Curriculum Vitae
Curriculum Vitae Link
Education
-
PhD, Wayne State University, 2008
Major: Computer Science
-
MS, Wayne State University, 2006
Major: Computer Science
Current Scheduled Teaching
INFO 5810.020 | Data Analysis and Knowledge Discovery | Fall 2025 |
|
|
INFO 5900.410 | Special Problems | Fall 2025 |
|
|
INFO 6900.047 | Special Problems | Fall 2025 |
|
|
INFO 6910.702 | Special Problems | Summer 10W 2025 |
|
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Previous Scheduled Teaching
INFO 6910.702 | Special Problems | Summer 10W 2025 |
|
|
INFO 5810.020 | Data Analysis and Knowledge Discovery | Spring 2025 |
|
SPOT
|
INFO 6900.035 | Special Problems | Spring 2025 |
|
|
INFO 5810.020 | Data Analysis and Knowledge Discovery | Fall 2024 |
|
SPOT
|
INFO 5810.003 | Data Analysis and Knowledge Discovery | Spring 2024 |
|
SPOT
|
INFO 5810.020 | Data Analysis and Knowledge Discovery | Spring 2024 |
|
SPOT
|
INFO 5810.002 | Data Analysis and Knowledge Discovery | Fall 2023 |
|
SPOT
|
Texas Education Code 51.974 (HB 2504) requires each institution of higher education to make available to the public, a syllabus for undergraduate lecture courses offered for credit by the institution.
Published Intellectual Contributions
- Striegel, A., Sha, K., Song, M. (2022). Advances in Computer Communications and Networks From Green, Mobile, Pervasive Networking to Big Data Computing. River Publishers. https://doi.org/10.1201/9781003337096
- Sha, K., Striegel, A., Song, M. (2022). Security, Privacy and Reliability in Computer Communications and Networks. River Publishers. https://doi.org/10.1201/9781003339410
- Peters, M., Yang, T.A., Wei, W., Sha, K., Davari, S. (2021). Examining the Influence of Participating in a Cyber Defense Track on Students’ Cybersecurity Knowledge, Awareness, and Career Choices. Transactions on Computational Science and Computational Intelligence. 31-42. Springer International Publishing. https://doi.org/10.1007/978-3-030-70873-3_3
- Cui, J., Xu, W., Sha, K., Zhong, H. (2018). An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 508-518. Springer International Publishing. https://doi.org/10.1007/978-3-030-00916-8_47
- Liu, S., Du, J., Yang, X., Li, R., Liu, H., Sha, K. (2016). CrowdBlueNet: Maximizing Crowd Data Collection Using Bluetooth Ad Hoc Networks. Lecture Notes in Computer Science. 356-366. Springer International Publishing. https://doi.org/10.1007/978-3-319-42836-9_32
- Sha, K., Zhan, G., Al-Omari, S., Calappi, T., Shi, W., Miller, C. (2009). Data Quality and Failures Characterization of Sensing Data in Environmental Applications. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. 679-695. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_50
- Du, J., Shi, W., Sha, K. (2005). Asymmetry-Aware Link Quality Services in Wireless Sensor Networks. Lecture Notes in Computer Science. 745-754. Springer Berlin Heidelberg. https://doi.org/10.1007/11596356_74
- Zhang, H., Fan, H., Sha, K., Huang, Y., Feng, Y. (2025). DAM: Dynamic Attention Mask for Long-Context Large Language Model Inference Acceleration. Findings of the Association for Computational Linguistics: ACL 2025. 4663-4676. Association for Computational Linguistics. https://doi.org/10.18653/v1/2025.findings-acl.242
- Zhang, H., Lucero, H., Sha, K., Fan, H., Fu, S., Feng, Y. (2025). D2SO: Detecting Distant and Small Objects for Vision-Based Vehicle Autonomous Systems. 2025 IEEE 3rd International Conference on Mobility, Operations, Services and Technologies (MOST). 35-42. IEEE. https://doi.org/10.1109/most65065.2025.00013
- Wu, Y., Dhamodharan, S., Ghattamaneni, V., Kokila, N., Pathakamuri, C., Carter, T., Tian, P., Sha, K. (2024). Big Data Quality Scoring for Structured Data Using MapReduce. 2024 33rd International Conference on Computer Communications and Networks (ICCCN). 1-6. IEEE. https://doi.org/10.1109/icccn61486.2024.10637520
- Zhou, Y., Tu, F., Sha, K., Ding, J., Chen, H. (2024). A Survey of Data Quality Evaluation and Tools for Machine Learning. 2024 IEEE Intl. Conference on AI Testing.
