CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

June 4, 2021

Machine Learning for Wireless Cyber-Physical Systems Security

Speaker: Amir Alipour-Fanid, The Volgenau School of Engineering, George Mason University


June 1, 2021

Vulnerability Assessment of Logic Locking Techniques: Towards Next Generation Attacks on Logic Locking

Speaker: Kimia Zamiri Azar, The Volgenau School of Engineering, George Mason University


May 28, 2021

Secure Hardware Implementations of Lightweight and Post-Quantum Cryptography; Trade-offs, Applicability, and Tools

Speaker: Abubakr Abdulgadir, The Volgenau School of Engineering, George Mason University


April 6, 2021

CYSE Faculty Candidate Seminar: AI for Cyber-Physical Systems: Cyber Security and Efficiency

Speaker: Dr. Yanhai Xiong, Dartmouth College


April 5, 2021

CYSE Faculty Candidate Seminar: Explore Security and Privacy in Deep Image Retrieval Systems

Speaker: Dr. Cong Wang, Old Dominion University


April 2, 2021

CYSE Tenure-Track Faculty Candidate Seminar: Malware in the Electrical Power Grid: Attacks and Defenses

Speaker: Dr. Julian Rrushi, Oakland University, Michigan


April 1, 2021

CYSE Tenure-Track Faculty Candidate Seminar #4: Measurement Integrity in Network Tomography and Resource Allocation: Attacks and Defenses

Speaker: Shangqing Zhao, University of South Florida


March 31, 2021

CYSE Tenure-Track Faculty Candidate Seminar #3: Artificial Intelligence-Driven 5G and Beyond Radio Access Networks (RANs)

Speaker: Vijay Shah, Virginia Tech


March 30, 2021

Towards Trustworthy Decision-Making and AI: Explainability and Safety

Speaker: Bo Liu, Auburn University


March 29, 2021

CYSE Tenure-Track Faculty Candidate Seminar #2: Toward Safe and Secure Vehicular Networked Systems

Speaker: Bin Hu, Old Dominion University


March 26, 2021

CYSE Tenure-Track Faculty Candidate Seminar #1

Speaker: Linghan Zhang, Florida State University


March 25, 2021

Toward a Securer, Smarter, and Healthier World!

Speaker: Rajesh Kumar, Syracuse University


March 23, 2021

Sensitive Data Analytics with Local Differential Privacy

Speaker: Tianhao Wang, Purdue University


March 5, 2021

Machine Learning, Security, and Privacy: Challenges and Opportunities

Speaker: Binghui Wang, Duke University


March 4, 2021

Wireless AI for the Internet of Things

Speaker: Chenshu Wu, University of Maryland, College Park


March 2, 2021

Detecting and Visualizing Internet Failures: From Measurements to Streaming Analytics

Speaker: Alberto Dainotti, University of California San Diego


February 15, 2021

Mining and Learning from Graph Processes

Speaker: Arlei Silva, University of California, Santa Barbara


February 11, 2021

Opportunities and Barriers to Facilitating Evidence-Based Discussion about Civic Issues

Speaker: Brian McInnis, UC San Diego


February 5, 2021

Building Trustworthy Systems for Fighting Modern Threats

Speaker: Peng Gao, Postdoctoral Researcher in Computer Science at UC Berkeley


February 3, 2021

Side-Channel Threats on Modern Platforms

Speaker: Xiaokuan Zhang, Ohio State University


January 25, 2021

Decentralized cryptography eliminates identity and transaction fraud for everyone

Speaker: Manu Fontaine, CEO, Hushmesh Inc.


January 22, 2021

Demystifying Leakage in Encrypted Systems

Speaker: Evgenios Kornaropoulos, Postdoctoral Researcher, University of California, Berkeley


February 28, 2020

Policy Compliance in Online Services

Speaker: Aastha Mehta, Max Planck Institute for Software Systems (MPI-SWS)


February 6, 2020

(Em)powering Users and Their Devices

Speaker: Matthew Lentz, University of Maryland


November 1, 2019

Data Privacy and Statistical Inference

Speaker: Adam Smith, Boston University


October 30, 2019

Why Don't People ... Use Security, Protect Their Data, and Adopt the Available Solutions?

