CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

April 6, 2021

CYSE Faculty Candidate Seminar: AI for Cyber-Physical Systems: Cyber Security and Efficiency

Speaker: Dr. Yanhai Xiong, Dartmouth College

April 5, 2021

CYSE Faculty Candidate Seminar: Explore Security and Privacy in Deep Image Retrieval Systems

Speaker: Dr. Cong Wang, Old Dominion University

April 2, 2021

CYSE Tenure-Track Faculty Candidate Seminar: Malware in the Electrical Power Grid: Attacks and Defenses

Speaker: Dr. Julian Rrushi, Oakland University, Michigan

April 1, 2021

CYSE Tenure-Track Faculty Candidate Seminar #4: Measurement Integrity in Network Tomography and Resource Allocation: Attacks and Defenses

Speaker: Shangqing Zhao, University of South Florida

March 31, 2021

CYSE Tenure-Track Faculty Candidate Seminar #3: Artificial Intelligence-Driven 5G and Beyond Radio Access Networks (RANs)

Speaker: Vijay Shah, Virginia Tech

March 30, 2021

Towards Trustworthy Decision-Making and AI: Explainability and Safety

Speaker: Bo Liu, Auburn University

March 29, 2021

CYSE Tenure-Track Faculty Candidate Seminar #2: Toward Safe and Secure Vehicular Networked Systems

Speaker: Bin Hu, Old Dominion University

March 26, 2021

CYSE Tenure-Track Faculty Candidate Seminar #1

Speaker: Linghan Zhang, Florida State University

March 25, 2021

Toward a Securer, Smarter, and Healthier World!

Speaker: Rajesh Kumar, Syracuse University

March 23, 2021

Sensitive Data Analytics with Local Differential Privacy

Speaker: Tianhao Wang, Purdue University

March 5, 2021

Machine Learning, Security, and Privacy: Challenges and Opportunities

Speaker: Binghui Wang, Duke University

March 4, 2021

Wireless AI for the Internet of Things

Speaker: Chenshu Wu, University of Maryland, College Park

March 2, 2021

Detecting and Visualizing Internet Failures: From Measurements to Streaming Analytics

Speaker: Alberto Dainotti, University of California San Diego

February 15, 2021

Mining and Learning from Graph Processes

Speaker: Arlei Silva, University of California, Santa Barbara

February 11, 2021

Opportunities and Barriers to Facilitating Evidence-Based Discussion about Civic Issues

Speaker: Brian McInnis, UC San Diego

February 5, 2021

Building Trustworthy Systems for Fighting Modern Threats

Speaker: Peng Gao, Postdoctoral Researcher in Computer Science at UC Berkeley

February 3, 2021

Side-Channel Threats on Modern Platforms

Speaker: Xiaokuan Zhang, Ohio State University

January 25, 2021

Decentralized cryptography eliminates identity and transaction fraud for everyone

Speaker: Manu Fontaine, CEO, Hushmesh Inc.

January 22, 2021

Demystifying Leakage in Encrypted Systems

Speaker: Evgenios Kornaropoulos, Postdoctoral Researcher, University of California, Berkeley

February 28, 2020

Policy Compliance in Online Services

Speaker: Aastha Mehta, Max Planck Institute for Software Systems (MPI-SWS)

February 6, 2020

(Em)powering Users and Their Devices

Speaker: Matthew Lentz, University of Maryland

November 1, 2019

Data Privacy and Statistical Inference

Speaker: Adam Smith, Boston University

October 30, 2019

Why Don't People ... Use Security, Protect Their Data, and Adopt the Available Solutions?

