Skip to Content
My MSU

Computer Science



Shuangbao Wang

Shuangbao "Paul" Wang

Chair and Professor of Computer Science , Computer Science

Office: McMechen Hall 507
Phone: (443) 885-4503
shuangbao. wang@morgan.edu

@ Paul's Research Profile

Biography

Paul Wang is a Professor and the Chairperson of Computer Science at Morgan State University. He is a LINK Fellow and has held positions as the TSYS Endowed Chair in Cybersecurity by a $5 million endorsement, Director of Center for Security Studies with more than 3,000 cyber students, and Chief Information and Technology Officer (CIO/CTO) of the National Biomedical Research Foundation. He has been a consultant to many companies and serving on multiple boards and government and private sector technology committees. Paul was directly involved in drafting of the National Initiatives of Cybersecurity Education (NICE) framework. His research areas are quantum crypto, secure architecture, AI/ML, IoT/CPS, and video indexing.

In teaching, one of his students appeared in Time Magazine for doing his class project which he continued to pursue and later became an entrepreneur. Paul has extensive experiences working with students especially underrepresented minorities and track records in mentoring students to excel in learning and entering into the workplace.

In addition to books, refereed publications, conference speakers and numeral grant activities including recent grants from NSF, NSA, Apple, and Microsoft, Paul has four patents; three of them have been licensed to the industry. Paul Wang received his Ph.D. under Dr. Robert Ledley, the inventor of body CT scanner in 2004. He completed postdoc studies in quantum computing at MIT following a renowned scholar Peter Shor and in AI and data science at University of Cambridge.  

Research Interests:

Secure architecture, AI/ML, quantum cryptoanalysis, IoT/CPS, and video indexing.

Selected Publications:

  • Shuangbao Paul Wang. Trustworthy Artificial Intelligence for Cyber Threat Analysis. Intelligent Systems and Applications. Springer "Lecture Note in Networks and Systems". 978-3-031-16071-4, Vol I, LNNS 542. pp 493-504. 2022.
  • Wang, Shuangbao Paul. Trusted Computer Architecture and Organization: Fundamentals of Security in Computer Systems. Spinger. ISBN: 978-981-16-5662-0, 2021. (#1 Best Seller on Amazon, Nov. - Dec. 2021)
  • Wang, Shuangbao Paul. and Ledley, Robert, Computer Architecture and Security, Wiley, ISBN 978-1-1181-6881-3. January 2013. (Book)
  • Shuangbao Paul Wang. Design High-Confidence Computers using Trusted Instructional Set Architecture and Emulators. High Performance Computing. Elsevier. https://doi.org/10.1016/j.hcc.2021.100009. vol.1, iss.2, pp 1-5. 2021.
  • Shuangbao Paul Wang and Eric Sakk. Quantum Algorithms: Overviews, Foundations, and Speedups. The 5th IEEE International Conference on Cryptography, Security and Privacy. pp. 17-21. 2021.
  • Shuangbao Wang, M. Rohde & A. Ali. Quantum Cryptography and Simulation: Tools and Techniques. ACM International Conference of Cryptography, Security and Privacy (ICCSP). pp. 36-41. 2020.
  • Wang, Paul, Ali, Amjad., Guin, Ujjwal, & Skjellum, Anthony. IoTCP: A Novel Trusted Computing Protocol for IoT. Journal of Colloquium for Information System Security Education (CISSE). Vol.6, Iss.1, pp. 165-180, 2018.
  • Hodhod, Rania, Wang, Shuangbao & Khan, Shamim. Cybersecurity Curriculum Development using AI and Decision Support. International Journal of Computer Theory and Engineering. vol. 10, iss. 4. pp. 111-115, 2018.
  • Hufstetler, Walter, Ramos, Maria & Wang, Paul. NFC Unlock: Secure Two-Factor Computer Authentication Using NFC. Proceeding of IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2017), pp. 507-510, 2017.
  • Wang, Shuangbao & Kelly, William. inVideo: An Automatic Video Index and Search Engine for Large Video Collections. Journal of Sensors & Transducers. Vol. 215, Issue 8, August 2017, pp. 27-34, 2017.
  • Wang, Shuangbao & Kelly, William. Video-based Big Data Analytics in Cyberlearning. Journal of Learning Analytics. Vol. 4, No. 2, pp. 36-46, 2017.
  • Wang, Shuangbao. Dual-Data Defense in Depth Improves SCADA Security. Signal. issue 10. pp. 42-44, 2016.