Dr. Sajal K. Das
Professor and Daniel St. Clair Endowed Chair
Department of Computer Science
315 Computer Science Bldg.
Missouri University of Science and Technology
Rolla, MO 65409
(573) 341-7708
Personal Web-Site: Sajal Das

Ph.D., University of Central Florida, Orlando, Computer Science, 1988
M.S., Indian Institute of Science, Bangalore, Computer Science, 1984
B.S., Calcutta University, India, Computer Science and Engineering, 1983

Please also visit ORCID ID:  https://orcid.org/0000-0002-9471-0868

Full CV

Areas of Interest

Cyber-Physical Systems; Security and Privacy; Smart Environments (Smart City, Smart Grid, Smart Healthcare); IoTs; Wireless and Sensor Networks; Mobile and Pervasive Computing; Big Data Analytics; Parallel, Distributed, and Cloud Computing; Social Networks; Systems Biology; Applied Graph Theory and Game Theory.

Selected Recent Publications (for full publications list, please refer to Full CV above)

Journals

  1. S. Bhattacharjee and S. K. Das, “Detection and Forensics against Stealthy Data Falsification in Smart Metering Infrastructure,” IEEE Trans. on Dependable and Secure Computing, to appear, 2019.
  2. S. Bhattacharjee, N. Ghosh, V. K. Shah and S. K. Das“QnQ: Quality and Quantity based Unified Approach for Secure and Trustworthy Mobile Crowdsensing,” IEEE Trans. on Mobile Computing, 2019.
  3. M. Tiloca, D. De Guglielmo, G. Dini, G. Anastasi and S. K. Das“DISH: Distributed Shuffling against Selective Jamming Attack in IEEE 802.15.4e TSCH Networks,” ACM Trans. on Sensor Networks, to appear, 2019.
  4. A. Sturaro, S. Silvestri, M. Conti, and S. K. Das, “A Realistic Model for Failure Propagation in Interdependent Cyber-Physical Systems,” IEEE Trans. on Network Science and Engineering (Special Issue on Network Science for High-Confidence Cyber-Physical Systems), to appear, 2019.
  5. F. Restuccia, P. Ferraro, S. Silvestri, S. K. Das, and G. Lo Re, “IncentMe: Effective Mechanism Design to Stimulate Crowdsensing Participants with Uncertain Mobility,” IEEE Trans. on Mobile Computing, to appear, 2019.
  6. F. Restuccia, P. Ferraro, T.S. Sanders, S. Silvestri, S. K. Das, and G. Lo Re, “FIRST: A Framework for Optimizing Information Quality in Mobile Crowdsensing Systems,” ACM Trans. on Sensor Networks, accepted to appear, 2018.
  7. S. Srinivasan, S. Bhowmick, S. D. Pollard, B. Norris, and S. K. Das, “A Shared-Memory Algorithm for Updating Tree-Based Properties of Large Dynamic Networks,” IEEE Trans. on Big Data (Special Issue on the Integration of Extreme Scale Computing and Big Data Management and Analytics), accepted to appear, 2018.
  8. P. Bharti, D. De, S. Chellappan, and S. K. Das, “HuMAn: Complex Activity Recognition with Multi-modal Multi-positional Body Sensing,” IEEE Trans. on Mobile Computing, accepted to appear, 2018.
  9. V. K. Shah, S. Bhattacharjee, S. Silvestri, and S. K. Das, “Designing Green Communication Systems for Smart and Connected Communities via Dynamic Spectrum Access,” ACM Trans. on Sensor Networks, to appear, 2018.
  10. C. Vallati, S. Brienza, G. Anastasi, and S. K. Das, “Improving Network Formation in 6TiSCH Networks,” IEEE Trans. on Mobile Computing, accepted to appear, 2018..
