The Department of Computer Science has an accredited undergraduate program that offers specialized ‘tracks’ of study in key areas. Undergraduates are prepared by graduation for pursuing a computing career or for graduate study. Our active corporate partners program offers internships and permanent employment to our students. Students are encouraged to participate in research experiences during their studies. Capstone courses provide significant team project experiences. The graduate program offers M.S. and Ph.D. degrees, emphasizing thesis work both at the main campus in Blacksburg and at the Northern Virginia Center. About two-thirds of the graduate students are pursuing the Ph.D. degree. The faculty, among whom there are 12 NSF or DOE CAREER Award winners, are active researchers who are visible contributors to the profession and have achieved significant honors.

Sub-communities within this community

Collections in this community

Recent Submissions

  • Comprehensive off-target analysis of dCas9-SAM-mediated HIV reactivation via long noncoding RNA and mRNA profiling 

    Zhang, Yonggang; Arango, Gustavo; Li, Fang; Xiao, Xiao; Putatunda, Raj; Yu, Jun; Yang, Xiao-Feng; Wang, Hong; Watson, Layne T; Zhang, Liqing; Hu, Wenhui (2018-09-10)
    Abstract Background CRISPR/CAS9 (epi)genome editing revolutionized the field of gene and cell therapy. Our previous study demonstrated that a rapid and robust reactivation of ...
  • BenchPrime: Accurate Benchmark Subsetting with Optimized Clustering Algorithm Selection 

    Liu, Qingrui; Wu, Xiaolong; Kittinger, Larry; Levy, Markus; Jung, Changhee (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-08-24), TR-18-06
    This paper presents BenchPrime, an automated benchmark analysis toolset that is systematic and extensible to analyze the similarity and diversity of benchmark suites. BenchPrime takes multiple benchmark suites and their ...
  • Computational Identification of Tissue-Specific Splicing Regulatory Elements in Human Genes from RNA-Seq Data 

    Badr, Eman; ElHefnawi, Mahmoud; Heath, Lenwood S. (PLOS, 2016-11-18)
    Alternative splicing is a vital process for regulating gene expression and promoting proteomic diversity. It plays a key role in tissue-specific expressed genes. This specificity is mainly regulated by splicing factors ...
  • A Composable Workflow for Productive FPGA Computing via Whole-Program Analysis and Transformation (with Code Excerpts) 

    Sathre, Paul; Helal, Ahmed; Feng, Wu (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-07-24), TR-18-05
    We present a composable workflow to enable highly-productive heterogeneous computing on FPGAs. The workflow consists of a trio of static analysis and transformation tools: (1) a whole-program, source-to-source translator ...
  • Keystroke-Dynamics Authentication Against Synthetic Forgeries 

    Stefan, Deian; Yao, Danfeng (Daphne) (IEEE, 2010)
    We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called ...
  • Personal Anomaly Detection and Smart-Phone Security 

    Xiong, Huijun; Yao, Danfeng (Daphne) (Virginia Tech, 2010-04-22)
    Mobile devices increasingly become the computing platform for networked applications such as Web and email. This development requires strong guarantees on the system integrity and data security of mobile devices against ...
  • Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing 

    Shu, Xiaokui; Zhang, Jing; Yao, Danfeng (Daphne); Feng, Wu-Chun (ACM, 2015-03)
    The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., ...
  • A Declarative Approach to Hardening Services Against QoS Vulnerabilities 

    Kwon, Young-Wo; Tilevich, Eli (IEEE, 2011)
    The Quality of Service (QoS) in a distributed service-oriented application can be negatively affected by a variety of factors. Network volatility, hostile exploits, poor service management, all can prevent a service-oriented ...
  • User-Centric Dependence Analysis For Identifying Malicious Mobile Apps 

    Elish, Karim O.; Yao, Danfeng (Daphne); Ryder, Barbara G. (IEEE, 2012)
    This paper describes an efficient approach for identifying malicious Android mobile applications through specialized static program analysis. Our solution performs offline analysis and enforces the normal properties of ...
  • Provably Secure Anonymous-yet-Accountable Crowdsensing with Scalable Sublinear Revocation 

