Past Seminars
Speaker: Sanchari Das, University of Denver
May 2, 2024
Why do small language models underperform?
Speaker: Benoît Sagot, Director of Research at INRIA
April 19, 2024
Advances in Adversarial Risk Analysis
Speaker: Fabrizio Ruggeri, Consiglio Nazionale delle Ricerche, Italy
March 25, 2024
“Scrambling for Privacy” - Inside the Encryption Wars 1986-2000 and the battle over privacy, security, and the future of a secure Internet
Speaker: James Bidzos, CEO/Founder of Verisign
March 20, 2024
Human versus Machine Perception of Patterns - A visual Turing Test: “Are you a human or a robot?”
Speaker: Yanxi Liu, Penn State University
March 13, 2024
A Preliminary Study on Using Large Language Models in Software Pentesting
Speaker: Dr. Simon Ou, University of South Florida
February 16, 2024
Reinforcement Learning for Safety-Critical Systems
Speaker: Enrique Mallada, Johns Hopkins University
February 9, 2024
Unsupervised Learning of Depth Perception and Beyond
Speaker: Alex Wong, Yale University
November 30, 2023
High-Level Approaches to Hardware and Embedded Security
Speaker: Ramesh Karri, New York University
November 17, 2023
The Biodesign of Computing
Speaker: Stephanie Forrest, Arizona State University,
October 23, 2023
The Science of Generative AI: Focus on Reasoning
Speaker: Dan Roth, University of Pennsylvania
September 22, 2023
PAC Privacy: Automatic Privacy Measurement and Control of Data Processing
Speaker: Srini Devadas, Massachusetts Institute of Technology
September 6, 2023
Biometrics in a Deep Learning World
Speaker: Arun Ross, Michigan State University
September 1, 2023
Data Science at the Singularity
Speaker: David Donoho, Stanford University
May 5, 2023
Offensive Language Identification in Social Media
Speaker: Dr. Marcos Zampieri, Assistant Professor, George Mason University
April 19, 2023
Differential Privacy without Centralization
Speaker: Albert Cheu, Georgetown University
April 17, 2023
Cache-based Attacks against ARM TrustZone
Speaker: Kun Sun, George Mason University
April 12, 2023
AI-Enhanced Software Vulnerability and Security Patch Analysis
Speaker: Xinda Wang, George Mason University
March 31, 2023
Large-Scale Collaborative Data Management in Untrusted Environments
Speaker: Mohammad Amiri, University of Pennsylvania
March 29, 2023
Secure by Design, What does it mean? What does it take?
Speaker: Mehdi Mirakhorli, Rochester Institute of Technology
March 28, 2023
Cybersecurity Research in the Era of Quantum, IoT, AI, and 6G
Speaker: Zhengdao Wang, Iowa State University
March 24, 2023
Internet-Scale Discovery and Security Analysis of EV Charging Management Systems
Speaker: Dr. Sadegh Torabi, Assistant Professor, George Mason University
March 22, 2023
Leveraging Multimodal Sensing for Enhancing the Security and Privacy of Mobile Systems
Speaker: Habiba Farukh, Purdue University
February 3, 2023
AI-Enhanced Software Vulnerability and Security Patch Analysis
Speaker: Ms. Xinda Wang
January 26, 2023
Towards a Hardware/Software Co-Design Approach for CPS and IoT Security
Speaker: Anomadarshi Barua, University of California, Irvine
January 20, 2023
Cyber security over AI-empowered Internet-of-Things
Speaker: Chong Yu, University of Nebraska-Lincoln
October 28, 2022
Non-invasive Wireless Sensing with Machine Learning
Speaker: Xiaonan Guo, George Mason University
October 14, 2022
CSIS Seminar 10/14/2022
Speaker: Dr. Lei Yang, George Mason University
March 11, 2022
Specializing Computing Systems for Graph Algorithms
Speaker: Xuhao Chen, Massachusetts Institute of Technology
March 8, 2022
Towards Trustworthy Knowledge Sharing of Language Models
Speaker: Chenguang Wang, University of California, Berkeley
March 7, 2022
Securing Operating System Kernels with Fewer Shots
