Jianwei Niu

Ph.D. University of Waterloo
Professor of Computer Science
Associate Dean of University College
Interim Academic Director, School of Data Science
University of Texas at San Antonio
One UTSA Circle
San Antonio, TX, 78249
Tel: 1-210-458-4360
Office: NPB 3.314
Email:  jianwei.niu@utsa.edu

Jianwei Niu is a professor of Computer Science at the University of San Antonio. She received her Ph.D. in Computer Science from University of Waterloo in 2005. Her research interest is in applying mathematically rigorous specification and verification techniques (formal methods) to improve software dependability. In particular, she has contributed to two problem areas. The first is using rigorous means to design security and privacy policies, authorization decision engines, and enforcement mechanisms. She then applies automated and, where needed, manual techniques to verify properties of policies that heighten assurance that security objectives are accurately captured by the policy specifications. Similarly, she verifies correctness of decision procedures and enforcement mechanisms with respect to the policies they are intended to enforce. Her second research area concerns formalizing the semantics of modeling notations that provide software practitioners the ability to generate specifications that can be verified. The modeling notations she studies are used commonly to describe the dynamic behavior of software systems, including statecharts variants, process algebras, UML state machine diagrams, and UML sequence diagrams. Given that it is difficult to assess the properties of models constructed using notations that either have so many variants with subtle differences or have no precise semantics, she seeks to address this problem by providing formal templates to structure their semantics systematically, thus enabling properties of software models to be formally verified. Her research has been supported by grants from NSF, NHARP, Microsoft, NSA (through CMU subcontract), and UTSA TRAC awards.


Research Projects

  1. Mobile Privacy Policy Analysis and Compliance

    The advent of mobile phones has created a major data revolution. Mobile apps running on these phones are increasingly prevalent as they provide tailored, user-friendly services such as shopping, instant messaging, travel, and gaming in context and on-demand. To meet user needs and provide value, these services heavily depend on collecting and sharing sensitive personal information, such as user location, contact lists, and app usage patterns. This research will develop a novel, multidisciplinary framework to ensure that the collection, sharing, and retention of sensitive personal information performed by mobile apps complies with privacy policies. We map the relationship between privacy policies expressed in natural language and privacy-related functions implemented in the corresponding code. This mapping will provide the semantics needed to check code for misalignment with privacy policy, and to suggest where policy may be changed to fit the functional requirements of apps. Moreover, more precise and accurate privacy specification can be generated from source code based on results from our approach.

    This project has been funded by National Security Agency grant "CMU Science of Security: Composability and Usability", UTSA subaward amount $220,000, March 2014 - March 2017, UTSA PI, Jianwei Niu, PI, Travis Breaux (CMU).

  2. Healthcare Privacy Policy Analysis and Enforcement

    This research project will develop a methodology for ensuring that information systems comply with privacy policies. Information systems that handle personal information must adhere to legal regulations, corporate privacy policies, and contractual agreements designed to protect personal privacy in many sectors, including medical, governmental, and financial. The immediate focus of the project will be on the needs of the medical industry. As medical practice transitions to electronic medical records held in information systems, there is an acute need of a capability to verify that these systems comply with applicable privacy policies. The project will provide such a capability by creating a software development framework that uses novel techniques to provide assurance that software developed using the framework complies with formally-specified privacy policies that identify circumstances under which information can be shared and circumstances in which such sharing incurs certain future obligations. The framework will include policy analysis tools, a programming language, program analysis tools, and a runtime environment. These components will be able to be used in concert to produce distributed information systems and formally verify that the resulting systems handle personal information according to applicable policies.

