.
  3. M.-Y. Kao and S. R. Tate. "Designing Proxies for Stock Market Indices is Computationally Hard," Quantitative Finance, Volume 1, Number 3, May 2001, pp. 361-371.
  4. J. H. Reif and S. R. Tate. "Fast Spatial Decomposition and Closest Pair Computation for Limited Precision Input", Algorithmica, Vol. 28, 2000, pp. 271-287.
  5. M.-Y. Kao and S. R. Tate. "On-Line Difference Maximization", SIAM Journal on Discrete Mathematics, Vol. 12, No. 1, 1999, pp. 78-90.
  6. S. R. Tate. "Band Ordering in Lossless Compression of Multispectral Images", IEEE Transactions on Computers, Vol. 46, No. 4, 1997, pp. 477-483.
  7. J. H. Reif and S. R. Tate. "On Dynamic Algorithms for Algebraic Problems", Journal of Algorithms, Vol. 22, No. 2, 1997, pp. 347-371.
  8. M. Kao, J. H. Reif, and S. R. Tate. "Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem", Information and Computation, Vol. 133, No. 1, 1996, pp. 63-80.
  9. S. R. Tate. "Stable Computation of the Complex Roots of Unity", IEEE Transactions on Signal Processing, Vol. 43, No. 7, 1995, pp. 1709-1711.
  10. J. H. Reif and S. R. Tate. "Approximate Kinodynamic Planning Using L2-norm Dynamic Bounds", Computers and Mathematics with Applications, Vol. 27, No. 5, 1994, pp. 29-44.
  11. J. H. Reif and S. R. Tate. "Continuous Alternation", Algorithmica, Vol. 10, 1993, pp. 151-181.
  12. J. H. Reif and S. R. Tate. "On Threshold Circuits and Polynomial Computation", SIAM Journal on Computing, Vol. 21, No. 5, October 1992, pp. 896-908.
  13. M. Kao and S. R. Tate. "Online Matching with Blocked Input", Information Processing Letters, Vol. 38, May 1991, pp. 113-116.
  14. J. H. Reif and S. R. Tate. "Optimal Size Integer Division Circuits", SIAM Journal on Computing, Vol. 19, No. 5, October 1990, pp. 912-924.

Refereed conference publications:

