Awards and Publications

Library books

By the Numbers

  • Over 60 awards, including:
    • Six NSF career awards
    • Fourteen IEEE best paper awards
    • Three IEEE fellows and two ACM fellows
  • Over 10 teaching awards
  • Over 225 academic papers that have received 100+ Google citations

Department Highlights

  • Among our faculty:
  • We have been awarded more than $30 million in research since 2009.
  • We are a National Security Agency designated Center of Excellence in research, education, and cyber ops—one of the very few schools with all three designations.


Best Paper Awards

Research Awards


Lecture and panel awards

  • IEEE Signal Processing Society; Distinguished Lecturer (Nasir Memon)

Miscellaneous Awards

Staff Awards

Education Awards:

Google Citations

These citations, through Google Scholar, are an indication of the originality and necessity of a work of scholarly literature. The following papers were contributed to by members of our faculty.

Over 4,000 citations

  • J. F. Kurose and K. W. Ross, "Computer networking: a top-down approach featuring the Internet," Pearson Education, 2012

Over 2,000 citations

  • Paul A Yushkevich, Joseph Piven, Heather Cody Hazlett, Rachel Gimpel Smith, Sean Ho, James C Gee, and Guido Gerig, "User-guided 3D active contour segmentation of anatomical structures: significantly improved efficiency and reliability," Neuroimage, Vol. 1, Issue 3, 2006

Over 1,000 citations

  • X. Hei, C. Liang, J. Liang, Y. Liu, and K. W. Ross, "A Measurement Study of a Large-Scale P2P IPTV System," IEEE Transactions on Multimedia, 2007
  • M. Alexa , J. Behr, D. Cohen-Or, S. Fleishman, D. Levin, and C. T. Silva, “Computing and Rendering Set Point Set Surfaces,” Visualization, 2001
  • Fausto Bernardini, Joshua Mittleman, Holly Rushmeier, Cláudio Silva, Gabriel Taubin, "The ball-pivoting algorithm for surface reconstruction," EEE transactions on visualization and computer graphics, Volume 5, Issue 4, 1999
  • Yoshinobu Sato, Shin Nakajima, Hideki Atsumi, Shigeyuki Yoshida, Thomas Koller, Guido Gerig, Ron Kikinis, Nobuyuki Shiraga, "Three-dimensional multi-scale line filter for segmentation and visualization of curvilinear structures in medical images," Analysis, Volume 2, Issue 2, June 1998
  • X. Wu and N. Memon, "Context-based, adaptive, lossless image coding," IEEE Transactions on Communications, 1997
  • Guido Gerig, Olaf Kübler, Ron Kikinis, and Ferenc Jolesz, "Nonlinear anisotropic filtering of MRI data," IEEE Transactions on Medical Imaging, Vol. 11, Issue 2, 1992

Over 500 citations from over 20 papers (showing papers published since 2000)

  • Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, "Comprehensive Experimental Analyses of Automotive Attack Surfaces," USENIX Security Symposium, 2011
  • L. Moreau, B. Clifford, J. Freire, Y. Gil, P. Groth, J. Futrelle, N. Kwasnikowska, S. Miles, P. Missier, J. Myers, Y. Simmhan, E. Stephan, and J. Van den Bussche, "The open provenance model core specification (v1. 1)," Future Generation Computer Systems, 2011
  • J. F. Kurose, K. W. Ross, and W. L. Zucchi, "Redes de Computadores ea Internet: uma abordagem top-down," Pearson, 2010
  • Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage, "Experimental security analysis of a modern automobile," IEEE Symposium on Security and Privacy, 2010
  • Rebecca C. Knickmeyer, Sylvain Gouttard, Chaeryon Kang, Dianne Evans, Kathy Wilber, J. Keith Smith, Robert M. Hamer, Weili Lin, Guido Gerig and John H. Gilmore, "A Structural MRI Study of Human Brain Development from Birth to 2 Years," Journal of Neuroscience, Vol. 28, Issue 47, 2008
  • C. Huang, J. Li, and K. W. Ross, "Can internet video-on-demand be profitable?" ACM SIGCOMM Computer Communication Review 37 (4), 133-144, 2007
  • A. Nealen, M. Müller, R. Keiser, E. Boxerman, and M. Carlson, "Physically based deformable models in computer graphics," Computer Graphics Forum 25 (4), 2006
  • S. Wiedenbeck, J. Waters, J. C. Birget, A. Brodskiy, and N. Memon, "PassPoints: Design and longitudinal evaluation of a graphical password system," International journal of human-computer studies 63 (1), 102-127, 2005
  • Guido Gerig, et. al, "Magnetic resonance imaging and head circumference study of brain size in autism: birth through age 2 years," Archives of general psychiatry 62 (12), 1366-1376, 2005
  • Sarang Joshi, Brad Davis, Matthieu Jomier, and Guido Gerig, "Unbiased diffeomorphic atlas construction for computational anatomy," NeuroImage, Vol. 23, 2004
  • Marcel Prastawa, Elizabeth Bullitt, Sean Ho, Guido Gerig, "A brain tumor segmentation framework based on outlier detection," Medical Image Analysis, Volume 8, Issue 3, September 2004
  • Daniel Cohen-Or, Yiorgos L Chrysanthou, Claudio T. Silva, Frédo Durand, "A survey of visibility for walkthrough applications," IEEE Transactions on Visualization and Computer Graphics, Volume 9, Issue 3, 2003
  • I. Avcibas, N. Memon, and B. Sankur, "Steganalysis using image quality metrics," IEEE transactions on Image Processing 12 (2), 221-229, 2003
  • J. Kangasharju, J. Roberts, and K. W. Ross, "Object replication strategies in content distribution networks," Computer Communications 25 (4), 376-383, 2002
  • P. W. Wong, N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Transactions on Image Processing, Vol. 10, Issue 10, 2001
  • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on image processing 9 (3), 432-441, 2000