Skip to main content

Jing Lei

Assistant Professor, Department of Statistics


Jing Lei


Jing Lei graduated from Department of Statistics at UC Berkeley in May 2010 under supervision of Professor Peter Bickel. Lei worked at Google as a statistician for one year before he joined the Statistics Department at Carnegie Mellon University.

Lei's main research area is statistical theory and methodology, including

  • analyzing statistical properties of some popular methods and algorithms in machine learning and engineering, such as the particle filter, spectral clustering, and sparse PCA;
  • developing new statistical methods that are suitable for high-dimensional, complex data, including dimension reduction, regression, clustering, hypothesis testing, etc;
  • understanding the meaning and properties of relevant concepts and methods in related fields from a statistical perspective, such as data privacy, data assimilation, and conformal prediction. These insights will usually lead to useful improvements or modifications.

He is also working on applied problems in astronomy and genetics, using nonparametric smoothing, network estimation, and multiple testing techniques.


"Lightweight Source Authentication and Path Validation". Tiffany Hyun-Jin Kim, Limin Jia, Cristina Basescu, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. In ACM SIGCOMM, August 2014. 

"Temporal Mode-Checking for Runtime Monitoring of Privacy Policies". Omar Chowdhury, Limin Jia, Deepak Garg, and Anupam Datta. In 26th International Conference on Computer Aided Verification (CAV), July 2014. 

"Continuous Tamper-proof Logging Using TPM 2.0". Arunesh Sinha, Limin Jia, Paul England, and Jacob R. Lorch. In 7th International Conference on Trust & Trustworthy Computing (TRUST), June 2014. 

"A Program Logic for Verifying Secure Routing Protocols". Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo. In IFIP International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), June 2014. 

"Privacy-Preserving Audit for Broker-Based Health Information Exchange". Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, and Anupam Datta. In ACM Conference on Data and Application Security and Privacy (CODASPY), Feb. 2014. 

"Design, Implementation and Verification of an Extensible and Modular Hypervisor". Datta, A., Vasudevan, A., Chaki, S., Jia, L., McCune, J., & Newsome, J. (2013). IEEE Symposium on Security and Privacy.

"Privacy Promises That Can Be Kept: A Policy Analysis Method with Application to the HIPAA Privacy Rule". Datta, A., Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Jia, L., & Winsborough, W. H. (2013). ACM Symposium on Access Control Models and Technologies.

"Run-time enforcement of information-flow properties on Android (extended abstract)". Jia, L., Aljuraidan, J., Fragkaki, E., Bauer, L., Stroucken, M., Fukushima, K., Kiyomoto, S., & Miyake, Y. (2013). European Symposium on Research in Computer Security (ESORICS).