  11. Y. Wan, J. Yan, Z. Lin, V. Sheth, and S. K. Das, “On the Structural Perspective of Computational Effectiveness for Quantized Consensus in Layered UAV Networks,” IEEE Trans. on Control of Network Systems, accepted to appear, 2018.
  12. S. K. Das, “Mobility Management – A Personal Perspective,” Computer Communications (40th Anniversary Commemorative Edition), 131: 26-31, Dec 2018.
  13. D. Mascitti, M. Conti, A. Passarella, L. Ricci, and S. K. Das“Service Provisioning in Mobile Environments through Opportunistic Computing,” IEEE Trans. on Mobile Computing, 17(12: 2898-2911, Dec 2018.
  14. Q.-Y. Zhang, X.-W. Wang, M. Huang, K. Li, and S. K. Das, “Software Defined Networking Meets Information Centric Networking: A Survey,” IEEE Access, 6(1): 39547-39563, Dec 2018.
  15. M. Hassan, W. Hu, G. Lan, S. Khalifa, A. Seneviratne, and S. K. Das, “Kinetic-Powered Wearable IoT for Healthcare: Challenges and Opportunities,” IEEE Computer, 51(9): 64-74, 2018.
  16. A. Pratap, R. Singhal, R. Misra, and S. K. Das, “Distributed Randomized k-Clustering based PCID Assignment for Ultra-Dense Femtocellular Networks,” IEEE Trans. on Parallel and Distributed Systems, 29(6): 1247-1260, June 2018.
  17. S. Khalifa, G. Lan, M. Hassan, A. Seneviratne, and S. K. Das, “HARKE: Human Activity Recognition from Kinetic Energy Harvesting Data in Wearable Devices,” IEEE Trans. on Mobile Computing, 17(6): 1353-1368, June 2018.
  18. F. Gu, J. Niu, S. K. Das, and Z. He, “RunnerPal: A Runner Monitoring and Advisory System Based on Smart Devices,” IEEE Trans. on Service Computing (Special Issue on Mobile and Cloud Services for Digital Health), 11(2): 262-276, Mar/Apr 2018.
  19. A. Rahim, X. Kong, F. Xia, Z. Ning, N. Ullah, J. Wang, S. K. Das, “Vehicular Social Networks: A Survey,” Pervasive and Mobile Computing, 43: 96-113, Jan 2018.
  20. M. Ding, D. Lopez, G. Mao, Z. Lin, and S. K. Das, “DNA-GA: A Tractable Approach for Performance Analysis of Uplink Cellular Networks,” IEEE Trans. on Communications, 66(1): 355-369, Jan 2018.
  21. S. Saha, S. Nandi, R. Verma, S. Sengupta, V. Sinha, and S. K. Das, “Design of Efficient Lightweight Strategies to Combat DoS Attack in Delay Tolerant Network Routing,” Wireless Networks, 24(1): 173-194, 2018.
  22. A. De Paola, P. Ferraro, S. Gaglio, G. Lo Re, and S. K. Das, "An Adaptive Bayesian System for Context-Aware Data Fusion in Smart Environments," IEEE Trans. on Mobile Computing, 16(6): 1505-1512, June 2017.
  23. M. Tiloca, D. De Guglielmo, G. Dini, G. Anastasi, and S. K. Das, “JAMMY: A Distributed and Self-Adaptive Solution against Selective Jamming Attack in TDMA WSNs,” IEEE Trans. on Dependable and Secure Computing, 14(4): 392-405, July-Aug 2017.
  24. N. Marchang, R. Dutta, and S. K. Das, “A Novel Approach for Efficient Usage of Intrusion Detection System in Mobile Ad Hoc Networks,” IEEE Trans. on Vehicular Technology, 66(2): 1684-1695, 2017.
  25. S. Tan, D. De, W.-Z. Song, J. Yang, and S. K. Das, “Survey of Security Advances in Smart Grid: A Data Driven Approach,” IEEE Communications Surveys and Tutorials, 18(1): 397-422, 2017.
