Ph.D. Research Opportunities
The following research opportunities are available for prospective Ph.D. students. To apply for one of these positions please visit the Ph.D. in Computing and Information Sciences program page or, for Electrical Engineering positions, visit the Ph.D. in Electrical Engineering program page. Learn more about pursuing your Ph.D. at RIT, on our Ph.D. Experience page.
Faculty Name | Department | Research Areas | Number of Available Ph.D. Student Positions | |
---|---|---|---|---|
Arthur Azevedo de Amorim |
Computer Science |
Programming Languages and Formal Verification | 1 | |
Billy Brumley | Cybersecurity | Implementation Attacks, Side-channel Analysis, Microarchitecture Attacks, Applied Cryptography | 1 | |
Billy Brumley | Cybersecurity | Anonymity Networks, Tor, Darkweb Data Mining, Cybercrime, Child Sexual Abuse Material (CSAM), Privacy-Enhancing Technologies (PET) | 1 | |
Yidan Hu | Cybersecurity | Data Privacy, Network and Distributed System Security, Privacy-preserving Machine Learning | 1 | |
Mohammad Javad Khojassteh | Electrical Engineering | Autonomous Robotic Systems, Cyber-Physical Systems, Security, Machine Learning, Artificial Intelligence, Quantum Engineering, Applied Ocean Sciences, Data-Driven Control and Optimization, and Statistical Signal Processing | 2 | |
Yinxi Liu | Cybersecurity |
Program Analysis, Software/Web security, Algorithmic Complexity |
1 | |
Divya Ramjee | Public Policy; Criminal Justice | Measurement and Simulation Modeling; Law and Policy for Cybersecurity, Ransomware, Cyber Insurance, AI and other emerging tech, Cryptocurrency and Blockchain Analytics, Biometrics, Biotechnology, Image-based Sexual Abuse (IBSA) | 2 | |
Nidhi Rastogi | Software Engineering | Explainable AI, Cyberthreat Intelligence, LLMs for CTI and LLM Security, Autonomous System Security | 2 | |
Leon Reznik | Computer Science | Federated Learning, Machine Learning, Security and Privacy, Machine Learning in Research Experiments Design and Prediction | 1 | |
Alireza Vahid | Electrical Engineering | Wireless Security, Integrated Sensing and Communications, Data Storage, Information and Coding Theory | 2 | |
Matthew Wright | Cybersecurity | Deep Learning, Cybersecurity, Malware Analysis, Deepfake Detection, Misinformation | 1 | |
Ersin Uzun | Cybersecurity |
Usable Security/Privacy, Privacy Preserving Technologies, Misinformation Detection/Mitigation |
2 | |
Weijie Zhao | Computer Science | Scalable Machine Learning System and AI Security | 1 |