You are using an older browser that does not support current Web standards. Although this site is viewable in all browsers, it will look much better in a browser that supports Web standards.

Adam J. Lee, Ph.D.

Associate Dean for Academic Programs
School of Computing and Information

Department of Computer Science

Affiliate Scholar
Institute for Cyber Law, Policy, and Security

Colorado 2009 Office:
   6111 Sennott Square Building
   210 S. Bouquet St.
   Pittsburgh, PA 15260, USA


Phone: 412-624-8416
Fax: 412-624-8854

Office Hours

SCI's Senior Director of Student and Academic Affairs, Wes Lipschultz, and I hold monthly office hours to meet with students. If you have questions, concerns or suggestions, please sign up to talk with us. Dates for the Summer 2021 term are as follows:

  • Friday, May 28th 2:00 - 3:00 PM
  • Friday, June 25th, 2:00 - 3:00 PM
  • Friday, July 30th, 2:00 - 3:00 PM
  • Friday, August 27th, 2:00 - 3:00 PM

Recent News


My research interests lie at the intersection of the computer security, privacy, and distributed systems fields. I am particularly interested in the design and analysis of systems that can be used to facilitate secure interactions across multiple security domains while still preserving each individual's privacy and autonomy. My work also investigates individuals' perceptions of privacy in the context of IoT and sensor-based systems, and the design of sensing systems that balance functionality and the privacy needs of users. My research has been supported by the NSF and DARPA, and I am an NSF CAREER award recipient.


  • CMPINF 0010: Big Ideas in Computing and Information
    • Fall 2019
  • CS/COE 0441: Discrete Structures for Computer Science
  • CS 1653: Applied Cryptography and Network Security
    • Fall 2017, Fall 2016, Spring 2014, Spring 2013, Spring 2012, Spring 2011, Spring 2010
  • CS 2001: Research Topics in Computer Science
  • CS 2530: Computer and Network Security
    • Fall 2016, Spring 2013, Fall 2010, Spring 2009
  • CS 3525: Advanced Topics in Security and Privacy


Note: Faculty members at the University of Pittsburgh do not individually admit students; admission decisions are made by a central committee. If you are interested in applying to our graduate program, you can find more information here. Unfortunately, I am not always able to respond to e-mail from prospective students, and I apologize in advance.

If you have already been admitted to our CS graduate program and are interested in pursuing a research project with me, please stop by my office or send me e-mail.

Current Students:

Graduated students:

  • Marian K. Zaki, PhD 2020
    • Thesis: Balancing Privacy, Precision, and Performance in Distributed Systems
  • Judicael-Briand Djoko-Takougue, PhD 2020
    • Thesis: Towards Practical Access Control and Usage Control on the Cloud using Trusted Hardware
  • Cory Thoma, PhD 2019
    • co-advised with Alexandros Labrinidis
    • Thesis: Towards Scalable, Cloud-Based, Confidential Data Stream Processing
  • Andrew Armstrong, MS 2016
    • Thesis: Exploiting Memory Hardware for Use in Cryptographic Operations
  • Andrew K. Adams, MS 2015
    • Thesis: Combining Social Authentication and Untrusted Clouds for Private Location Sharing
  • William C. Garrison III, PhD 2015
    • Thesis: Techniques for Application-Aware Suitability Analysis of Access Control Systems
  • Nicholas Farnan, PhD 2014
    • Thesis: Efficient, Locally-Enforceable Querier Privacy for Distributed Database Systems
  • Stephen Rojcewicz, MS 2014
    • co-advised with Panos K. Chrysanthis
  • Peter Djalaliev, PhD 2013
    • co-advised with J. Brustoloni
    • Thesis: Mitigating Botnet-Based DDoS Attacks Against Web Servers
  • Zhipeng Zhang, MS 2013

  • Yann Le Gall, MS 2013
    • Thesis: PlexC: A Policy Language for Exposure Control
  • Brian Wongchaowart, MS 2010
    • Thesis: Oblivious Enforcement of Hidden Information Release Policies Using Online Certification Authorities
  • Ricardo Villamarín-Salomón, PhD 2009
    • co-advised with J. Brustoloni
    • Thesis: Improving Computer Systems' Security with Warning Polymorphism and Security-Conditioning Applications