  26. F. Restuccia, N. Ghosh, S. Bhattacharjee, S. K. Das, and T. Melodia, “Quality of Information in Mobile Crowdsensing: Survey and Research Challenges” ACM Trans. on Sensor Networks, 13(4): 34:1-34:43, 2017.
  27. W. Liang, Z. Xu, W. Xu, J. Shi, G. Mao, and S. K. Das, “Approximation Algorithms for Charging Reward Maximization in Rechargeable Sensor Networks via A Mobile Charger,” IEEE/ACM Trans. on Networking, 25(5): 3161-3174, Oct 2017.
  28. M. Conti, A. Passarella, and S. K. Das, " The Internet of People (IoP): A New Wave in Pervasive Computing," Pervasive and Mobile Computing, 41: 1-27, Oct 2017.
  29. N. Ghosh, D. Chatterjee, S. K. Ghosh, and S. K. Das, “Securing Loosely-coupled Collaboration in Cloud Environment through Dynamic Detection and Removal of Access Conflicts,” IEEE Trans. on Cloud Computing, 4(3): 349-362, July-Sept 2016.
  30. N. Roy, A. Misra, S. K. Das, and C. Julien, “Determining Quality- and Energy-Aware Multiple Contexts in Pervasive Computing Environments,” IEEE/ACM Trans. on Networking, 24(5): 3026-3042, Oct 2016.
  31. T. Luo, S. S. Kanhere, S. K. Das, and H.-P. Tan, “Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests,” IEEE Trans. on Mobile Computing, 15(9): 2234-2246, 2016.
  32. T. Luo, S. K. Das, H.-P. Tan, and L. Xia, “Incentive Mechanism Design for Crowdsourcing: An All-Pay Auction Approach,” ACM Trans. on Intelligent Systems and Technology, 7(3): 1-26, 2016.
  33. S. K. A. Imon, A.Khan, M. Di Francesco, and S. K. Das, "Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree-based Wireless Sensor Networks," IEEE/ACM Trans. on Networking, 23(5): 1401-1415, Oct. 2015.
  34. F. Ye, Y. Qian, R. Q. Hu, and S. K. Das, “Reliable Energy-Efficient Uplink Transmission for Neighborhood Area Networks in Smart Grid,” IEEE Trans. on Smart Grid (special issue on Cyber Physical Systems and Security for Smart Grid), 6(5): 2179-2188, May 2015.
  35. M. Raj, N. Li, D. Liu, M. Wright, and S. K. Das, “Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks,” Pervasive and Mobile Computing, 11(2): 244-260, 2014.
  36. N. Li and S. K. Das, “A Trust-based Framework for Data Forwarding in Opportunistic Networks,” Ad Hoc Networks (Special Issue on Wireless Communication in Challenged Environments), 11(4): 1497-1509, 2013.
  37. Y. Sun, H. Luo, and S. K. Das, “A Trust-based Framework for Fault-tolerant Data Aggregation in Wireless Multimedia Sensor Networks,” IEEE Trans. on Dependable and Secure Computing, 9(6): 785-797, 2012.
  38. Y. Xu, F. Ren, T. He, C. Lin, C. Chen, and S. K. Das, “Real-time Routing in Wireless Sensor Networks: A Potential Field Approach,” ACM Trans. on Sensor Networks, 9(3), pp. 35, 2013.
  39. G. Ghidini and S. K. Das, “Energy-efficient Markov Chain-based Duty Cycling Schemes for Greener Wireless Sensor Networks,” ACM Journal of Emerging Technologies in Computing Systems (special issue on Green Computing), 8(4): Dec 2012.
  40. S. Roy, M. Xue, and S. K. Das, “Security and Discoverability of Spread Dynamics in Cyber-Physical Networks,” IEEE Trans. on Parallel and Distributed Systems (special issue on Cyber-Physical Systems), 23(9): 1694-1707, Sept 2012.