- Zhou, Y., Tu, F., Sha, K., Ding, J., Chen, H. (2024). A Survey on Data Quality Dimensions and Tools for Machine Learning Invited Paper. 2024 IEEE International Conference on Artificial Intelligence Testing (AITest). 120-131. IEEE. https://doi.org/10.1109/aitest62860.2024.00023
- Neal, Z., Sha, K. (2023). Analysis of Evil Twin, Deauthentication, and Disassociation Attacks on Wi-Fi Cameras. IEEE. https://ieeexplore.ieee.org/abstract/document/10230183
- Sha, K. (2023). Message from the Workshop General Chair. 2023 32nd International Conference on Computer Communications and Networks (ICCCN). 1-2. IEEE. https://doi.org/10.1109/icccn58024.2023.10230142
- Niswanger, R., Sha, K., Lerman, D.C. (2023). Poster: Design of Mixed Reality Dangerous Situations for Autistic Children: Road Safety. Proceedings of the 8th ACM/IEEE International Conference on Connected Health: Applications, Systems and Engineering Technologies. 205-206. ACM. https://doi.org/10.1145/3580252.3589430
- Azeroual, O., Nikiforova, A., Sha, K. (2023). Overlooked Aspects of Data Governance: Workflow Framework For Enterprise Data Deduplication. 2023 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). 65-73. IEEE. https://doi.org/10.1109/iccns58795.2023.10193478
- Yue, K., Sha, K., Thamarai Selvan, J.S., Guerra, M., Wei, W., Chakka, S., Vuchuru, P., Koduru, M., Liu, X., Tang, V., Wagner, H. (2023). Confidentiality and Data Integrity in Consortium Blockchain Applications for Model Based Systems Engineering. AIAA SCITECH 2023 Forum. American Institute of Aeronautics and Astronautics. https://doi.org/10.2514/6.2023-1113
- Wu, Y., Sha, K., Yue, K. (2022). Poster: Blockchain-Enabled Federated Edge Learning for Big Data Quality Assessment. 2022 IEEE/ACM 7th Symposium on Edge Computing (SEC). IEEE. https://doi.org/10.1109/sec54971.2022.00032
- Sun, H., Chen, Y., Sha, K., Wu, Y. (2022). Poster: Ensemble Federated Edge Learning for Recommender Systems. 2022 IEEE/ACM 7th Symposium on Edge Computing (SEC). IEEE. https://doi.org/10.1109/sec54971.2022.00035
- Sha, K., Wang, X., Peng, X. (2022). Self-Searching Maximum Torque per Ampere Working Point Based on Coordinate Tracking. 2022 25th International Conference on Electrical Machines and Systems (ICEMS). 1-4. IEEE. https://doi.org/10.1109/icems56177.2022.9983274
- Neumann, T., Welsh, K., Perez, C., Sha, K., Wu, Y. (2022). R2 P3: Renewal-Reward Process-Based Password Protection in Internet of Things. 2022 International Conference on Computer Communications and Networks (ICCCN). 1-7. IEEE. https://doi.org/10.1109/icccn54977.2022.9868934
- Sha, K., Wei, W., Jain, A. (2021). Design of Network Forensics Labs for Teaching-oriented Institutions. 2021 International Conference on Computational Science and Computational Intelligence (CSCI). 959-963. IEEE. https://doi.org/10.1109/csci54926.2021.00213
- Sha, K. (2021). Lessons and Experiences From Teaching Computing Science Capstone Project Courses. 2021 International Conference on Computational Science and Computational Intelligence (CSCI). 990-995. IEEE. https://doi.org/10.1109/csci54926.2021.00216
- Yue, K., Guerra, M., Wagner, H., Thamarai Selvan, J.S., Collector, K., Tang, V., Sikes, M., Sha, K., Kallempudi, P., Mardani, S., Kasichainula, K. (2021). Applying Blockchain Technology on Model-Based Systems Engineering. AIAA Scitech 2021 Forum. American Institute of Aeronautics and Astronautics. https://doi.org/10.2514/6.2021-0093
