The Department of Computer Science has an accredited undergraduate program that offers specialized ‘tracks’ of study in key areas. Undergraduates are prepared by graduation for pursuing a computing career or for graduate study. Our active corporate partners program offers internships and permanent employment to our students. Students are encouraged to participate in research experiences during their studies. Capstone courses provide significant team project experiences. The graduate program offers M.S. and Ph.D. degrees, emphasizing thesis work both at the main campus in Blacksburg and at the Northern Virginia Center. About two-thirds of the graduate students are pursuing the Ph.D. degree. The faculty, among whom there are 12 NSF or DOE CAREER Award winners, are active researchers who are visible contributors to the profession and have achieved significant honors.

Sub-communities within this community

Collections in this community

Recent Submissions

  • Got the Flu (or Mumps)? Check the Eigenvalue! 

    Prakash, B. Aditya; Chakrabarti, Deepayan; Faloutsos, Michalis; Valler, Nicholas; Faloutsos, Christos (Virginia Tech, 2010-03-30)
    For a given, arbitrary graph, what is the epidemic threshold? That is, under what conditions will a virus result in an epidemic? We provide the super-model theorem, which generalizes older results in two important, orthogonal ...
  • Forecasting the Flu: Designing Social Network Sensors for Epidemics 

    Shao, Huijuan; Hossain, K.S.M. Tozammel; Wu, Hao; Khan, Maleq; Vullikanti, Anil; Prakash, B. Aditya; Marathe, Madhav; Ramakrishnan, Naren (Virginia Tech, 2016-03-08)
    Early detection and modeling of a contagious epidemic can provide important guidance about quelling the contagion, controlling its spread, or the effective design of countermeasures. A topic of recent interest has been to ...
  • Predicting Complications in Critical Care Using Heterogeneous Clinical Data 

    Huddar, Vijay; Desiraju, Bapu Koundinya; Rajan, Vaibhav; Bhattacharya, Sakyajit; Roy, Shourya; Reddy, Chandan K. (IEEE, 2016-10-19)
    Patients in hospitals, particularly in critical care, are susceptible to many complications affecting morbidity and mortality. Digitized clinical data in electronic medical records can be effectively used to develop machine ...
  • A large-scale RNA interference screen identifies genes that regulate autophagy at different stages 

    Guo, Sujuan; Pridham, Kevin J.; Virbasius, Ching-Man; He, Bin; Zhang, Liqing; Varmark, Hanne; Green, Michael R.; Sheng, Zhi (Nature Publishing Group, 2018-02-12)
    Dysregulated autophagy is central to the pathogenesis and therapeutic development of cancer. However, how autophagy is regulated in cancer is not well understood and genes that modulate cancer autophagy are not fully ...
  • GPU Power Prediction via Ensemble Machine Learning for DVFS Space Exploration 

    Dutta, Bishwajit; Adhinarayanan, Vignesh; Feng, Wu-chun (Department of Computer Science, Virginia Polytechnic Institute & State University, 2018-02-02), TR-18-01
    A software-based approach to achieve high performance within a power budget often involves dynamic voltage and frequency scaling (DVFS). Consequently, accurately predicting the power consumption of an application at different ...
  • Measuring the Insecurity of Mobile Deep Links of Android 

    Lui, Fang; Wang, Chun; Pico, Andres; Yao, Danfeng; Wang, Gang (USENIX, 2017-08)
    Mobile deep links are URIs that point to specific locations within apps, which are instrumental to web-to-app communications. Existing “scheme URLs” are known to have hijacking vulnerabilities where one app can freely ...
  • CCS 2017- Women in Cyber Security (CyberW) Workshop 

    Yao, Danfeng (Daphne); Bertino, Elisa (ACM, 2017)
    The CyberW workshop is motivated by the significant gender imbalance in all security conferences, in terms of the number of publishing authors, PC members, organizers, and attendees. What causes this gender imbalance remains ...
  • FastViromeExplorer: a pipeline for virus and phage identification and abundance profiling in metagenomics data 

    Tithi, Saima Sultana; Aylward, Frank O.; Jensen, Roderick V.; Zhang, Liqing (PeerJ, 2018-01-12)
    With the increase in the availability of metagenomic data generated by next generation sequencing, there is an urgent need for fast and accurate tools for identifying viruses in host-associated and environmental samples. ...
  • Herbicide injury induces DNA methylome alterations in Arabidopsis 