  41. J.-W. Ho, M. Wright, and S. K. Das, “ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Trans. on Dependable and Secure Computing (special issue on Learning, Games and Security), 9(4): 494-511, July-Aug 2012.
  42. N. Li, N. Zhang, and S. K. Das, “Preserving Relation Privacy in Online Social Network Data,” IEEE Internet Computing (Special Issue on Security and Privacy in Social Networks), 15(3): 35-42, 2011.
  43. J.-W. Ho, M. Wright, and S. K. Das, “Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing,” IEEE Trans. on Mobile Computing, 10(6): 767-782, 2011.
  44. N. Zhang, W. Yu, X. Fu, and S. K. Das, “Maintaining Defender’s Reputation in Anomaly Detection against Insider Attacks,” IEEE Trans. on Systems, Man and Cybernetics (Special issue in Computational Game Theory and Security), 40(3): 597-611, June 2010.
  45. P. De, Y. Liu, and S. K. Das, “An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks,” IEEE Trans. Mobile Computing, 8(3): 413-425, Mar 2009.
  46. P. De, Y. Liu, and S. K. Das, “Deployment Aware Modeling of Node Compromise Spread in Sensor Networks,” ACM Trans. on Sensor Networks, 5(3): 413-425, May 2009.
  47. A. Misra, A. Roy and S. K. Das, “Information-Theory Based Optimal Location Management Schemes for Inte­grated Multi-System Wireless Networks,” IEEE/ACM Trans. on Networking, 16(3): 525-538, June 2008. 
  48. A. Roy, A. Misra, and S. K. Das, “Location Update vs. Paging Trade-off in Cellular Networks: A VQ-based Approach,” IEEE Trans. on Mobile Computing, 6(12): 1426-1440, Dec 2007.
  49. A. Roy, S. K. Das and K. Basu, “A Predictive Framework for Location Aware Resource Management in Smart Homes,” IEEE Trans. on Mobile Computing, 6(11): 1270-1283, Nov 2007. 
  50. A. Agah and S. K. Das, “Prevention of DoS Attack in Sensor Networks Using Repeated Game Theory,” Journal on Network Security, 5(2): 145-153, Feb 2007.

    Conference Papers

    1. V. K. Shah, S. Silvbestri, B. Luciano, and S. K. Das, “X-CHANT: A Diverse DSA based Architecture for Next-generation Challenged Networks,” IEEE International Conference on Computer Communications (INFOCOM), Paris, France, Apr 29-May 2, 2019.
    2. K. Hazra, V. K. Shah, M. Bilal, S. Silvestri, S. K. Das, S. Nandi, and S. Saha, “A Novel Network Architecture for Resource-Constrained Post-Disaster Environments,” 11th IEEE International Conferences on Communication Systems and Networks (COMSNETS), Jan 2019.
    3. A. Pratap. R. Singhal, R. Misra and S. K. Das, “Factor Graph-based Message Passing Technique for Distributed Resource Allocation in 5G Networks” 11th IEEE International Conferences on Communication Systems and Networks (COMSNETS), Jan 2019.
    4. Z. Guo, K. Yang, S. Vaidhun, S. Arefin, S. K. Das, and H. Xiong, “Uniprocessor Mixed-Criticality Scheduling with Graceful Degradation by Completion Rate,” 39th IEEE Real-Time Systems Symposium (RTSS), Nashville, Dec 2018.
    5. S. Riazi, S. Srinivasan, S. K. Das, S. Bhowmick, and B. Norris, “Single-Source Shortest Path Tree for Big Dynamic Graphs,” 5th IEEE International Workshop on High Performance Big Graph Data Management, Analysis, and Mining (in conjunction with IEEE BigData 2018 Conference), Seattle, WA, Dec 2018.
    6. S. Srinivasan, S. Riazi, B. Norris, S. K. Das, and S. Bhowmick, “A Shared-Memory Parallel Algorithm for Updating Single-Source Shortest Paths in Large Dynamic Networks,” 25th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC), Dec 2018.