Speaker: Yueqi Chen, Penn State University
March 3, 2022
Strengthening and Enriching Machine Learning for Cybersecurity
Speaker: Wenbo Guo, Penn State
February 28, 2022
Memristive Nanoelectronics in Neuromorphic Computing and
Considerations for Hardware Security
Speaker: Garrett S. Rose, Ph.D., University of Tennessee, Knoxville
February 24, 2022
Automating the Protection of Internet Freedoms
Speaker: Kevin Bock, Ph.D. Candidate, University of Maryland
February 23, 2022
Toward Resilience of Civil Infrastructures: Machine Learning-based Probabilistic Assessment
Speaker: Farahnaz Soleimani, Ph.D., Georgia Insititute of Technology
February 15, 2022
Artificial Intelligence in Biometrics: Past, Present, and Future Challenges
Speaker: Dr. Damon L. Woodard, University of Florida
February 14, 2022
Squashing Bugs and Empowering Programmers with User-Centered Programming Language Design
Speaker: Michael Coblenz, University of Maryland, College Park
February 11, 2022
Watermarking for Protecting Deep Image Classifiers against Adversarial Attacks: A Framework and Algorithms
Speaker: Dr. En-hui Yang, University of Waterloo, Waterloo, Ontario, Canada
January 25, 2022
An Eigenmodel for Dynamic Multilayer Networks
Speaker: Joshua Loyal, University of Illinois at Urbana-Champaign
November 12, 2021
Algorithmic Fairness: Collisions and Collaborations Between Technology and Society
Speaker: Suresh Venkatasubramanian, PhD
October 21, 2021
Cache-based Attacks Against ARM TrustZone
Speaker: Dr. Kun Sun, George Mason University
July 26, 2021
Implementation and Assessment of Strong Logic Encryption Techniques
Speaker: Shervin Roshanisefat, Volgenau School of Engineering, George Mason University
July 22, 2021
Towards Efficient and Scalable SDN-based Data Center Monitoring and Management
Speaker: Zili Zha, Volgenau School of Engineering, George Mason University
June 4, 2021
Machine Learning for Wireless Cyber-Physical Systems Security
Speaker: Amir Alipour-Fanid, The Volgenau School of Engineering, George Mason University
June 1, 2021
Vulnerability Assessment of Logic Locking Techniques: Towards Next Generation Attacks on Logic Locking
Speaker: Kimia Zamiri Azar, The Volgenau School of Engineering, George Mason University
May 28, 2021
Secure Hardware Implementations of Lightweight and Post-Quantum Cryptography; Trade-offs, Applicability, and Tools
Speaker: Abubakr Abdulgadir, The Volgenau School of Engineering, George Mason University
April 6, 2021
CYSE Faculty Candidate Seminar: AI for Cyber-Physical Systems: Cyber Security and Efficiency
Speaker: Dr. Yanhai Xiong, Dartmouth College
April 5, 2021
CYSE Faculty Candidate Seminar: Explore Security and Privacy in Deep Image Retrieval Systems
Speaker: Dr. Cong Wang, Old Dominion University
April 2, 2021
CYSE Tenure-Track Faculty Candidate Seminar: Malware in the Electrical Power Grid: Attacks and Defenses
Speaker: Dr. Julian Rrushi, Oakland University, Michigan
April 1, 2021
CYSE Tenure-Track Faculty Candidate Seminar #4: Measurement Integrity in Network Tomography and Resource Allocation: Attacks and Defenses
Speaker: Shangqing Zhao, University of South Florida
March 31, 2021
CYSE Tenure-Track Faculty Candidate Seminar #3: Artificial Intelligence-Driven 5G and Beyond Radio Access Networks (RANs)
Speaker: Vijay Shah, Virginia Tech
March 30, 2021
Towards Trustworthy Decision-Making and AI: Explainability and Safety
Speaker: Bo Liu, Auburn University
March 29, 2021
CYSE Tenure-Track Faculty Candidate Seminar #2: Toward Safe and Secure Vehicular Networked Systems
Speaker: Bin Hu, Old Dominion University
March 26, 2021
CYSE Tenure-Track Faculty Candidate Seminar #1
Speaker: Linghan Zhang, Florida State University
March 25, 2021
Toward a Securer, Smarter, and Healthier World!
