Michel Barbeau Wireless Communications and Networking, software defined radio
Leopoldo Bertossi Data Management, Data Science, Data Management for Business Intelligence, Knowledge Representation in AI, Computational Logic, Machine Learning, Intelligent Information Systems
Robert Biddle  Human Computer Interaction, Computer Security, Computer Games, Agile Software Development
Prosenjit Bose Algorithms, Data Structures, Computational Geometry, Graph Theory
Sonia Chiasson Usable Security, Human Computer Interaction, Computer Security
Robert Collier Genetic Algorithms, Computing Education
Jean-Pierre Corriveau  Object-Oriented Software Quality Engineering, Big Data Analytics, Contextualized Natural Language Understanding
Jim Davies Artificial intelligence; cognitive modeling; imagination; creativity; aesthetics; mental imagery; brain modeling
Frank Dehne Data Science, high performance computing, computational biochemistry, online analytical processing
Dwight Deugo Mobile Computing, Peer-to-Peer Computing, Evolutionary Computation (Genetic Algorithms, Genetic Programming, Artificial Life), Object-Oriented Systems, Software Patterns, Programming Languages and Open Source Software.
Ahmed El-Roby Data Management, Data Integration, Data Science, Machine Learning.
Audrey Girouard Human Computer Interaction
Yuhong Guo Machine Learning, Artificial Intelligence, Natural Language Processing, Computer Vision, Bioinformatics, Data Analysis
Jason Hinek  Computer Science education, cryptology, security and in a previous life wood.
Douglas Howe  Automated Reasoning, Formal Methods in Software Engineering, Programming Languages, and Software Engineering
Majid Komeili Artificial Intelligence, Machine Learning and related applications in the Healthcare and Biometrics.
Evangelos Kranakis Algorithmics, Distributed and Computational Biology, Distributed and Mobile Agent Computing, Networks (Ad Hoc, Communication, Sensor, Social, Wireless). Cryptographic and Network Security
Wilf Lalonde Animation Systems, Interactive 3D Games, Object-Oriented Systems, Parsers, and Computer Graphics
Mark Lanthier Robotics, Artificial Life, Computational Geometry
Mengchi Liu Database Systems, Intelligent Information Systems, Web Technologies
Anil Maheshwari Design, Analysis and Implementation of Algorithms for Problems arising in Computational Geometry, Graph Theory, Discrete Mathematics, and Data Science.
Pat Morin Algorithms, Geometry, Graphs
David Mould Computer Graphics, Computer Games
Louis Nel Computer Applications to Music., Object-Oriented Programming, Software Engineering
Doron Nussbaum Algorithms, Computational Geometry, Computer Graphics, Computer Vision, Data Structures, Distributed Computing, GIS, Geographic Information Systems, Medical Computing, Parallel Computing, Parallel and Distributed Computing, Robotics and Machine Vision, and Robotics
John Oommen Stochastic Learning, Pattern Recognition and Artificial Intelligence
Jörg-Rüdiger Sack Algorithms, Computational Geometry, Data Structures, GIS, and Medical Computing
Michiel Smid Algorithms
Anil Somayaji Computer Security, Operating Systems, Intrusion Detection, Complex Adaptive Systems, Artificial Life
Elizabeth Stobert Usable security systems, applying research from cognitive science to improve the design of security systems. She is interested in usable authentication, usable security for healthcare, and security education.
Oliver van Kaick Computer Graphics, Computer Vision, Computer Games
Paul Van Oorschot Computer Security, Authentication
Tony White Artificial Intelligence, Swarm Intelligence, Genetic Algorithms, Genetic Programming, Neural Networks, Recommender Systems, Search Engines
Lianying Zhao Dr. Zhao’s primary research interests mainly concern low-level platform security, including but not limited to hardware, firmware, hypervisor and OS. Specifically, he would like to find out the actual trustworthiness of underlying components that are assumed or have to be trusted, and based on the findings what can be done to eventually achieve trustworthy program execution. He is also interested in solutions to authentication, privacy preservation and data protection that make use of the low-level approaches.