Select a method of searching our database:
You can search faculty research profiles by using research interest or expertise keywords. Alternatively, you can search for a particular faculty member's research profile by entering his or her name or department.
Search Results:
|
Name | Expertise and Interest | Department |
Mark Holtzblatt
|
Sustainability
, ESG Reporting
, Sustainability
, ESG in the Accounting Curriculum
, Digitization of Sustainability Reporting with XBRL
, Technology & Accounting Pedagogy
, Artificial Intelligence
, AI
, and Accounting
, Carbon Accounting & Reporting
, International Accounting & Taxation
, International Financial Reporting Standards
, IFRS
, Foreign Corrupt Practices Act
, FCPA
, Anti-bribery Regulations
, eXtensible Business Reporting Language
, XBRL
, International Political Risk Accounting
, EU's ESEF Audit
|
Accounting
|
Kailash Gulshan
|
Cholesterol
, HDL
, LDL
, Sphingolipids
, Ceramides
, Atherosclerosis
, Cardiovascular disease
, CVD
, PIP2
, Autophagy
, Inflammation
, Lung cancer
, NLRP3 & AIM2 inflammasome
, Interleukins
, IL-1b
, Gasdermin D.
|
Biological, Geological and Environmental Sciences
|
Conor McLennan
|
word recognition
, speech
, language
, perception
, memory
, cognitive
, psychology
, aging
, password security
, bilingual
, bilingualism
, cognition
, life span
, lifespan
|
College Arts and Sciences, Dean's Office
|
Sanchita Mal-Sarkar
|
Hardware Security and Trust
Uncertainty Management
Soft
, Granular Computing and Risk Assessment
Rough Set Theory
Fault-tolerant Optical Networks
Wireless Sensor Networks
|
Computer Science
|
Aditi Singh
|
Generative AI
, Large Language Model
, Artificial Intelligence
, Machine Learning
, Computer Vision
, Human-Robot Interaction
|
Computer Science
|
Haodong Wang
|
security and privacy
, system and network security
, Internet of Things
, embedded systems
, machine learning
, computer networks
, wireless computing.
|
Computer Science
|
Ye Zhu
|
Networking
, Security
, Privacy
, IoT
, Big Data Security and Privacy
, Cyber-Physical System
, Authentication
, DDoS
, Tor
, 4G
, LTE
, Traffic Analysis
, VANET
, smartphone security and privacy
, Virtual Reality
, Augmented Reality
, CryptoCurrency
, Blockchain
, Security in AI
, Deep learning
|
Computer Science
|
Wenbing Zhao
|
Fault tolerance
, Security
, Middleware
, Reliability
, Dependability
, Computer Vision
, Motion Analysis
|
Electrical and Computer Engineering
|
Kyle Nash
|
IT Identity
, Sustainability
, e-Government
, AI
|
Information Systems
|
Heidi Robertson
|
Hydraulic fracturing
, Shale oil and gas
, Local control in energy-related decision-making
, Public rights of access to privately-owned land
, Recreational land use
, Environment
, Water
, Air
, EPA
, Ohio EPA
, Pesticides
, Brownfields
|
Law
|
Ariadni Papana
|
statistics
, machine learning
, variable selection
, AI
|
Mathematics and Statistics
|
Selma Koc
(Koç)
|
Immersive education
, online learning
, generative AI
, blended learning
, curriculum development
, technology integration in K-12 and higher education
, assessment in online learning
, mobile computing
, technology planning
|
School of Education & Counseling
|