Speaker: Rajesh Kumar, Syracuse University
March 23, 2021
Sensitive Data Analytics with Local Differential Privacy
Speaker: Tianhao Wang, Purdue University
March 5, 2021
Machine Learning, Security, and Privacy: Challenges and Opportunities
Speaker: Binghui Wang, Duke University
March 4, 2021
Wireless AI for the Internet of Things
Speaker: Chenshu Wu, University of Maryland, College Park
March 2, 2021
Detecting and Visualizing Internet Failures: From Measurements to Streaming Analytics
Speaker: Alberto Dainotti, University of California San Diego
February 15, 2021
Mining and Learning from Graph Processes
Speaker: Arlei Silva, University of California, Santa Barbara
February 11, 2021
Opportunities and Barriers to Facilitating Evidence-Based Discussion about Civic Issues
Speaker: Brian McInnis, UC San Diego
February 5, 2021
Building Trustworthy Systems for Fighting Modern Threats
Speaker: Peng Gao, Postdoctoral Researcher in Computer Science at UC Berkeley
February 3, 2021
Side-Channel Threats on Modern Platforms
Speaker: Xiaokuan Zhang, Ohio State University
January 25, 2021
Decentralized cryptography eliminates identity and transaction fraud for everyone
Speaker: Manu Fontaine, CEO, Hushmesh Inc.
January 22, 2021
Demystifying Leakage in Encrypted Systems
Speaker: Evgenios Kornaropoulos, Postdoctoral Researcher, University of California, Berkeley
February 28, 2020
Policy Compliance in Online Services
Speaker: Aastha Mehta, Max Planck Institute for Software Systems (MPI-SWS)
February 6, 2020
(Em)powering Users and Their Devices
Speaker: Matthew Lentz, University of Maryland
November 1, 2019
Data Privacy and Statistical Inference
Speaker: Adam Smith, Boston University
October 30, 2019
Why Don't People ... Use Security, Protect Their Data, and Adopt the Available Solutions?
Speaker: Jean Camp, Indiana University
May 23, 2019
Machine Learning through Graph Algorithms, Systems and Cybersecurity Applications
Speaker: Howie Huang, George Washington University
April 29, 2019
Cyber Resilience in Japan and US-Japan Cybersecurity Relationships
Speaker: Kenzo FUJISUE, Ph.D, Member of Japanese House of Councillors (Upper House)
April 22, 2019
Cybersecurity Dynamics: Framework, Some Results, and Future Research Directions
Speaker: Shouhuai Xu, University of Texas at San Antonio
April 17, 2019
Is my GPU Secure? Covert and Side Channel Attacks on GPUs
Speaker: Dr. Nael Abu-Ghazaleh, University of California, Riverside
April 12, 2019
FingerPIN: A Novel Authentication Scheme Combining Fingerprints and Numeric PINs
Speaker: Tanmoy Chowdhury, George Mason University
April 5, 2019
Deep Learning in the Biomedical Sciences
Speaker: Pierre Baldi, University of California Irvine
April 3, 2019
From Theory to Practice: From Zero-Knowledge via Secure Computation to a Next-Generation Signature Scheme
Speaker: Jonathan Katz, University of Maryland
March 22, 2019
Computational Social Science with Latents
Speaker: Prof. Il-Chul Moon, Korea Advanced Institute of Science and Technology
March 8, 2019
Robust Phishing URL Detection via Generative Models and Graphical Inference
Speaker: Prof. Noseong Park, George Mason University
March 1, 2019
Adversarial learning on deep graph generative models and applications
Speaker: Liang Zhao, George Mason University
February 22, 2019
Mission Dependency Analysis with Physical Network Relationships*
Speaker: Dr. Les Servi, The MITRE Corporation
February 15, 2019
Probabilistic Reasoning Meets Heuristic Search
Speaker: Rina Dechter, University of California, Irvine
February 8, 2019
Network Analysis for Time Series Data
Speaker: Brandon Park, George Mason University
February 7, 2019
Assuring the Root of Trust for Internet-of-Things (IoTs)
Speaker: Qiaoyan Yu, University of New Hampshire
January 23, 2019
Machine Learning for Time Series via Optimally Compressed Bayesian Methods
Speaker: Dr. Alec Koppel, Army Research Laboratory
November 19, 2018
Information Based Sensor Management for ISR
Speaker: Ken Hintz, George Mason University
November 16, 2018
A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network
Speaker: Dr. Nahid Farhady Ghalaty, Accenture Technology Labs
November 9, 2018
Explainable AI
Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University
November 8, 2018
Falling Out of Love with Science
Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering
November 5, 2018
Building Cyber Resilience in the "Age of Accelerations"