  1. S. R. Tate and R. Vishwanathan. "Expiration and Revocation of Keys for Attribute-Based Signatures," in Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec), 2015, pp.153-169.
  2. B. L. Kurtz, J. B. Fenwick, R. Tashakkori, A. Esmaili, and S. R. Tate. "Active Learning During Lecture Using Tablets," in Proceedings of the SIGCSE Technical Symposium, 2014, pp. 121-126.
  3. S. R. Tate, R. Vishwanathan, and S. Weeks. "Encrypted Secret Sharing and Analysis by Plaintext Randomization," in Proceedings of the 16th Information Security Conference, 2013, pp. 49-65.
  4. S. R. Tate, R. Vishwanathan, and L. Everhart. "Multi-user dynamic proofs of data possession using trusted hardware," Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY '13), 2013, pp. 353-364.
  5. S. R. Tate and R. Vishwanathan. "General Secure Function Evaluation Using Standard Trusted Computing Hardware," Proceedings of the 9th Annual Conference on Privacy, Security, and Trust (PST), 2011, pp. 221-228.
  6. L. S. Iyer, X. Zhao, A. Chow, and S. R. Tate. "Computer Science and Information Technology (CSIT) Identity: An Integrative Theory to Explain Gender Gap in IT," Proceedings of the International Conference on Information Systems (ICIS), 2011.
  7. Y. Kong, J. Deng, and S. R. Tate. "A Distributed Public Key Caching Scheme in Large Wireless Networks," Proceedings of the IEEE Global Telecommunications Conference - Communication & Information System Security (GLOBECOM '10), 2010.
  8. V. Gunupudi and S. R. Tate. "Timing-Accurate TPM Simulation for What-If Explorations in Trusted Computing," Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2010, pp. 171-178.
  9. S. R. Tate and R. Vishwanathan. "Performance Evaluation of TPM-based Digital Wallets," Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2010, pp. 179-186.
  10. S. R. Tate and R. Vishwanathan. "Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology," Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252-267.
  11. P. Yu and S. R. Tate. "Online/Offline Signature Schemes for Devices with Limited Computing Capabilities," RSA Conference 2008, Cryptographers' Track (CT-RSA), 2008, pp. 301-317.
  12. V. Gunupudi and S. R. Tate. "Generalized Non-interactive Oblivious Transfer using Count-Limited Objects with Applications to Secure Mobile Agents," 12th International Conference on Financial Cryptography and Data Security, 2008, pp. 98-112.
  13. P. Yu and S. R. Tate. "An Online/Offline Signature Scheme Based on the Strong RSA Assumption," 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), proceedings as part of the 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, pp. 601-606.
  14. V. Gunupudi and S. R. Tate. "Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules," 3rd IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), proceedings as part of the 21st International Conference on Advanced Information Networking and Applications Workshops, 2007, pp. 463-469.
  15. H. Ge and S. R. Tate. "A Direct Anonymous Attestation Scheme for Embedded Devices," Proceedings of the 10th International Conference on Theory and Practice of Public-Key Cryptography (PKC), 2007, pp. 16-30.
  16. V. Gunupudi and S. R. Tate. "Design of the SAgent Security Framework for JADE," Proceedings of the 18th Annual IASTED International Conference on Parallel and Distributed Computing and Systems (PDCS), 2006, pp. 90-95.
  17. V. Gunupudi and S. R. Tate. "Exploring Data Integrity Protection in SAgent," Proceedings of the International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE), 2006, pp. 35-49.
  18. V. Gunupudi, S. R. Tate, and K. Xu. "Experimental Evaluation of Security Protocols in SAgent," Proceedings of the International Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE), 2006, pp. 60-74.
  19. H. Ge and S. R. Tate. "Traceable Signature: Better Efficiency and Beyond," Proceedings of Applied Cryptography and Information Security (ACIS), 2006, pp. 327-337.
  20. H. Ge and S. R. Tate. "A Group Signature Scheme with Signature Claiming and Variable Linkability," Proceedings of the 25th IEEE International Performance, Computing, and Communications Conference (IPCCC), 2006, pp. 497-504.
  21. H. Ge and S. R. Tate. "Efficient Authenticated Key-Exchange for Devices with a Trusted Manager," Proceedings of the 3rd IEEE International Conference on Information Technology (ITNG) - Embedded Cryptographic Systems track, 2006, pp. 198-203.
  22. V. Gunupudi and S. R. Tate. "SAgent: A Security Framework for JADE," Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS), 2006, pp. 1116-1118.
  23. K. Xu and S. R. Tate. "Universally Composable Secure Mobile Agent Computation," Proceedings of the 7th International Conference on Information Security (ISC), 2004, pp. 304-317.
  24. V. Gunupudi and S. R. Tate. "Performance Evaluation of Data Integrity Mechanisms for Mobile Agents," Proceedings of the 2004 IEEE Conference on Information Technology: Coding and Computing (ITCC), Information Assurance and Security Track, 2004, pp. 62-69.
  25. S. P. Joglekar and S. R. Tate. "ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention," Proceedings of the 2004 IEEE Conference on Information Technology: Coding and Computing (ITCC), Information Assurance and Security Track, 2004, pp. 81-88.
  26. S. R. Tate and K. Xu. "Mobile Code Security Through Multi-Agent Cryptographic Protocols," Proceedings of the 4th International Conference on Internet Computing, 2003, pp. 462-468.
  27. M.-Y. Kao, A. Nolte, and S. R. Tate. "The Risk Profile Problem for Stock Portfolio Optimization," Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC), 2000, pp. 228-234.
  28. S. R. Tate and K. Xu. "General-Purpose Spatial Decomposition Algorithms: Experimental Results", Proceedings of the 2nd Workshop on Algorithm Engineering and Experimentation (ALENEX), 2000, pp. 197-216.
  29. M.-Y. Kao and S. R. Tate. "Designing Proxies for Stock Market Indices is Computationally Hard", Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1999, pp. 933-934.
  30. B. Chapin and S. R. Tate. "Higher Compression from the Burrows-Wheeler Transform by Modified Sorting", Proceedings of the Data Compression Conference (DCC), 1998, p. 532.
  31. M.-Y. Kao and S. R. Tate. "On-Line Difference Maximization", Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1997, pp. 175-182.
  32. J. H. Reif and S. R. Tate. "Dynamic Parallel Tree Contraction", Proceedings of the Symposium on Parallel Algorithms and Architecture (SPAA), 1994, pp. 114-121.
  33. S. R. Tate. "Band Ordering in Lossless Compression of Multispectral Images", Proceedings of the Data Compression Conference (DCC), 1994, pp. 311-320.
  34. J. H. Reif and S. R. Tate. "Dynamic Algebraic Algorithms", Proceedings of the Fifth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1994, pp. 290-301.
  35. J. H. Reif and S. R. Tate. "The Complexity N-body Simulation", 20th Annual International Conference on Automata, Languages, and Programming (ICALP), 1993, pp. 162-176.
  36. M. Kao, J. H. Reif, and S. R. Tate. "Searching in an Unknown Environment: An Optimal Randomized Algorithm for the Cow-Path Problem", Proceedings of the Fourth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), 1993, pp. 441-447.
  37. V. Pan, J. H. Reif, and S. R. Tate. "The Power of Combining the Techniques of Algebraic and Numerical Computing: Improved Approximate Multipoint Polynomial Evaluation and Improved Multipole Algorithms", Proceedings of the 33rd Annual Symposium on Foundations of Computer Science (FOCS), 1992, pp. 703-713.
  38. J. H. Reif and S. R. Tate. "Optimal Size Integer Division Circuits", Proceedings of the 21st Annual ACM Symposium on Theory of Computing (STOC), 1989, pp. 264-270.

