CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

November 9, 2018

Explainable AI

Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University

November 8, 2018

Falling Out of Love with Science

Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering

November 5, 2018

Building Cyber Resilience in the "Age of Accelerations"

Speaker: Linton Wells II, George Mason University

October 24, 2018

Digital Artifact Persistence, Extraction, Analysis, and Manipulation

Speaker: Jim Jones, George Mason University

October 22, 2018

GAN based Privacy Attacks on Decentralized Deep Learning

Speaker: Briland Hitaj, Sapienza University, Rome, Italy

October 19, 2018

Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses

Speaker: Avesta Sasan, George Mason University

October 18, 2018

Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation

Speaker: Wilbur Shi, Princeton University

October 12, 2018

The Impact of AI and IT Synergies on Healthcare and Biomedicine

Speaker: Dr. Nikolaos Bourbakis, Wright State University

October 11, 2018

Self Monitoring Goal Driven Autonomous Agents

Speaker: Dr. Dustin Dannenhauer, Naval Research Lab

October 5, 2018

The Internet of Acoustic Things (IoAT)

Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign

September 21, 2018

Privacy, Stability and Generalization

Speaker: Adam Smith, Boston University

July 9, 2018

Limitations of Data-driven Frequency-based Approaches for Social Computing

Speaker: Prof. Valerie Shalin, Wright State University

June 21, 2018

Data Series Management: Fulfilling the Need for Big Sequence Analytics

Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University

June 8, 2018

The Importance of Protecting Critical Transportation Infrastructure

Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates

April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis

April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida

April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang

March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University

March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan

March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte

February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park

April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park

January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines

June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India

April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University

April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley

April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.

April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary

March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University

April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University

April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park

March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences

March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy

March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign

March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München