    This project has been funded by National Science Foundation grant CNS-0964710, "TC: Medium: Privacy and Declassification Policy Enforcement Framework", total award amount $1,162,668, September 2011 - June 2016, PI, Jianwei Niu, Co-PI, Jeffery von Ronne. (July 2010 - August 2011, PI, William Winsborough)

  3. Security Requirement Pattern

    Secure software depends upon the ability of software developers to respond to security risks early in the software development process. Despite a wealth of security requirements, often called security controls, there is a shortfall in the adoption and implementation of these requirements. This shortfall is due to the extensive expertise and higher level cognitive skillsets required to comprehend, decompose and reassemble security requirements concepts in the context of an emerging system design. To address this shortfall, we propose to develop two empirical methods: (1) a method to derive security requirements patterns from requirements catalogues using expert knowledge; and (2) a method to empirically evaluate these patterns for their "usability" by novice software developers against a set of common problem descriptions, including the developer's ability to formulate problems, select and instantiate patterns. The study results will yield a framework for discovering and evaluating security requirements patterns and new scientific knowledge about the limitations of pattern-based approaches when applied by novice software developers.

    This project has been funded by National Security Agency grant "Improving the Usability of Security Requirements by Software Developers through Empirical Studies and Analysis", UTSA award amount $200,000, February 2012 - September 2014, UTSA PI, Jianwei Niu, PIs, Travis Breaux (CMU) and Laurie Williams (NCSU).

  4. Trust Management Policy Analysis

    The overarching goal of this project is to design and develop support for access control systems that are scalable and decentralized. Classical access control systems were monolithic and designed for use within a single organization in which goals were uniform and aligned with the organization's mission. With the advent of extensive collaboration and resource sharing across organizations have come access control policies that are not specified by a single entity or with a unique entity's security objectives in mind. Such policies can be very difficult to understand and define correctly. At the same time, the rate at which policies must be designed and reconfigured increases, as collaborations come and go more and more rapidly. This NHARP funded project has made contributions in several areas related to managing the resulting complexity. These include: designing systems with simple, easy to understand features; tools that leverage formal methods (including model checking and classical strategies for mitigating state-space explosion, such as reduction and abstraction) for the purpose of understanding whether an individual stakeholder's security objectives are met by the policy as a whole, as well as gaining insight about how to correct the problem when they are not; and experience with the implementation and performance analysis of policy decision engines.

    This project has been supported by Texas Higher Education Coordinating Board, ARP grant 010115-0037-2007, "Formal Methods in Access Control Policy Analysis and Design", May 2008 - January 2011, total award amount $145,999, PI, Jianwei Niu, Co-PI, William H. Winsborough.

  5. Information Sharing Policy Design and Enforcement

    The central objective of this project is to design a formal group-oriented access control environment (GoAce) to protect the confidentiality of resources, yet to facilitate the efficient and rigorous management of shared information. The need to share information while confining what an authorized recipient can do with that information is one of the oldest and most challenging problems in Access Control. Because of the dynamic nature of scenarios in which secure information sharing is desirable, authorization systems need to minimize the administrative efforts required both to establish information-sharing infrastructure, and to modify the users who have access and the information to which they have access. This project has contributed to the development of a group-centric secure information sharing (g-SIS) system. Authorization in g-SIS policy is defined by bringing users and information objects together in a group to facilitate agile sharing. Information can be brought in from external sources and new information can be created within the group by group members. The project also introduced stale safety in the design of enforcement mechanisms. Addiontionally, the small finite policy and enforcement specifications concerning one user and one object of one group---called small models---is verified to satisfy the security objectives, and policy specifications together with stale safeties, respectively, by using model checking. Then the verification results of the small models can be generalized to large policy and enforcement specifications, comprising an unbounded number of users and data, by using manu proofs.

    This project has been supported by the University of Texas at San Antonio, Tenure-Track Research Award Competition (TRAC), "Formal Analysis of Secure Information Sharing", November 2008 - August 2009, total award amount $22,000. PI, Jianwei Niu.