Book chapters:

  1. S. R. Tate. "Randomized Searching on Rays or the Line," Encyclopedia of Algorithms, Springer-Verlag, 2016, pp. 1757-1759 (note: earlier version published in 2008, pp. 740-742).
  2. R. R. Panko and S. R. Tate. "Digital Signatures and Electronic Signatures," in The Handbook of Technology Management, Hossein Bidgoli, ed., John Wiley & Sons, 2009.
  3. M.-Y. Kao, A. Nolte, and S. R. Tate. "The risk profile problem for stock portfolio optimization," Chapter 11 in Computational Methods in Decision-Making, Economics, and Finance, Erricos Kontoghiorghes, Berc Rustem, and Stavros Siokos editors, by Kluwer Academic Publishers, 2002, pp. 211-228.
  4. S. R. Tate. "Complexity Measures", Chapter 2 in the Lossless Compression Handbook, Khalid Sayood editor, Academic Press, 2002.
  5. S. R. Tate. "Newton Iteration and Integer Division", Chapter 12 in Synthesis of Parallel Algorithms, edited by John H. Reif, pp. 539-572, 1993. San Mateo, CA: Morgan Kaufmann Publishers.

Thesis:

  1. S. R. Tate. "Arithmetic Circuit Complexity and Motion Planning", Ph. D. Dissertation, Duke University, 1991.

Technical reports, manuscripts:

  1. S. R. Tate and K. Xu. "On Garbled Circuits and Constant Round Secure Function Evaluation," CoPS Lab Technical Report 2003-02, 2003.
  2. J. H. Reif and S. R. Tate. "N-body Simulation II: Simulation of Moving Particles," University of North Texas Technical Report N-96-003, 1996.
  3. J. H. Reif and S. R. Tate. "N-body Simulation I: Fast Algorithms for Potential Field Evaluation and Trummer's Problem," University of North Texas Technical Report N-96-002, 1996.
  4. S. R. Tate. "Report on the Workshop on Data and Image Compression Needs and Uses in the Scientific Community," CESDIS Technical Report TR-93-99.
  5. S. R. Tate. "Lossless Compression of Region Edge Maps," Duke University Computer Science Technical Report CS-1992-09.

Book reviews:

  1. S. R. Tate. Review of Polynomial and Matrix Computations; Volume 1: Fundamental Algorithms by Dario Bini and Victor Pan. Appeared in SIGACT News, Vol. 26, No. 2, June 1995.