Speaker: Jean Camp, Indiana University


May 23, 2019

Machine Learning through Graph Algorithms, Systems and Cybersecurity Applications

Speaker: Howie Huang, George Washington University


April 29, 2019

Cyber Resilience in Japan and US-Japan Cybersecurity Relationships

Speaker: Kenzo FUJISUE, Ph.D, Member of Japanese House of Councillors (Upper House)


April 22, 2019

Cybersecurity Dynamics: Framework, Some Results, and Future Research Directions

Speaker: Shouhuai Xu, University of Texas at San Antonio


April 17, 2019

Is my GPU Secure? Covert and Side Channel Attacks on GPUs

Speaker: Dr. Nael Abu-Ghazaleh, University of California, Riverside


April 12, 2019

FingerPIN: A Novel Authentication Scheme Combining Fingerprints and Numeric PINs

Speaker: Tanmoy Chowdhury, George Mason University


April 5, 2019

Deep Learning in the Biomedical Sciences

Speaker: Pierre Baldi, University of California Irvine


April 3, 2019

From Theory to Practice: From Zero-Knowledge via Secure Computation to a Next-Generation Signature Scheme

Speaker: Jonathan Katz, University of Maryland


March 22, 2019

Computational Social Science with Latents

Speaker: Prof. Il-Chul Moon, Korea Advanced Institute of Science and Technology


March 8, 2019

Robust Phishing URL Detection via Generative Models and Graphical Inference

Speaker: Prof. Noseong Park, George Mason University


March 1, 2019

Adversarial learning on deep graph generative models and applications

Speaker: Liang Zhao, George Mason University


February 22, 2019

Mission Dependency Analysis with Physical Network Relationships*

Speaker: Dr. Les Servi, The MITRE Corporation


February 15, 2019

Probabilistic Reasoning Meets Heuristic Search

Speaker: Rina Dechter, University of California, Irvine


February 8, 2019

Network Analysis for Time Series Data

Speaker: Brandon Park, George Mason University


February 7, 2019

Assuring the Root of Trust for Internet-of-Things (IoTs)

Speaker: Qiaoyan Yu, University of New Hampshire


January 23, 2019

Machine Learning for Time Series via Optimally Compressed Bayesian Methods

Speaker: Dr. Alec Koppel, Army Research Laboratory


November 19, 2018

Information Based Sensor Management for ISR

Speaker: Ken Hintz, George Mason University


November 16, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network

Speaker: Dr. Nahid Farhady Ghalaty, Accenture Technology Labs


November 9, 2018

Explainable AI

Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University


November 8, 2018

Falling Out of Love with Science

Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering


November 5, 2018

Building Cyber Resilience in the "Age of Accelerations"

Speaker: Linton Wells II, George Mason University


October 24, 2018

Digital Artifact Persistence, Extraction, Analysis, and Manipulation

Speaker: Jim Jones, George Mason University


October 22, 2018

GAN based Privacy Attacks on Decentralized Deep Learning

Speaker: Briland Hitaj, Sapienza University, Rome, Italy


October 19, 2018

Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses

Speaker: Avesta Sasan, George Mason University


October 18, 2018

Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation

Speaker: Wilbur Shi, Princeton University


October 12, 2018

The Impact of AI and IT Synergies on Healthcare and Biomedicine

Speaker: Dr. Nikolaos Bourbakis, Wright State University


October 11, 2018

Self Monitoring Goal Driven Autonomous Agents

Speaker: Dr. Dustin Dannenhauer, Naval Research Lab


October 5, 2018

The Internet of Acoustic Things (IoAT)

Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign


September 21, 2018

Privacy, Stability and Generalization

Speaker: Adam Smith, Boston University


July 9, 2018

Limitations of Data-driven Frequency-based Approaches for Social Computing

Speaker: Prof. Valerie Shalin, Wright State University


June 21, 2018

Data Series Management: Fulfilling the Need for Big Sequence Analytics

Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University


June 8, 2018

The Importance of Protecting Critical Transportation Infrastructure

Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates


April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis


April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida


April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang


March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University


March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan


March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte


February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park


April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park



January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines


June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India


April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University


April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley


April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.



April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary



March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University


April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University


April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park


March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences


March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy


March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign


March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München