    Kim, G; Clarke, CR; Larose, H; Tran, HT; Haak, DC; Zhang, L; Askew, S; Barney, J; Westwood, JH (PEERJ INC, 2017-07-20)
    The emergence of herbicide-resistant weeds is a major threat facing modern agriculture. Over 470 weedy-plant populations have developed resistance to herbicides. Traditional evolutionary mechanisms are not always sufficient ...
  • UPS-indel: a Universal Positioning System for Indels 

    Hasan, Mohammad Shabbir; Wu, Xiaowei; Watson, Layne T.; Li, Zhiyi; Zhang, Liqing (Nature, 2017-10-26)
    Storing biologically equivalent indels as distinct entries in databases causes data redundancy, and misleads downstream analysis. It is thus desirable to have a unified system for identifying and representing equivalent ...
  • Cooperative Object Manipulation in Collaborative Virtual Environments 

    Pinho, Marcio S.; Bowman, Doug A.; Dal Sasso Freitas, Carla M. (Springer Nature, 2008-06-20)
    Cooperative manipulation refers to the simultaneous manipulation of a virtual object by multiple users in an immersive virtual environment (VE). In this work, we present techniques for cooperative manipulation based on ...
  • Secure Coding Practices in Java: Challenges and Vulnerabilities 

    Meng, Na; Nagy, Stefan; Yao, Daphne; Zhuang, Wenjie; Argoty, Gustavo Arango (Virginia Tech, 2017-09-28)
    Java platform and third-party libraries provide various security features to facilitate secure coding. However, misusing these features can cost tremendous time and effort of developers or cause security vulnerabilities ...
  • Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths 

    Shu, Xiaokui; Yao, Danfeng (Daphne); Ramakrishnan, Naren (ACM, 2015-10)
    Modern stealthy exploits can achieve attack goals without introducing illegal control flows, e.g., tampering with noncontrol data and waiting for the modified data to propagate and alter the control flow legally. Existing ...
  • Enterprise data breach: causes, challenges, prevention, and future directions 

    Cheng, Long; Liu, Fang; Yao, Danfeng (Daphne) (Wiley, 2017)
    A data breach is the intentional or inadvertent exposure of confidential information to unauthorized parties. In the digital era, data has become one of the most critical components of an enterprise. Data leakage poses ...
  • Towards Optimal Secure Distributed Storage Systems with Exact Repair 

    Tandon, Ravi; Amuru, SaiDhiraj; Clancy, T. Charles; Buehrer, R. Michael (IEEE, 2016-06)
    Distributed storage systems in the presence of a wiretapper are considered. A distributed storage system (DSS) is parameterized by three parameters (𝑛, 𝑘, 𝑑), in which a file stored across n distributed nodes, can be ...
  • Intrusion Detection System for Applications using Linux Containers 

    Abed, Amr S.; Clancy, Charles; Levy, David S. (Springer, 2015-12-09)
    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical ...
  • A Modest Proposal for Open Market Risk Assessment to Solve the Cyber-Security Problem 

    O’Shea, Timothy J.; Mondl, Adam; Clancy, T. Charles (Virginia Tech, 2016-04-29)
    We introduce a model for a market based economic system of cyber-risk valuation to correct fundamental problems of incentives within the information technology and information processing industries. We assess the makeup ...
  • Opinion: Mathematical models: A key tool for outbreak response 

    Lofgren, Eric T.; Halloran, M. Elizabeth; Rivers, Caitlin M.; Drake, John M.; Porco, Travis C.; Lewis, Bryan; Yang, Wan; Vespignani, Alessandro; Shaman, Jeffrey; Eisenberg, Joseph N.S.; Eisenberg, Marisa C.; Marathe, Madhav; Scarpino, Samuel V.; Alexander, Kathleen A.; Meza, Rafael; Ferrari, Matthew J.; Hyman, James M.; Meyers, Lauren A.; Eubank, Stephen (NAS, 2015-01-13)
    The 2014 outbreak of Ebola in West Africa is unprecedented in its size and geographic range, and demands swift, effective action from the international community. Understanding the dynamics and spread of Ebola is critical ...
  • Improving somatic variant identification through integration of genome and exome data 

    Vijayan, Vinaya; Yiu, Siu-Ming; Zhang, Liqing (2017-10-16)
  • Describing the Relationship between Cat Bites and Human Depression Using Data from an Electronic Health Record 

    Hanauer, David A.; Ramakrishnan, Naren; Seyfried, Lisa S. (PLOS, 2013-08-01)
    Data mining approaches have been increasingly applied to the electronic health record and have led to the discovery of numerous clinical associations. Recent data mining studies have suggested a potential association between ...

View more