Presentations and non-peer reviewed publications:

  • S. Tate and H. Nemati. "A Multidisciplinary CURE in Information Security," UNC System Summit on Course-Based Undergraduate Research Experiences, May 2017.
  • S. Tate. "Certified Software for High-Assurance Security," IEEE Computer Society Chapter Meeting, North Carolina A&T University, February 2017.
  • S. Tate. "Industry-University Collaboration," (panel discussion with G. Dozier and R. Robless), Triad Developers Conference, Winston-Salem, NC, Feb 2016.
  • S. Tate. "State of Technology in the Triad," Triad Developers Guild Roundtable Discussion (with D. Douglas, R. Robless, B. Wallis, and B. Hitney), Dec 2012.
  • A. Chow, S. Tate, and L. Iyer. "Computer Science and Information Technology Identity Formation," STARS Celebration, August 2012, Hampton, VA.
  • S. Morrissett and S. Tate. "North Carolina Has Talent: Teachers and Students," North Carolina Department of Public Instruction, CTE Summer Conference, July 2011.
  • S. Tate. "Privacy in the Digital Age," Science on Tap (informal science presentations in Greensboro, NC), December 2009.
  • S. Tate. "Hardware-Assisted Security: The Power of Small Changes," Winston-Salem State University, February 2009.
  • S. Tate. "Trusted Computing: What it does, what it doesn't do, ... and what we don't know," UNC Wilmington, October 2008.
  • S. Tate. "Hardware-Assisted Security: The Power of Small Changes," Duke University, September 2008.
  • S. Tate. "Security Challenges for CS Students (or anyone else who creates applications)," Appalachian State University, March 2008.
  • H. Ge and S. R. Tate. "Efficient Authenticated Key-Exchange for Devices with a Trusted Manager," South Central Information Security Symposium, April 2006.
  • F. Chang, G. White, and S. Tate. "How to Build Lab Exercises and Capture the Flag Activities", panel at the 9th Colloquium for Information Systems Security Education, June 2005. (Our panel received the highest evaluation of any presentation or panel at this 4-day colloquium.)
  • V. Gunupudi and S. R. Tate. "A Security Framework for the JADE Mobile Agent Platform," South Central Information Security Symposium, April 2005.
  • S. Tate. "Security Protections for Mobile Agents," Southern Methodist University, August 2004.
  • K. Xu and S. R. Tate. "Universally Composable Secure Mobile Agent Computation," South Central Information Security Symposium, April 2004.
  • S. R. Tate and K. Xu. "On Garbled Circuits and Constant Round Secure Function Evaluation," CoPS Lab Technical Report 2003-02.
  • Invited presentation: "Mobile Agent Computation with Secret Data," the University of Texas at Arlington, April 2003.
  • K. Xu and S. R. Tate. "Privacy of Mobile Agent Data on Malicious Hosts Using Multi-Agent Protocols," South Central Information Security Symposium, April 2003.
  • V. Gunupudi and S. R. Tate. "A Flexible Object-Oriented Approach to Data Integrity in Mobile Agents," South Central Information Security Symposium, April 2003.
  • S. R. Tate and K. Xu. "Some Security Issues in a Garbled Circuit Construction," CRYPTO '03 Rump Session Presentation, 2003.
  • "Mobile Agent Security Through Multi-Agent Protocols," poster presentation at the NSF Cyber Trust Point Meeting, Baltimore, MD, August 2003.