Speaker: Linton Wells II, George Mason University
October 24, 2018
Digital Artifact Persistence, Extraction, Analysis, and Manipulation
Speaker: Jim Jones, George Mason University
October 22, 2018
GAN based Privacy Attacks on Decentralized Deep Learning
Speaker: Briland Hitaj, Sapienza University, Rome, Italy
October 19, 2018
Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses
Speaker: Avesta Sasan, George Mason University
October 18, 2018
Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation
Speaker: Wilbur Shi, Princeton University
October 12, 2018
The Impact of AI and IT Synergies on Healthcare and Biomedicine
Speaker: Dr. Nikolaos Bourbakis, Wright State University
October 11, 2018
Self Monitoring Goal Driven Autonomous Agents
Speaker: Dr. Dustin Dannenhauer, Naval Research Lab
October 5, 2018
The Internet of Acoustic Things (IoAT)
Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign
September 21, 2018
Privacy, Stability and Generalization
Speaker: Adam Smith, Boston University
July 9, 2018
Limitations of Data-driven Frequency-based Approaches for Social Computing
Speaker: Prof. Valerie Shalin, Wright State University
June 21, 2018
Data Series Management: Fulfilling the Need for Big Sequence Analytics
Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University
June 8, 2018
The Importance of Protecting Critical Transportation Infrastructure
Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates
April 23, 2018
Studying and Exploiting the "naturalness" of code
Speaker: Prem Devanbu, Computer Science Department University of California at Davis
April 12, 2018
Mining in Big Networks with Incomplete Information
Speaker: Xiang Li, University of Florida
April 4, 2018
Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense
Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte
April 3, 2018
Towards Autonomous Cyber Defense for Effective Attack Mitigating
Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte
March 29, 2018
Supporting Smart Exploratory Data Analysis
Speaker: Professor Xiaoyang Sean Wang
March 27, 2018
Lateral Smart Network Security
Speaker: Dr. Edoardo Serra, Boise State University
March 26, 2018
Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms
Speaker: Dr. Thanh H. Nguyen, University of Michigan
March 22, 2018
Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity
Speaker: Dr. Noseong Park, University of North Carolina, Charlotte
February 23, 2018
Privacy, security, and ethical challenges in the era of ubiquitous data collection
Speaker: Dr. Jessica Vitak, University of Maryland, College Park
April 7, 2011
A Framework for Scalable Analysis of Attack Scenarios
Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park
January 12, 2018
Collaborative Robotics
Speaker: Dr. Hao Zhang, Colorado School of Mines
June 30, 2017
DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control
Speaker: Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India
April 08, 2016
Pipelined Symbolic Taint Analysis on Multi-core Architectures
Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University
April 06, 2016
Attack-Resilient Systems and Networks
Speaker: Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley
April 05, 2016: How to secure your outsourced data and computations without harming utility
Speaker: Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.
April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors
Speaker: Dr. Kun Sun, Assistant Professor at College of William and Mary
March 30, 2016: New Techniques for Secure Computation
Speaker: Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University
April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications
Speaker: Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University
April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach
Speaker: Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park
March 23, 2015: Practical Methods for Computing on Encrypted Data
Speaker: Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences
March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups
Speaker: Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy
March 19, 2015: Computing on Unbounded Private Data
Speaker: Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign
March 05, 2015: Distributed Data Usage Control
Speaker: Prof. Alexander Pretschner, Technische Universität München