- Sha, K., Li, Y. (2019). ChordEdge. Proceedings of the 4th ACM/IEEE Symposium on Edge Computing. 280-282. ACM. https://doi.org/10.1145/3318216.3363318
- Kayastha, N., Sha, K. (2019). Poster Abstract: A Novel and Efficient Approach to Evaluate Biometric Features for User Identification. 2019 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). 21-22. IEEE. https://doi.org/10.1109/chase48038.2019.00016
- Sha, K., Liu, Z., Dempsey, J. (2019). Poster Abstract: Augmented Reality Based Therapy System for Social Skill Deficits. 2019 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). 19-20. IEEE. https://doi.org/10.1109/chase48038.2019.00015
- Sha, K., Kumari, M. (2018). Patient identification based on wrist activity data. Proceedings of the 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies. 29-30. ACM. https://doi.org/10.1145/3278576.3278590
- Chen, S., Wang, Z., Sha, K. (2018). Cluster-Aware Kronecker Supported Data Collection for Sensory Data. 2018 27th International Conference on Computer Communication and Networks (ICCCN). 1-6. IEEE. https://doi.org/10.1109/icccn.2018.8487437
- Zhong, H., Huang, B., Cui, J., Li, J., Sha, K. (2018). Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. 2018 27th International Conference on Computer Communication and Networks (ICCCN). 1-8. IEEE. https://doi.org/10.1109/icccn.2018.8487337
- Cui, J., Zhou, S., Zhong, H., Xu, Y., Sha, K. (2018). Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. 2018 27th International Conference on Computer Communication and Networks (ICCCN). 1-9. IEEE. https://doi.org/10.1109/icccn.2018.8487415
- Zhang, Y., Yang, X., Wu, L., Lu, J., Sha, K., Gajjar, A., He, H. (2018). Exploring Slice-Energy Saving on an Video Processing FPGA Platform with Approximate Computing. Proceedings of the 2018 2nd International Conference on Algorithms, Computing and Systems. 138-143. ACM. https://doi.org/10.1145/3242840.3242852
- Alramadhan, M., Sha, K. (2017). An Overview of Access Control Mechanisms for Internet of Things. 2017 26th International Conference on Computer Communication and Networks (ICCCN). 1-6. IEEE. https://doi.org/10.1109/icccn.2017.8038503
- Manoharan, N., Sha, K., Lu, J. (2017). Exercise Evaluation Using Wrist Sensors. 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE). 268-269. IEEE. https://doi.org/10.1109/chase.2017.96
- Sha, K., Errabelly, R., Wei, W., Yang, T.A., Wang, Z. (2017). EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security. 2017 IEEE 1st International Conference on Fog and Edge Computing (ICFEC). 81-88. IEEE. https://doi.org/10.1109/icfec.2017.7
- Wei, W., Yang, A.T., Shi, W., Sha, K. (2016). Security in Internet of Things: Opportunities and Challenges. 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI). 512-518. IEEE. https://doi.org/10.1109/iiki.2016.35
- Wei, W., Mann, A., Sha, K., Yang, T.A. (2016). Design and implementation of a multi-facet hierarchical cybersecurity education framework. 2016 IEEE Conference on Intelligence and Security Informatics (ISI). 273-278. IEEE. https://doi.org/10.1109/isi.2016.7745488
- Basheer, A., Sha, K. (2016). QAAC: Quality-Assured Adaptive Data Compression for Sensor Data. 2016 25th International Conference on Computer Communication and Networks (ICCCN). 1-6. IEEE. https://doi.org/10.1109/icccn.2016.7568564