TEACHING

  • Experience teaching a wide range of courses, including introductory undergraduate courses, assembly language, data structures, file structures, cryptography, computer security and secure electronic commerce courses (both undergraduate and graduate), mathematics for computer science, undergraduate and graduate algorithms, research-oriented special topics classes (including trusted computing and software security), and several advanced graduate seminars (topics: data compression, on-line algorithms, randomized algorithms, Java and network security, and cryptography and security).
  • Worked with other faculty to expand computer security courses at UNC Greensboro from a single course to a three-course series (with additional courses as "special topics" classes).
  • Created and maintained a five-module interactive Python tutorial, using Runestone Interactive tools; used in multiple UNCG classes (CSC 100, CSC 101, CSC 110, and CSC 120), and in UNCG's Master's in Informatics and Analytics "Python programming bootcamp" (2017 - present)
  • Re-implemented a "fractal explorer" in JavaScript, based on an earlier Java applet from Ron Eglash at Rensselaer Polytechnic Institute (RPI). This was used to teach recursive constructions in a culturally-situated context, and has been used in my UNCG CSC 100 class, as well as by RPI and others.
  • Created and led a Living-Learning Community for freshman computer science majors, 2014-2015.
  • Organizing committee and computer science lead, AToMS Living-Learning Community, a residential cohort-based learning community for computer science, chemistry, physics, and mathematics freshmen. 2012-2014.
  • Participated in the UNCG Veteran and Military Affiliate Education Institute, June 2013.
  • Member of the UNCG delegation to an AAC&U Summer Institute on Integrated Learning, Burlington, VT, July 2012.
  • Designed a custom version of the UC Berkeley "Beauty and Joy of Computing" class for UNC Greensboro (offered as CSC 100). While following the UC Berkeley outline, our version has a full set of locally-developed lectures and extensive lab exercises. Worked with teachers at a local high school (Weaver Academy) to offer this course at the high school as well. Designed around the College Board's "CS Principles" course/exam, we now offer credit for this class to high school students who make a 3 or better on the AP CS Principles exam. Offered for the first time Fall 2012.
  • Designed an innovative class (CSC 110: Computational Problem Solving), taking a creative approach to teaching mathematics concepts and problem-solving skills as part of the UNC Greensboro general education curriculum, 2009.
  • Organized and supervised a group of 6 directed study students who performed a formal security audit of the Department of Computer Science systems and network (Fall 2005).
  • Organized and coached a team of 8 students (including 2 from the Department of Information Technology and Decision Sciences) for participation in the 1st Texas Collegiate Cyber Defense Contest, San Antonio, April 2005 (travel funding from Microsoft).
  • Designed and established a multi-course sequence in computer security at both undergraduate and graduate levels at the University of North Texas. Applied for and received two federal certifications, showing a mapping of our computer security courses to two the Committee for National Security Systems (CNSS) training standards 4011 (for Information Security Professionals) and 4013 (for Secure System Administration).
  • Participated in teaching workshops on secure electronic commerce and network security (Washington D.C., March 2003; Tulsa, OK, July 2003).
  • Organized and supervised a group of three graduate students in the Honeynet Reverse Engineering Challenge, placing second in this international competition (May-June 2002).

Individual Student Mentoring

  • Supervised 13 master's students at UNCG (4 thesis; 9 project)
  • Mentored approximately 30 undergraduate students in Senior Project work, 2007-2018.
  • Mentored three students in UNCG Honors Contract courses and projects
  • Five graduated Ph.D. students at UNT (Brent Chapin, 2001; Ke Xu, 2004; He Ge, 2006; Vandana Gunupudi, 2007; Ping Yu, 2008).
  • Served or currently serving on 18 Ph.D. committees and 7 Master's committee at UNT (other than my own students).
  • External reviewer and Ph.D. committee member for a student (Elliott Landowne) at the City University of New York.
  • Supervised over a dozen students (both at undergraduate and graduate levels) in directed study and independent projects.

SERVICE ACTIVITIES

University/Department Service - UNC Greensboro:

  • C.S. Graduate Committee (Aug 2019 - present)
  • C.S. Personnel Committee (Aug 2019 - present)
  • C.S. Ph.D. program planning committee chair (Jan 2019 - present)
  • STAMPS (Science, Technology, and Mathematics Preparation Scholarships) Faculty Mentor (Aug 2017 - present)
  • Faculty Advisor: UNCG Cybersecurity/InfoSec Club (Fall 2012 - present)
  • UNCG Programming Contest Team Coach (2007 - present)
  • C.S. Department Head and member of the College of Arts and Sciences Administrative Council (Aug 2007 - July 2019)
  • UNCG RISE (Research and Instruction in STEM Education) Network, Advisory Board Member (2010-2019)
  • UNCG Computer Science Industry Advisory Board, organizer and lead (Dec 2008 - July 2019)
  • Academic Advising: Advised a regular load of 30-45 undergraduate majors each semester for course selection and planning
  • Faculty Advisor: UNCG Student ACM Chapter (2009 - 2019)
  • Faculty Advisor: UNCG STARS Computing Corps (2015 - 2018)
  • STARS Alliance, UNCG Academic Liaison (2011 - 2016)
  • STAMPS (Science, Technology, and Mathematics Preparation Scholarships) Executive Committee (Aug 2010 - July 2015)
  • Endowed professor nomination review and evaluation committee (2012 and 2013)
  • UNCG Institutional Effectiveness Committee (2009 - 2010)
  • UNCG Science Advisory Board (2008 - 2009)