Speaker: Jean Camp, Indiana University

May 23, 2019

Machine Learning through Graph Algorithms, Systems and Cybersecurity Applications

Speaker: Howie Huang, George Washington University

April 29, 2019

Cyber Resilience in Japan and US-Japan Cybersecurity Relationships

Speaker: Kenzo FUJISUE, Ph.D, Member of Japanese House of Councillors (Upper House)

April 22, 2019

Cybersecurity Dynamics: Framework, Some Results, and Future Research Directions

Speaker: Shouhuai Xu, University of Texas at San Antonio

April 17, 2019

Is my GPU Secure? Covert and Side Channel Attacks on GPUs

Speaker: Dr. Nael Abu-Ghazaleh, University of California, Riverside

April 12, 2019

FingerPIN: A Novel Authentication Scheme Combining Fingerprints and Numeric PINs

Speaker: Tanmoy Chowdhury, George Mason University

April 5, 2019

Deep Learning in the Biomedical Sciences

Speaker: Pierre Baldi, University of California Irvine

April 3, 2019

From Theory to Practice: From Zero-Knowledge via Secure Computation to a Next-Generation Signature Scheme

Speaker: Jonathan Katz, University of Maryland

March 22, 2019

Computational Social Science with Latents

Speaker: Prof. Il-Chul Moon, Korea Advanced Institute of Science and Technology

March 8, 2019

Robust Phishing URL Detection via Generative Models and Graphical Inference

Speaker: Prof. Noseong Park, George Mason University

March 1, 2019

Adversarial learning on deep graph generative models and applications

Speaker: Liang Zhao, George Mason University

February 22, 2019

Mission Dependency Analysis with Physical Network Relationships*

Speaker: Dr. Les Servi, The MITRE Corporation

February 15, 2019

Probabilistic Reasoning Meets Heuristic Search

Speaker: Rina Dechter, University of California, Irvine

February 8, 2019

Network Analysis for Time Series Data

Speaker: Brandon Park, George Mason University

February 7, 2019

Assuring the Root of Trust for Internet-of-Things (IoTs)

Speaker: Qiaoyan Yu, University of New Hampshire

January 23, 2019

Machine Learning for Time Series via Optimally Compressed Bayesian Methods

Speaker: Dr. Alec Koppel, Army Research Laboratory

November 19, 2018

Information Based Sensor Management for ISR

Speaker: Ken Hintz, George Mason University

November 16, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network

Speaker: Dr. Nahid Farhady Ghalaty, Accenture Technology Labs

November 9, 2018

Explainable AI

Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University

November 8, 2018

Falling Out of Love with Science

Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering

November 5, 2018

Building Cyber Resilience in the "Age of Accelerations"

Speaker: Linton Wells II, George Mason University

October 24, 2018

Digital Artifact Persistence, Extraction, Analysis, and Manipulation

Speaker: Jim Jones, George Mason University

October 22, 2018

GAN based Privacy Attacks on Decentralized Deep Learning

Speaker: Briland Hitaj, Sapienza University, Rome, Italy

October 19, 2018

Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses

Speaker: Avesta Sasan, George Mason University

October 18, 2018

Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation

Speaker: Wilbur Shi, Princeton University

October 12, 2018

The Impact of AI and IT Synergies on Healthcare and Biomedicine

Speaker: Dr. Nikolaos Bourbakis, Wright State University

October 11, 2018

Self Monitoring Goal Driven Autonomous Agents

Speaker: Dr. Dustin Dannenhauer, Naval Research Lab

October 5, 2018

The Internet of Acoustic Things (IoAT)

Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign

September 21, 2018

Privacy, Stability and Generalization

Speaker: Adam Smith, Boston University

July 9, 2018

Limitations of Data-driven Frequency-based Approaches for Social Computing

Speaker: Prof. Valerie Shalin, Wright State University

June 21, 2018

Data Series Management: Fulfilling the Need for Big Sequence Analytics

Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University

June 8, 2018

The Importance of Protecting Critical Transportation Infrastructure

Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates

April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis

April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida

April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang

March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University

March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan

March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte

February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park

April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park

January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines

June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India

April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University

April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley

April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.

April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary

March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University

April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University

April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park

March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences

March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy

March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign

March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München