Purdue University - Department of Computer Science - Computer Science News Skip to main content

Computer Science News

Professor Ninghui Li

Li Named Editor-In-Chief of ACM's Transactions on Privacy and Security

Professor Ninghui Li has been named the new Editor-in-Chief for the Association for Computing Machinery’s (ACM) journal - Transactions on Privacy and Security (TOPS) beginning on October 1, 2020 and will serve a three-year term ending on September 30, 2023.


Professor Z. Berkay Celik

Purdue teams up with DENSO to teach undergraduates about autonomous vehicles

In the field of autonomous vehicles, Purdue University researchers are making advancements every day in engineering, manufacturing, data science, and more. Thanks to a grant from leading mobility supplier DENSO, Purdue will soon be bringing these advancements into undergraduate classrooms.


Unfinished Block P Statue at Purdue University

Bluetooth Reconnection Flaw Could Lead to Spoofing Attacks

Professors Xu, Bianchi, Tian and researchers at Purdue Computer Science recently discovered a vulnerability that affects many IoT devices running Bluetooth Low Energy (BLE). The research centers around the routine reconnection process of BLE devices. The researchers conclude that their discovery implies that this vulnerability can potentially affect more than 1 billion BLE devices and 16,000 BLE apps.


Battlefield surgery simulation using augmented reality

Augmented reality tool shown to help surgeons remotely guide first responders in battlefield-like scenarios

A joint study with the School of Industrial Engineering and the Department of Computer Science with Professor Voicu Popescu and PhD students Daniel Andersen and Chengyuan Lin is the first to show medics successfully performing surgery in life-like simulations of these war zones by receiving guidance from surgeons through an augmented reality headset.


Assistant Professor Berkay Celik

Professor Celik and fellow researchers find vulnerabilities in Traffic Collision Avoidance Systems

In their paper distributed through ArXiv, "On the Feasibility of Exploiting Traffic Collision Avoidance System Vulnerabilities," the cybersecurity researchers found TCAS is vulnerable to spoofing, at least in a laboratory setting. Story via The Register.


Dongyan Xu

Pandemic Adaptive Supply Chains: A Future-Proof Approach

A cyber-physical ledger infrastructure for the entire supply chain can be developed to record operations on each artifact and maintain its digital passport. With the advent of digital, machine, and expertise inventories, we can create, upgrade, and sustain flexible factory manufacturing operations to efficiently, effectively, and rapidly scale-up production.


All Departmental News

Department of Computer Science, 305 N. University Street, West Lafayette, IN 47907

Phone: (765) 494-6010 • Fax: (765) 494-0739

Copyright © 2020 Purdue University | An equal access/equal opportunity university | Copyright Complaints

Trouble with this page? Disability-related accessibility issue? Please contact the College of Science.