University/Department Service - University of North Texas:

  • C.S. Department Personnel Affairs Committee (Sep 1999 - May 2001, Sep 2002 - present; Chair: Sep 2000 - May 2001, Sep 2002 - Aug 2004)
  • C.S. Department Research Enhancement Committee (Sep 2001 - Dec 2001, Sep 2002 - Aug 2005, Sep 2006 - present)
  • C.S. Department Faculty Search Committee (Sep 1996 - Aug 1998, Sep 2002 - May 2003, Sep 2005 - Aug 2006)
  • C.S. Department Graduate Committee (Sep 1993 - Aug 1994, Sep 1995 - Aug 2001; Chair: Sep 1996 - Aug 2001, Sep 2004 - Aug 2005, Sep 2006 - present)
  • C.S. Department Undergraduate Committee (Sep 1994-Aug 1996, Sep 2001 - Dec 2001)
  • C.S. Department Executive Committee (July 1995 - Aug 2000, Sep 2005 - present)
  • Ad-hoc Department PhD Program Evaluation Committee (Sep 2005 - Aug 2006)
  • Ad-hoc Department Committee on Merit Evaluation(May 2006 - present)
  • C.S. Department Chair Search Committee (Oct 1999 - May 2001)
  • Member of the Executive Committee, Texas Center for Digital Knowledge (TxCDK), Nov 2003 - Aug 2005.
  • Math Department Faculty Search Committee, external member (Sep 1999 - Aug 2000)
  • UNT Committee for Implementation of Electronic Transmission of Theses and Dissertations (Dec 1997 - May 1998)
  • UNT College of Engineering Founding Dean Search Committee (May 2002 - Dec 2002)
  • College of Engineering appeal/grievance committees, Spring 2004 and Spring 2005.
  • Search Committee, UNCG Department of Information System and Operations Management, Department Head Search, 2011-2012.
  • Computer Science Graduate Coordinator/Advisor and chair of the graduate committee (Sep 1996 - Aug 2001).
  • Area coordinator for Algorithms comprehensive exam. Spring 1994, Spring 1996, Fall 1996, Spring 1998, Spring 2001, Fall 2002, Fall 2004.
  • Faculty advisor for the Computer Science Graduate Student Association (Dec 1996 - May 1998).
  • Faculty advisor for the student ACM chapter (Feb 1995 - Aug 2001).
  • Served as official Computer Science contact to the College of Education (Feb 1995 - Jan 1998). Involved preparation of materials for COE review by the National Council for Accreditation of Teacher Education (NCATE).

Community-Based Service and Outreach:

  • Computer Science Teachers Association (CSTA), North Carolina Piedmont Chapter, Vice President (2011 - present)
  • Hosted "Internet of Things" forum at UNCG, with sponsorship from IBM and Meridian IT - over 100 attendees (2016)
  • FIRST Robotics outreach and volunteering
    • FIRST Lego League (FLL), keynote speaker at regional competitions (2014 and 2015)
    • FIRST Tech Challenge (FTC) team mentoring (Grimsley High School 2013-2015 and Northwest Guilford High School 2016-2017)
    • FIRST Robotics Competition (FRC) team coach (Grimsley High School 2013-2015) and volunteer (Flying Platypi community team 2015-2016)
  • Featured on two Fox 8 news stories (Wi-Fi security on Nov 25, 2014; E-mail security on Oct 9, 2014)
  • Organized "Computer Science Day" events with the UNCG STARS Computing Corps for high school students and teachers (2011, 2012, 2013, and 2015)
  • "IT is for Girls" - created with Lakshmi Iyer as weekend events in 2009-2010, and expanded to week-long summer camps in 2011. Significant involvement through 2014 (events have continued with other leadership through 2019).
  • Computer Science introductory/motivational presentations for high school students (Weaver Academy and Ragsdale High School, 2011-2016)
  • Career day representative, Northwest Guilford High School (2009)