- Darling, T.V., Sha, K. (2015). REMEDY: Remote exercise monitoring using an evaluative data sensing system for cancer. 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). 661-664. IEEE. https://doi.org/10.1109/healthcom.2015.7454587
- Du, J., Liu, S., Xu, C., Wang, K., Liu, H., Sha, K. (2014). Lightweight construction of the information potential field in wireless sensor networks. 2014 23rd International Conference on Computer Communication and Networks (ICCCN). 1-8. IEEE. https://doi.org/10.1109/icccn.2014.6911785
- Sha, K., Xu, C., Wang, Z. (2014). One-time symmetric key based cloud supported secure smart meter reading. 2014 23rd International Conference on Computer Communication and Networks (ICCCN). 1-6. IEEE. https://doi.org/10.1109/icccn.2014.6911854
- Du, J., Li, Y., Liu, H., Sha, K. (2010). On Sweep Coverage with Minimum Mobile Sensors. 2010 IEEE 16th International Conference on Parallel and Distributed Systems. 283-290. IEEE. https://doi.org/10.1109/icpads.2010.109
- Sha, K., Zhan, G., Shi, W., Lumley, M., Wiholm, C., Arnetz, B. (2008). SPA. Proceedings of the 2nd International Workshop on Systems and Networking Support for Health Care and Assisted Living Environments. 1-3. ACM. https://doi.org/10.1145/1515747.1515755
- Sha, K., Shi, W. (2007). Modeling Data Consistency in Wireless Sensor Networks. 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07). 16-16. IEEE. https://doi.org/10.1109/icdcsw.2007.52
- Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T. (2007). Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks. Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07). 344-351. IEEE. https://doi.org/10.1109/isads.2007.37
- Sha, K., Xi, Y., Shi, W., Schwiebert, L., Zhang, T. (2006). Adaptive Privacy-Preserving Authentication in Vehicular Networks. 2006 First International Conference on Communications and Networking in China. 1-8. IEEE. https://doi.org/10.1109/chinacom.2006.344746
- Sha, K., Shi, W., Watkins, O. (2006). Using Wireless Sensor Networks for Fire Rescue Applications: Requirements and Challenges. 2006 IEEE International Conference on Electro/Information Technology. 239-244. IEEE. https://doi.org/10.1109/eit.2006.252145
- Sun, H., Sha, K., Wang, Z., Yu, Y., Wu, Y. (2024). A Collaborative Computation Offloading Strategy in Distributed Edge Computing Systems. IEEE Transactions on Services Computing. https://ieeexplore.ieee.org/abstract/document/10360217
- Sha, K., Yue, K., Wei, W., Wu, Y., Koduru, M., Vuchuru, P. (2024). ConsortiumSec: Blockchain-based Distributed Security Framework for Consortium Applications. Distributed Ledger Technologies: Research and Practice. Association for Computing Machinery (ACM). https://doi.org/10.1145/3699965
- Sun, H., Sha, K., Zhang, X., Zhang, B., Shi, W. (2024). Optimal Task Offloading and Trajectory Planning Algorithms for Collaborative Video Analytics with UAV-assisted Edge in Disaster Rescue. IEEE Transactions on Vehicular Technology. https://ieeexplore.ieee.org/abstract/document/10365400
- Ding, R., Xu, Y., Zhong, H., Cui, J., Sha, K. (2023). Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. IEEE Transactions on Services Computing. 16 (5) 3782-3795. IEEE. https://ieeexplore.ieee.org/abstract/document/10109159/authors#authors