    7. V. K. Shah, S. Silvestri, S. Bhattacharjee, and S. K. Das, “An Effective Dynamic Spectrum Access based Network Architecture for Smart Cities,” 4th IEEE Annual International Smart Cities Conference (ISC2), Kansas City, Sep 2018.
    8. F. Righetti, C. Vallati, G. Anastasi, and S. K. Das, “Analysis and Improvement of On-the-Fly Bandwidth Reservation Algorithm for 6TiSCH,” 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, June 2018.
    9. A. Pratap, R. Misra, and S. K. Das, “Resource Allocation to Maximize Fairness and Minimize Interference for Maximum Spectrum Reuse in 5G Cellular Networks,” 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Chania, Greece, June 2018.
    10. S. Bhattacharjee, A. Thakur, and S. K. Das, “Towards Fast and Semi-supervised Identification of Smart Meters Launching Data Falsification Attacks,” 13th ACM Asia Conference on Computer and Communications Security (ASIACCS), Incheon, S. Korea, pp. 173-185, June 2018.
    11. K. Liu, P. Wang, J. Zhang, G. Liu, Y. Fu, and S. K. Das, “Incorporating Interaction Coupling among Multi-View Spatiotemporal Contexts for Mobike Destination Prediction,” SIAM International Conference on Data Mining (SDM), San Diego, pp. 171-179, May 2018.
    12. F. B. Sorbelli, C. M. Pinotti, S. Silvestri, and S. K. Das, “On the Accuracy of Localizing Terrestrial Objects Using Drones," IEEE International Conference on Communications (ICC), Wireless Networking Symposium, May 2018.
    13. Y. Ren, J. Li, Y. Ji, S. K. Das, and Z. Li, “A Novel User Revocation Scheme for Key Policy Attribute Based Encryption in Cloud Environments, International Conference on Communications (ICC), Cloud Communications and Networking Track, Kansas City, May 2018.
    14. J. Bian, H. Xiong, Y. Fu, and S. K. Das, “CSWA: Aggregation-Free Spatial-Temporal Community Sensing,” 32nd AAAI Conference on Artificial Intelligence (AAAI-18), Feb. 2018.
    15. F. B. Sorbelli, S. K. Das, C. M. Pinotti, and S. Silvestri, “Precise Localization in Sparse Sensor Networks using a Drone with Directional Antennas,” 19th ACM International Conference on Distributed Computing and Networking (ICDCN), Jan 2018. 
    16. S. Kumar and S. K. Das, "ZU-Mean: Fingerprinting based Device Localization Methods for IoT in the Presence of Additive and Multiplicative Noise,” 7th International Workshop on Computing and Networking for IoT and Beyond, Jan 2018.
    17. S. Roy, A. Tamimi, A. Hahn, M. Xue, S. K. Das, H. Van Dongen, A. Vosughi, and S. Warnick, “A Modeling Framework for Assessing Cyber Disruptions and Attacks to the National Airspace System,” AIAA Modeling and Simulation Technologies Conference, Kissimmee, FL, Jan 2018.
    18. V. K. Shah, S. Bhattacharjee, S. Silvestri, and S. K. Das, “Designing Sustainable Smart Connected Communities using Dynamic Spectrum Access via Band Selection,” 4th ACM International Conference on Systems for Energy-Efficient Built Environments (BuildSys), Delft, The Netherlands, Nov 2017.
    19. S. Bhattacharjee, N. Ghosh, V. K. Shah, and S. K. Das, “QnQ: A Reputation Model to Secure Mobile Crowdsourcing Applications from Incentive Losses,” IEEE Conference on Communications and Network Security (CNS), p. 1-9, Oct 2017.