    Rahaman, Sazzadur; Cheng, Long; Yao, Danfeng (Daphne); Li, He; Park, Jung-Min (Jerry) (De Gruyter Open, 2017)
    Group signature schemes enable anonymous-yetaccountable communications. Such a capability is extremely useful for applications, such as smartphone-based crowdsensing and citizen science. However, the performance of modern ...
  • DIMPL: a distributed in-memory drone flight path builder system 

    Shukla, Manu; Chen, Zhiqian; Lu, Chang-Tien (2018-07-12)
    Abstract Drones are increasingly being used to perform risky and labor intensive aerial tasks cheaply and safely. To ensure operating costs are low and flights autonomous, their flight plans must be pre-built. ...
  • Co-located Collaborative Play in Virtual Environments for Group Learning in Museums 

    Apostolellis, Panagiotis (ACM, 2014-06)
    Having witnessed the unexplored potential of co-located group collaboration in contemporary museums, the proposed research aims to identify which elements of collaborative virtual environments and serious games can be ...
  • Designing for Schadenfreude (or, how to express well-being and see if youʼre boring people) 

    André, Paul; Schraefel, M.C.; Dix, Alan; White, Ryen W.; Bernstein, Michael; Luther, Kurt (ACM, 2010)
    This position paper presents two studies of content not normally expressed in status updates—well-being and status feedback—and considers how they may be processed, valued and used for potential quality-of-life benefits ...
  • CrowdLayout: Crowdsourced Design and Evaluation of Biological Network Visualizations 

    Singh, Divit P.; Lisle, Lee; Murali, T.M.; Luther, Kurt (ACM, 2018-04)
    Biologists often perform experiments whose results generate large quantities of data, such as interactions between molecules in a cell, that are best represented as networks (graphs). To visualize these networks and ...
  • Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers 

    Gang, Wang; Wang, Tianyi; Zheng, Haitao; Zhao, Ben Y. (USENIX, 2014-08)
    Recent work in security and systems has embraced the use of machine learning (ML) techniques for identifying misbehavior, e.g. email spam and fake (Sybil) users in social networks. However, ML models are typically derived ...
  • Social Turing Tests: Crowdsourcing Sybil Detection 

    Wang, Gang; Mohanlal, Manish; Wilson, Christo; Wang, Xiao; Metzger, Miriam; Zheng, Haitao; Zhao, Ben Y. (Internet Society, 2013-02)
    As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils ...
  • Detecting Malicious Landing Pages in Malware Distribution Networks 

    Wang, Gang; Stokes, Jack W.; Herley, Cormac; Felstead, David (IEEE, 2013-06)
    Drive-by download attacks attempt to compromise a victim’s computer through browser vulnerabilities. Often they are launched from Malware Distribution Networks (MDNs) consisting of landing pages to attract traffic, ...
  • MOANA: Modeling and Analyzing I/O Variability in Parallel System Experimental Design 

    Cameron, Kirk W.; Anwar, Ali; Cheng, Yue; Xu, Li; Li, Bo; Ananth, Uday; Lux, Thomas; Hong, Yili; Watson, Layne T.; Butt, Ali R. (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-19), TR-18-04
    Exponential increases in complexity and scale make variability a growing threat to sustaining HPC performance at exascale. Performance variability in HPC I/O is common, acute, and formidable. We take the first step towards ...
  • Modeling Influence using Weak Supervision: A joint Link and Post-level Analysis 

    Chen, Liangzhe; Prakash, B. Aditya (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-09), TR-18-03
    Microblogging websites, like Twitter and Weibo, are used by billions of people to create and spread information. This activity depends on various factors such as the friendship links between users, their topic interests ...
  • Segmentations with Explanations for Outage Analysis 

    Chen, Liangzhe; Muralidhar, Nikhil; Chinthavali, Supriya; Ramakrishnan, Naren; Prakash, B. Aditya (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-04-09), TR-18-02
    Recent hurricane events have caused unprecedented amounts of damage and severely threatened our public safety and economy. The most observable (and severe) impact of these hurricanes is the loss of electric power in many ...

View more