  6. Scenario-Based Modeling

    The objective of this work is to develop a logical framework to structure the semantics of UML sequence diagram, providing software engineers the ability to generate models that are suitable for verification. Sequence diagrams describe scenarios as the interactions among a system's objects. Users often construct multiple sequence diagrams that are complementary perspectives of a single system. However, the semantics of the sequence diagram, in particular, its control constructs (e.g., combined fragments), is not formally defined when compared to its precise syntax description. Instead, UML sequence diagram leaves aspects of the semantics open for interpretation for each application domain. The lack of a fully defined semantics makes it extremely difficult to determine whether a collection of sequence diagrams constitutes a correct, consistent specification. The contributions of this research work include: leveraging linear temporal logic (LTL) to represent the semantics of a sequence diagram to gain better theoretical understanding of it, enabling a user to express certain properties using sequence diagrams, and providing a user the ability to employ auto means, such as model checking, to check sequence diagrams.

    This project has been supported in part by an award from Microsoft Inc., "VSX: Scenario-Based Model-Driven Engineering Framework", July 2007- July 2008, total award amount $15,000, PI, Jianwei Niu.

Selected Publications Google Scholar»

Journal Publications

  1. Jonathan Shahen, Jianwei Niu, and Mahesh Tripunitara. "Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies", IEEE Transactions on Dependable and Secure Computing, 16 pages, 2019.
  2. Hui Shen, Ram Krishnan, Rocky Slavin, and Jianwei Niu. "Sequence Diagrams Aided Privacy Policy Specification". IEEE Transactions on Dependable and Secure Computing vol.13, no.3, pages 381--393, May 2016
  3. Jianwei Niu, Mark Reith, and William H. Winsborough. "Formal Verification of Security Properties in Trust Management Policy". Journal of Computer Security vol.22, no.1, pages 69--153, January 2014.
  4. Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough. "Group-Centric Secure Information Sharing Models for Isolated Groups", ACM Transactions on Information and System security, vol.14, no.3, pages 23:1--23:29, November 2011. (pdf)
  5. Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu. "Deconstructing the Semantics of Big-Step Modeling Languages", Requirements Engineering Journal 15(2) , pages 235--265, April 2010. (pdf)
  6. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Template Semantics for Model-Based Notations", IEEE Transactions on Software Engineering, vol. 29, no.10, pages 866--882, October 2003. (pdf)

Ph.D. Dissertation

  1. Jianwei Niu. "Template Semantics: A Parameterized Approach to Semantics-Based Model Compilation", PhD thesis, University of Waterloo, May 2005. (pdf)

Book Chapter

  1. Mark Robinson, Hui Shen, and Jianwei Niu. "High Assurance BPEL Process Models", Book Chapter in High Assurance Services Computing, pages 219--240 (Chapter 11), Springer, 2009. (pdf)

