CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

May 23, 2019

Machine Learning through Graph Algorithms, Systems and Cybersecurity Applications

Speaker: Howie Huang, George Washington University

April 29, 2019

Cyber Resilience in Japan and US-Japan Cybersecurity Relationships

Speaker: Kenzo FUJISUE, Ph.D, Member of Japanese House of Councillors (Upper House)

April 22, 2019

Cybersecurity Dynamics: Framework, Some Results, and Future Research Directions

Speaker: Shouhuai Xu, University of Texas at San Antonio

April 17, 2019

Is my GPU Secure? Covert and Side Channel Attacks on GPUs

Speaker: Dr. Nael Abu-Ghazaleh, University of California, Riverside

April 12, 2019

FingerPIN: A Novel Authentication Scheme Combining Fingerprints and Numeric PINs

Speaker: Tanmoy Chowdhury, George Mason University

April 5, 2019

Deep Learning in the Biomedical Sciences

Speaker: Pierre Baldi, University of California Irvine

April 3, 2019

From Theory to Practice: From Zero-Knowledge via Secure Computation to a Next-Generation Signature Scheme

Speaker: Jonathan Katz, University of Maryland

March 22, 2019

Computational Social Science with Latents

Speaker: Prof. Il-Chul Moon, Korea Advanced Institute of Science and Technology

March 8, 2019

Robust Phishing URL Detection via Generative Models and Graphical Inference

Speaker: Prof. Noseong Park, George Mason University

March 1, 2019

Adversarial learning on deep graph generative models and applications

Speaker: Liang Zhao, George Mason University

February 22, 2019

Mission Dependency Analysis with Physical Network Relationships*

Speaker: Dr. Les Servi, The MITRE Corporation

February 15, 2019

Probabilistic Reasoning Meets Heuristic Search

Speaker: Rina Dechter, University of California, Irvine

February 8, 2019

Network Analysis for Time Series Data

Speaker: Brandon Park, George Mason University

February 7, 2019

Assuring the Root of Trust for Internet-of-Things (IoTs)

Speaker: Qiaoyan Yu, University of New Hampshire

January 23, 2019

Machine Learning for Time Series via Optimally Compressed Bayesian Methods

Speaker: Dr. Alec Koppel, Army Research Laboratory

November 19, 2018

Information Based Sensor Management for ISR

Speaker: Ken Hintz, George Mason University

November 16, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network

Speaker: Dr. Nahid Farhady Ghalaty, Accenture Technology Labs

November 9, 2018

Explainable AI

Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University

November 8, 2018

Falling Out of Love with Science

Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering

November 5, 2018

Building Cyber Resilience in the "Age of Accelerations"

Speaker: Linton Wells II, George Mason University

October 24, 2018

Digital Artifact Persistence, Extraction, Analysis, and Manipulation

Speaker: Jim Jones, George Mason University

October 22, 2018

GAN based Privacy Attacks on Decentralized Deep Learning

Speaker: Briland Hitaj, Sapienza University, Rome, Italy

October 19, 2018

Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses

Speaker: Avesta Sasan, George Mason University

October 18, 2018

Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation

Speaker: Wilbur Shi, Princeton University

October 12, 2018

The Impact of AI and IT Synergies on Healthcare and Biomedicine

Speaker: Dr. Nikolaos Bourbakis, Wright State University

October 11, 2018

Self Monitoring Goal Driven Autonomous Agents

Speaker: Dr. Dustin Dannenhauer, Naval Research Lab

October 5, 2018

The Internet of Acoustic Things (IoAT)

Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign

September 21, 2018

Privacy, Stability and Generalization

Speaker: Adam Smith, Boston University

July 9, 2018

Limitations of Data-driven Frequency-based Approaches for Social Computing

Speaker: Prof. Valerie Shalin, Wright State University

June 21, 2018

Data Series Management: Fulfilling the Need for Big Sequence Analytics

Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University

June 8, 2018

The Importance of Protecting Critical Transportation Infrastructure

Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates

April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis

April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida

April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte

March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang

March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University

March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan

March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte

February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park

April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park

January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines

June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India

April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University

April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley

April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.

April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary

March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University

April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University

April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park

March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences

March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy

March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign

March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München