Service to the Profession:

  • Louisiana Board of Regents Departmental Enhancement proposal review panel chair (2018-2019)
  • NSF Review Panels member - multiple panels (2000, 2003, 2006, 2008, 2010, 2018).
  • Reviewer for NASA (National Aeronautics and Space Administration) grant proposals (2009, 2015).
  • External reviewer for Central Michigan University internal grant competition (2012).
  • External reviewer for promotion and tenure cases in the U.S. and Canada (2008, 2009, 2013, 2017).
  • Regular conference program committee memberships, including (some multiple years): Colloquium for Information Systems Security Education (CISSE), International Symposium on Information Assurance and Security, Workshop on Information Assurance (WIA), Hawaii International Conference on System Sciences (HICSS), International Workshop on Security in Networks and Distributed Systems (SSNDS), IASTED International Conference on Communication, Network and Information Security (CNIS), International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN), International Conference on Information Warfare and Security (ICIW), International Conference on Information Security and Assurance (ISA), IEEE International Conference on Distributed Computing Systems (ICDCS), International Conference on Autonomic and Trusted Computing (ATC), Secure Knowledge Management Workshop (SKM), and South Central Information Security Symposium (SCISS).
  • At-conference activities (session chair, etc.) including: International Conference on Internet Computing, Information Assurance and Security (IAS), International Conference on Information Security (ISC), and IFIP WG 11.3 Working Conference on Data and Application Security (DBSec).
  • Refereed papers for many journals and conferences, including SIAM Journal on Computing, Journal of Algorithms, Algorithmica, Information and Computation, Journal of Combinatorial Optimization, Journal of Systems and Software, Journal of Universal Computer Science, Journal of Systems and Software, Journal of Parallel, Emergent and Distributed Systems, the ACM-SIAM Symposium on Discrete Algorithms, Computers and Mathematics with Applications, IEEE Trans. on Dependable and Secure Computing, IEEE Trans. on Information Theory, IEEE Trans. on Parallel and Distributed Processing, IEEE Trans. on Image Processing, IEEE Trans. on Mobile Computing, IEEE Trans. on Computers, Mathematical Problems in Engineering, Transactions on Emerging Telecommunications Technologies, Transactions on Reliability, Neural Computing and Applications, Parallel Processing Letters, Information Processing Letters, the Internet Encyclopedia, The Handbook of Information Security, the Symposium on Theoretical Aspects of Computer Science, the Workshop on Wireless Mobile Multimedia, the Journal of Information Science and Engineering, the Journal of Visual Communication and Image Representation, PLOS (Public Library of Science) One, the IEEE International Conference on Information Reuse and Integration, the IEEE International Conference on Information Technology: Coding and Computing (ITCC), the International Parallel Processing Symposium, and the ACM Computer Science Conference.
  • Reviewed books and book chapters for Introduction to Data Compression by Khalid Sayood, Cryptography and Network Security: Principles and Practice by William Stallings, and others.

SOFTWARE

  • Major port of PPP (Point-to-Point Protocol) software to DEC OSF/1, including kernel drivers and user-level support software. This software has been widely distributed, being obtained by users from many other states and foreign countries, and was subsequently included with the official distribution of Digital UNIX (beginning with version 4.0). Last version released by me November, 1996.
  • Graphical policy browser/analyzer for Security-Enhanced Linux. Last version released March, 2002. Available at http://cops.csci.unt.edu/projects/selinux/main.html
  • SAgent security framework for the JADE mobile agent platform (over 10,000 lines of code). Available at http://cops.csci.unt.edu/sagent.
  • Extensible, Timing-Accurate TPM Simulator. Available at https://span.uncg.edu/tpmsim.html (developed with V. Gunupudi, A. Kilgore, S. Rangaraju, and R. Vishwanathan).
  • JavaScript Fractal Explorer. Modern re-implementation of an earlier Java Applet from the "Culturally Situated Design Tools" project at RPI. Available at https://github.com/srtate/fracexpl.