Refereed Conference and Workshop Publications

  1. Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis Breaux, and Jianwei Niu. "HOw Does Misconfiguration of Analytic Services Compromise Mobile Privacy?", ICSE, 12 pages, 2020.
  2. Mitra Bokaei Hosseini, Rokcy Slavin, Travis Breaux, Xiaoyin Wang, and Jianwei Niu. "Disambiguating Requirements through Syntax Driven Semantics Analysis of Information Types", REFSQ, LNCS vol. 12405, pages 97-115, 2020.
  3. John Heaps, Xiaoyin Wang, Travis Breaux, and Jianwei Niu. "Toward Detection of Access Control Models from Source Code via Word Embedding", 24th ACM symposium on Access Control Models and Technologies (SACMAT) , pages 103--112, June 2019.
  4. Xiaoyin Wang, Xue Qin, Mitra Bokaei Hosseini, Rocky Slavin, Travis Breaux, and Jianwei Niu. "GUILeak: Tracing Privacy-Policy Claims on User Input Data for Android Applica- tions", 40th ACM/IEEE International Conference on Software Engineering (ICSE), pages 37--47, May 2018.
  5. Mitra Bokaei Hosseini, Travis D. Breaux, and Jianwei Niu. "Inferring Ontology Fragments from Semantic Typing of Lexical Variants", 24th International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ), Lecture Notes in Computer Science vol. 10753, pages 39--56, March 2018.
  6. Mitra Bokaei Hosseini, Xue Qin, Xiaoyin Wang and Jianwei Niu. "Extracting information types from Android layout code using sequence to sequence learning", Workshop on NLP for Software Engineering (NL4SE) at AAAI , February 2018.
  7. Kevin Baldor and Jianwei Niu. "Veriable Reactive Software", Workshop on Reactive and Event-based Languages & Systems (REBLS) at ACM SPLASH , October 2017.
  8. Claiborne Johnson, Tom MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, and Jianwei Niu. "Veriable Assume-Guarantee Privacy Specications for Actor Component Ar- chitectures", 22nd ACM symposium on Access Control Models and Technologies (SACMAT), pages 167--178 , June 2017.
  9. Tom MacGahan, Claiborne Johnson, Armando L. Rodriguez, Jeffery von Ronne, and Jianwei Niu. "Demo: Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language", 22nd ACM symposium on Access Control Mod- els and Technologies (SACMAT), pages 191--198, June 2017.
  10. Mitra Bokaei Hosseini, Sudarshan Wadkar, Tavis D. Breaux, and Jianwei Niu. "Lexical Similarity of Information Type Hypernyms, Meronyms and Synonyms in Privacy Policies", AAAI Fall Symposium on Privacy and Language Technologies , pages 231--239, November 2016.
  11. Jianwei Niu, Yier Jin, Adam Lee, Ravi Sandhu, Wenyuan Xu, and Xiaoguang Zhang. "Panel: Security and Privacy in the Age of Internet of Things: Opportunities and Challenges", Proceedings of the 21st ACM symposium on Access Control Models and Technologies, pages 3--4, June 2016.
  12. Rocky Slavin, Xiaoyin Wang, Mitra Bokaer Hosserni, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis Breaux, and Jianwei Niu. "Toward a Framework for Detecting Privacy Policy Violation in Android Application Code". 38th ACM/IEEE International Conference on Software Engineering (ICSE) pages: 25--36, May 2016.
  13. Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, and Jianwei Niu. "PVDetector: A Detector of Privacy-Policy Violations for Android Apps". International Conference on Mobile Software Engineering and Systems (MobileSoft), pages 299--300, May 2016.
  14. Kevin Baldor, and Jianwei Niu. "Declarative Deadlines in Functional-Reactive Program- ming", Workshop on Reactive and Event-based Languages & Systems (REBLS) at ACM SPLASH, October 2015.
  15. Tom MacGahan, Claiborne Johnson, Armando L. Rodriguez, Mark Appleby, Jianwei Niu, ery von Ronne. "Extended Abstract: Towards Veried Privacy Policy Compliance of an Actor-based Electronic Medical Record Systems", Companion Proceedings of the 5th International Workshop on Programming based on Actors, Agents, and Decentralized Control (AGERE!) at ACM SPLASH, October 2015.
  16. Jonathan Shahen, Jianwei Niu, and Mahesh Tripunitara. "Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies", 20th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 15--26, June 2015. Best Paper Award Runner-Up.
  17. Rocky Slavin, Jean-Michel Lekher, Jianwei Niu, and Travis Breaux. "Managing Security Requirements Patterns using Feature Diagram Hierarchies". 22nd IEEE International Requirements Engineering Conference (RE), pages 193-202, August 2014.
  18. Kevin Baldor and Jianwei Niu. "SMAST: Constructing Languages for Multi-Disciplinary Engineering Problems", 2nd Workshop on Domain-Specic Language Design and Implemen- tation (DSLDI) at ACM SPLASH, October 2014.
  19. Rocky Slavin, Jean-Michel Lehker, Jianwei Niu, and Travis D. Breaux. "Managing Security Requirements Patterns using Feature Diagram Hierarchies", 22nd IEEE International Requirements Engineering Conference (RE), pages 193--202, August 2014.
  20. Ashwini Rao, Hanan Hibshi, Travis D. Breaux, Jean-Michel Lehker, and Jianwei Niu. "Less is More? Investigating the Role of Examples in Security Studies using Analogical Transfer", Symposium and Bootcamp on the Science of Security (HotSoS), pages 70--81, April 2014.
  21. Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatttt, Anupam Datta, and Limin Jia. " Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule", Proceedings of the 18th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 3--14, June 2013. (pdf)
  22. Kevin Baldor and Jianwei Niu. "Monitoring Dense-Time, Continuous-Semantics, Metric Temporal Logic", Lecture Notes in Computer Science Vol. 7687, Proceedings of the 3rd International Conference on Runtime Verification (RV), pages 245--259, September 2012, Turkey.
  23. Rocky Slavin, Hui Shen, and Jianwei Niu. "Characterizations and Boundaries of Security Requirements Patterns", Second International Workshop on Requirements Patterns (RePa), 6 pages, September 2012, Chicago.