    20. S. Das and S. K. Das, “Multi-Periodic Contact Patterns in Predicting Future Contacts Over Mobile Networks,” IEEE Symposium on a World of Wireless Mobile Multimedia Networks, Macau, China, June 2017.
    21. S. Bhattacharjee, A. Thakur, S. Silvestri, and S. K. Das, “Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure,” ACM Conference on Data and Applications Security and Privacy (CODASPY), pp. 35-45, Mar 2017.
    22. R. Kumar, A. Bayliff, D. De, A. Evans, S. K. Das, and M. Makos, “Care-Chair: Sedentary Activities and Health Assessment with Smart Sensing on Chair Backrest,” 2nd IEEE International Conference on Smart Computing (SMARTCOMP), May 2016.
    23. F. Restuccia, A. Saracino, S. K. Das, and F. Martinelli, “LVS: A WiFI-based System to Tackle Location Spoofing in Location-based Services,” IEEE Symposium on a World of Wireless Mobile Multimedia Networks (WoWMoM), Coimbra, Portugal, June 2016.
    24. S. Das, S. K. Das, and S. Ghosh, “Inferring Future Links in Large Scale Networks,” 41st Annual IEEE Conference on Local Computer Networks (LCN), Dubai, pp. 244-252, 2016.
    25. A. Nazi, M. Raj, M. Di Francesco, P. Ghosh, and S. K. Das, “Efficient Communications in Wireless Sensor Networks Based on Biological Robustness,” IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), Washington DC, pp. 161-168, May 2016.
    26. S. K. A. Imon, A. Khan, M, Di Francesco, and S. K. Das, “RaSMaLai: A Randomized Switching Algorithm for Maximizing Lifetime in Tree-based Wireless Sensor Networks,” Proceedings of IEEE International Conference on Computer Communications (IEEE INFOCOM), Turin, Italy, Apr 2013. 
    27. Y. Rahulamathavan, M. Rajarajan, O. F. Rana, M. S. Awan, P. Burnap, and S. K. Das, “Assessing Data Breach Risk in Cloud Systems,” 7th IEEE International Conference on Cloud Computing Technology and Science, (CloudCom) Vancouver, Canada, pp. 363-370, Nov 2015.
    28. P. Vepakommaz, D. De, S. K. Das, and S. Bhansal, “A-Wristocracy: Deep Learning on Wrist-worn Sensing for Recognition of User Complex Activities,” 12th IEEE Annual Body Sensor Networks Conference (BSN), MIT, Cambridge, MA, pp. 1-6, June 2015. 
    29. A. Nazi, M. Raj, M. Di Francesco, P. Ghosh and S. K. Das, “Robust Deployment of Wireless Sensor Networks using Gene Regulatory Networks,” Proceedings of International Conference on Distributed Computing and Networking (ICDCN), pp. 192-207, Jan 2013.
    30. N. hang, W. Yu, X. Fu, and S. K. Das, “gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor’s Anonymity,” 1st Conference on Decision and Game Theory for Security (GameSec 2010), Berlin, pp. 58-71, Nov 2010.
    Books
    1. S. Roy and S. K. Das, Principles of Cyber-Physical Systems: An Interdisciplinary Approach, Cambridge University Press, to appear, 2018.
    2. S. K. Das, K. Kant and N. Zhang, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, Morgan Kauffman, 2012.
    3. J. Cao and S. K. Das, Mobile Agents in Networking and Distributed Computing, John Wiley, July 2012.
    4. D. J. Cook and S. K. Das, Smart Environments: Technology, Protocols and Applications, John Wiley, 2005.
    Selected Grants (2001 - Present; for collaborative proposals with other institutions, only my share of the funding is shown here.)

    1. CNS: JUNO2: STEAM: Secure and Trustworthy Framework for Integrated Energy and Mobility in Smart Connected Communities, NSF, 2018-2021, $239,996 (PI).

    2. CPS: Breakthrough: Securing Smart Grid by Understanding Communications Infrastructure Dependencies, NSF, $310,476, 2015-2019 (PI).