- Sun, H., Sha, K., Chen, Y., Huang, S., Shi, W. (2023). A Proactive On-Demand Content Placement Strategy in Edge Intelligent Gateways. IEEE Transactions on Parallel and Distributed Systems. 34 (7) 2072 - 2090. IEEE. https://ieeexplore.ieee.org/abstract/document/10054497
- Sun, H., Li, Q., Sha, K., Yu, Y. (2022). ElasticEdge: An Intelligent Elastic Edge Framework for Live Video Analytics. Other. 9 (22) 23031-23046. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/jiot.2022.3187621
- Sun, H., Yu, Y., Sha, K., Zhong, H. (2022). EdgeEye: A Data-Driven Approach for Optimal Deployment of Edge Video Analytics. Other. 9 (19) 19273-19295. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/jiot.2022.3166896
- Sun, H., Zhang, B., Zhang, X., Yu, Y., Sha, K., Shi, W. (2022). FlexEdge: Dynamic Task Scheduling for a UAV-Based On-Demand Mobile Edge Server. Other. 9 (17) 15983-16005. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/jiot.2022.3152447
- Li, Y., Yin, Y., Chen, X., Wan, J., Jia, G., Sha, K. (2022). A Secure Dynamic Mix Zone Pseudonym Changing Scheme Based on Traffic Context Prediction. IEEE Transactions on Intelligent Transportation Systems. 23 (7) 9492-9505. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/tits.2021.3125744
- Ram, V.S., Kayastha, N., Sha, K. (2022). OFES: Optimal feature evaluation and selection for multi-class classification. Other. 139 102007. Elsevier BV. https://doi.org/10.1016/j.datak.2022.102007
- Azeroual, O., Jha, M., Nikiforova, A., Sha, K., Alsmirat, M., Jha, S. (2022). A Record Linkage-Based Data Deduplication Framework with DataCleaner Extension. Other. 6 (4) 27. MDPI AG. https://doi.org/10.3390/mti6040027
- Sudhakar, S.R., Kayastha, N., Sha, K. (2021). ActID: An efficient framework for activity sensor based user identification. Other. 108 102319. Elsevier BV. https://doi.org/10.1016/j.cose.2021.102319
- Tang, J., Chen, Y., She, G., Xu, Y., Sha, K., Wang, X., Wang, Y., Zhang, Z., Hui, P. (2021). Identifying Mis-Configured Author Profiles on Google Scholar Using Deep Learning. Applied Sciences. 11 (15) 6912. MDPI AG. https://doi.org/10.3390/app11156912
- Sun, H., Yu, Y., Sha, K., Lou, B. (2020). mVideo: Edge Computing Based Mobile Video Processing Systems. IEEE Access. 8 11615-11623. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/access.2019.2963159
- Sha, K., Yang, T.A., Wei, W., Davari, S. (2020). A survey of edge computing-based designs for IoT security. Other. 6 (2) 195-202. Elsevier BV. https://doi.org/10.1016/j.dcan.2019.08.006
- Li, Y., Dong, Z., Sha, K., Jiang, C., Wan, J., Wang, Y. (2019). TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing. IEEE Access. 7 40240-40257. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/access.2019.2907319
- Sha, K., Liang, X., Li, W. (2019). Editorial: Special Issue on Security in Medical Cyber-Physical Systems. Other. 12 1-2. Elsevier BV. https://doi.org/10.1016/j.smhl.2018.11.003
- Sha, K., Wei, W., Andrew Yang, T., Wang, Z., Shi, W. (2018). On security challenges and open issues in Internet of Things. Future Generation Computer Systems. 83 326-337. Elsevier BV. https://doi.org/10.1016/j.future.2018.01.059