  24. Omar Chowdhury, Haining Chen, Jianwei Niu, Ninghui Li, and Elisa Bertino. "On XACML's Adequacy to Specify and to Enforce HIPAA", Proceedings of the 3rd USENIX Workshop on Health Security and Privacy (HealthSec), 10 pages, August 2012, Seattle. (pdf)
  25. Hui Shen, Mark Robinson, and Jianwei Niu. "Formal Analysis of Sequence Diagram with Combined Fragments", Proceedings of the 7th International Conference on Software Paradigm Trends (ICSOFT), pages 44--54, July 2012, Italy. (pdf)
  26. Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, and Jianwei Niu. "Ensuring Authorization Privileges for Cascading User Obligations", Proceedings of the 17th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 33--44, June 2012. (Best Paper Award) (pdf)
  27. Wanying Zhao, Jianwei Niu, and William H. Winsborough. "Refinement-Based Design of a Group-Centric Secure Information Sharing Model", Proceedings of the 2nd ACM SIGSAC Conference on Data and Application Security and Privacy (CODASPY), pages 149--156, February 2012. (pdf)
  28. Mark Robinson, Jianwei Niu, and Macneil Shonle. "GitBAC: Flexible Access Control for Non-Modular Concerns", Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE), pages 500-503, November 2011. (pdf)
  29. Qing Yi, Jianwei Niu, and Anitha R. Marneri. "Collective Specification and Verification of Behavior Models and Object-Oriented Implementations", Proceedinds of the 6th International Conference on Software and Data Engineering (ICSOFT), pages 15-24, July 2011. (pdf)
  30. Ravi Sandhu, Ram Krishnan, Jianwei Niu, and William H. Winsborough. "Group-Centric Models for Secure and Agile Information Sharing", Proceedings of the 5th IEEE International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS), Lecture Notes in Computer Science, series 6258, pages 55-69, September 2010. (pdf)
  31. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "Towards a Framework for Group-Based Secure Collaboration", Proceedings of the 5th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), November 20009. (pdf)
  32. Shahram Esmaeilsabzali, Nancy A. Day, Joanne M. Atlee, and Jianwei Niu. "Semantic Criteria for Choosing a Language for Big-Step Models", Proceedings of the 17th IEEE International Requirements Engineering Conference (RE), September 2009. (pdf)
  33. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "Foundations for Group-Centric Secure Information Sharing Models", Proceedings of the 14th ACM SIGSAC Symposium on Access Control Models and Technologies (SACMAT), pages 115-124, June 2009. (pdf)
  34. Mark Reith, Jianwei Niu, and William H. Winsborough. "Towards Practical Analysis for Trust Management Policy", Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS), pages, 310-321, March 2009. (pdf)
  35. Ram Krishnan, Ravi Sandhu, Jianwei Niu, and William H. Winsborough. "A Conceptual Framework for Group-Centric Secure Information Sharing", Proceedings of the 4th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIACCS) , pages 384-387, March 2009. (pdf)
  36. Hui Shen, Aliya Virani, and Jianwei Niu. "Formalizing UML2 Sequence Diagrams", Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium (HASE), pages 437-440, December 2008. (pdf)
  37. Ram Krishnan, Jianwei Niu, Ravi Sandhu, and William H. Winsborough. "Stale-Safe Security Properties for Group-Based Secure Information Sharing", Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE) co-located with the ACM Conference on Computer and Communications Security (CCS), pages 53-62, October 2008. (pdf)
  38. T. Finin, A. Joshi, L. Kagal, Jianwei Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. "ROWLBAC - Representing Role Based Access Control in OWL", Proceedings of the 13th ACM symposium on Access Control Models and Technologies (SACMAT), pages 73-82, June 2008. (pdf)
  39. Mark Reith, Jianwei Niu, and William H. Winsborough. "Role-Based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE)", Proceedings of the 30th ACM/IEEE International Conference on Software Engineering (ICSE) Research Demonstration, pages 929-930, May 2008. (pdf)
  40. Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi Sandhu, William H. Winsborough, and Bhavani Thuraisingham. "Role Based Access Control and OWL", Proceedings of the fourth International Workshop in The OWL: Experiences and Directions (OWLED), 12 pages, April 2008. (pdf)
  41. Mark Reith, Jianwei Niu, and William H. Winsborough. "Engineering Trust Management into Software Models", Proceedings of ICSE Workshop on Modeling in Software Engineering (MISE07), 6 pages, May 2007. (pdf)
  42. Mark Reith, Jianwei Niu, William H. Winsborough. "Apply Model Checking to Security Analysis in Trust Management", Proceedings of the ICDE Workshop SECOBAP, 10 pages, April 2007. (pdf)
  43. Yun Lu, Joanne M. Atlee, Nancy A. Day, and Jianwei Niu. "Mapping Template Semantics to SMV", Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE), pages 320-325, September 2004. (pdf)
  44. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Comparing and Understanding Model-Based Specification Notations", Proceedings of the 11th IEEE International Requirements Engineering Conference(RE), pages 188-199, September 2003. (pdf)
  45. Jianwei Niu. "A Semantics-Based Approach for Mapping Specification Notations to Analysis Tools" (abstract), Proceedings of the IEEE International Conference on Software Engineering (ICSE) Doctoral Symposium , page 762, May 2003. (pdf)
  46. Jianwei Niu, Joanne M. Atlee, and Nancy A. Day. "Composable Semantics for Model-Based Notations", Proceedings of the 10th ACM SIGSOFT International Symposium on the Foundations of Software Engineering (FSE), pages 149-158, November 2002. (pdf)