    3. CPS: Synergy: Threat Assessment Tools for Management-Coupled Cyber- and Physical- Infrastructures, NSF, $194,799, 2015-2019 (PI).
    4. SPX: SANDY: Sparsification-based Approach for Analyzing Network Dynamics, NSF, $250,000, 2017-2020 (PI).
    5. IIP: I-Corps Sites: Journey to Innovation and Entrepreneurship at Missouri S&T, NSF, $299,967, 2016-2019 (Co-PI).
    6. STTR: Phase I: Advanced and Remote Screening, Monitoring and Rehabilitation of Cognitive Health,” NSF, $225,000, 2017-2018 (co-PI).
    7. SCC-RCN: MOHERE: Mobility, Health, and Resilience in SCC: Building Capacities and Expanding Impact, NSF, $500,000, 2017-2020 (collaborator).
    8. CDS&E: ParCell: A Parallel Computation Framework for Scalable and Mechanistic Modeling and Simulation of Multi-cellular Systems, NSF, $349,995, 2016-2018 (co-PI).
    9. SC2: US-India Smart and Connected Communities Workshop, NSF, $77,698, 2016-2018 (PI).
    10. XPS: SPANDAN: Scalable Parallel Algorithms for Network Dynamics Analysis, NSF, $153,248, 2015-2018 (PI).
    11. Building Recruiting and Inclusion for Diversity (BRAID) Initiative, Anita Borg Institute, $120,000, 2015-2018 (PI).
    12. SHB: Medium: Collaborative Research: Crafting a Human-centric Environment to Support Human Health Needs, NSF, $332,453, 2013-2017 (PI).
    13. I-Corps: Health-Beacons: Flexible Wearable Health and Activity Tracker for Smart Living, NSF, $50,000, May-Dec 2015 (PI).
    14. MASTER: Missouri Advanced Security Teaching, Education and Research, NSF, $3.2 M, 2014-2019 (co-PI).
    15. BISON: Bio-Inspired Approach to Robust Wireless Sensor Networking, NSF, $115,984, 2013-2016 (PI).
    16. CNS: Mobile Security through Remote Sandboxing and Cloud Computing, NSF, $231,942, 2012-2016 (PI).
    17. I-Corps: E2Home: Web-based Application for Home Energy Efficiency Using Contextual Information from Smart Meters and Smartphones, NSF, $50,000, 2012-2013. (PI).
    18. ITR: Pervasively Secure Infrastructures (PSI): Integrating Smart Sensing, Data Mining, Pervasive Networking and Community Computing, NSF, $1.2 M, 2003-2012 (PI).
    19. EAGER: Collaborative Research: Improving the Efficiency of Wireless Sensor Networks Using Principles of Genomic Robustness, NSF, $117,600, 2010 -2013 (PI)
    20. TwC: Towards Trustworthy Intrusion Monitoring Using Wireless Sensor Networks, NSF, $499,000, 2009-2012. (co-PI).
    21. Secure Information Grid for NCES and Border Security Applications, AFOSR, $800,000, 2008-2012. (PI).
    22. CSR: ARCADIA: Asynchronous Communication Architecture toward Novel Networking and Computation Paradigms in Wireless Sensor Networks, NSF, $450,000, 2007-2010 (co-PI).
    23. Defending Against Compromised Nodes in Wireless Sensor Networks: A Multi-Layer Security Framework, Texas Advanced Research Program, $100,000, 2006-2008 (PI).
    24. Wireless Audio-Visual System for Police and Law Enforcement Agencies, Department of Justice, $500,000, 2004–2008.
    25. MRI: Acquisition of Instrumentation for Engineering Research in Advanced Security Detection Systems, NSF, $250,000, 2004-2007 (Co-PI).
    26. ITR: MavHome: An Intelligent Home Environment, NSF, $1,159,959, 2001-06 (Co-PI).