- Sha, K., Alatrash, N., Wang, Z. (2017). A Secure and Efficient Framework to Read Isolated Smart Grid Devices. IEEE Transactions on Smart Grid. 8 (6) 2519-2531. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/tsg.2016.2526045
- Liu, S., Du, J., Liu, H., Li, R., Yang, X., Sha, K. (2017). Energy-Efficient Algorithm to Construct the Information Potential Field in WSNs. Other. 17 (12) 3822-3831. Institute of Electrical and Electronics Engineers (IEEE). https://doi.org/10.1109/jsen.2017.2690338
- Basheer, A., Sha, K. (2017). Cluster-Based Quality-Aware Adaptive Data Compression for Streaming Data. Other. 9 (1) 1-33. Association for Computing Machinery (ACM). https://doi.org/10.1145/3122863
- Mao, S., Wang, H., Striegel, A., Sha, K. (2016). Guest Editorial: Special Issue on Cognitive, Cellular and Mobile Networks. Other. 2 (7) 150996. European Alliance for Innovation n.o.. https://doi.org/10.4108/eai.19-1-2016.150996
- Sha, K., Zeadally, S. (2015). Data Quality Challenges in Cyber-Physical Systems. Other. 6 (2-3) 1-4. Association for Computing Machinery (ACM). https://doi.org/10.1145/2740965
- Sha, K., Wu, Z. (2013). Editorial: Special Issue in Privacy, Security and Trust for Mobile Systems. Wireless Personal Communications. 73 (1) 1-3. Springer Science and Business Media LLC. https://doi.org/10.1007/s11277-013-1417-0
- Sha, K., Gehlot, J., Greve, R. (2013). Multipath Routing Techniques in Wireless Sensor Networks: A Survey. Wireless Personal Communications. 70 (2) 807-829. Springer Science and Business Media LLC. https://doi.org/10.1007/s11277-012-0723-2
- Du, J., Shi, W., Sha, K. (2009). Asymmetry-aware link layer services in wireless sensor networks. Journal of Embedded Computing. 3 (2) 141-154. SAGE Publications. https://doi.org/10.3233/jec-2009-0087
- Xi, Y., Sha, K., Shi, W., Schwiebert, L., Zhang, T. (2008). Probabilistic Adaptive Anonymous Authentication in Vehicular Networks. Journal of Computer Science and Technology. 23 (6) 916-928. Springer Science and Business Media LLC. https://doi.org/10.1007/s11390-008-9194-z
- Sha, K., Du, J., Shi, W. (2006). WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs. International Journal of Sensor Networks. 1 (3/4) 156. Inderscience Publishers. https://doi.org/10.1504/ijsnet.2006.012031
- Sha, K., Shi, W. (2005). Modeling the Lifetime of Wireless Sensor Networks. Other. 3 (2) 126-135. American Scientific Publishers. https://doi.org/10.1166/sl.2005.017
- Sha, K., Subramanyam Cherukuri, K., Chen, H. (2025). Privacy and Bias in Edge Computing *. Edge Computing. 223-252. Wiley. https://doi.org/10.1002/9781394285860.ch8
- Dargie, W., Hegde, S.S., Sha, K. Person Identification Using Footstep Acoustics with Cnn and Transformer Models in Real-World Settings ⋆. Elsevier BV. https://doi.org/10.2139/ssrn.5232180
Contracts, Grants and Sponsored Research
- Sha, K. (Principal), "Collaborative Research: Conference: NSF Computer and Information Science and Engineering Research Expansion Program (CISE MSI) 2024-2026 Aspiring Principal Investigators Workshop," sponsored by NSF, Federal, $100000 Funded. (2024 - 2026).
- Sha, K. (Principal), "Collaborative Research: CISE-MSI: DP: CNS: An Edge-Based Approach to Robust Multi-Robot Systems in Dynamic Environments," sponsored by NSF, Federal, $234982 Funded. (2022 - 2025).
- Sha, K. (Principal), "UNT Global Venture Fund," sponsored by UNT, University of North Texas, $4000 Funded. (2023 - 2024).