Courses

  • CS1713 Introduction to Computer Science
  • CS3773 Software Engineering
  • CS4773 Object Oriented Systems
  • CS5103 Software Engineering
  • CS5123 Software Testing and Quality Assurance
  • CS6133 Software Specification and Verification
  • CS445 ECE451 CS645 Software Requirements Specification and Analysis

Students

  • Current Students
    • Ph.D. Kevin Baldor
    • Ph.D. John Heaps
    • Ph.D. Xueling Zhang
  • Past Students
    • Ph.D. Mitra Bokaei Hosseini - graduated August 2019, Assistant Professor at St. Mary's University
    • Ph.D. Rocky Slavin - graduated August 2017, Assistant Professor at UTSA
    • Ph.D. Omar Chowdhury - graduated August 2013, Assistant Professor at University of Iowa
    • Ph.D. Mark Robinson - graduated May 2013, Assistant Professor of Practice at UTSA
    • Ph.D. Hui Shen - graduated May 2013, Google Inc.
    • Ph.D. Murillo Pontual - graduated December 2011
    • Ph.D. Mark Reith - graduated August 2009
    • Master's Project Kevin Duensing - graduated Spring 2012
    • Master's Ankita Shah - graduated Fall 2008
    • Master's Thesis Aliya Virani - graduated August 2008
    • Master's Neil Kalinowski - graduated Fall 2007
    • Master's Project Russell MacShane - graduated May 2007
    • Master's Olga Luganska - graduated Fall 2006
    • Master's Jing Zhai - graduated Fall 2006