Seminar Series
Weaving Intelligence into Network Operations
Shinan Liu Computer Science Department University of Chicago WWH 335 11-12 March 10 2025 Modern computer networks generate extensive amounts of data that can benefit network research, management, and security. This data is fast-evolving, increasingly encrypted, and highly siloed, which makes it difficult to analyze using traditional methods based on predefined rules and signatures. Machine […]
Privacy is not an Afterthought: Towards a Holistic Privacy-Driven Software Development
Feb 28 11-12 WWH 335 Sepideh Ghanavati , Department of Computer Science, University of Maine The rapid rise of generative AI and mobile/IoT applications has made it crucial to ensure AI models and software applications adhere to ethical guidelines and protect privacy. Despite recent advances in privacy and software engineering research, developers still face significant challenges […]
Understanding End-User Security, Privacy and Trust in Sociotechnical Systems through a Human-Centered Approach
Feb 24, 2025 11-12, WWH 335 Arjun Arunasalam Department of Computer SciencePurdue University Sociotechnical systems are broadly defined as systems that blend technological aspects with human elements including human behaviors and mental models. These structures are increasingly integrating complex components such as extended reality and generative AI, to enable applications across interfaces such as the […]
Semantic-assisted Anomaly Detection for Cyber-Physical Systems
Oct 28 2024 12:00-1:00pm. WWH 335 Dr. Chenglong Fu Software and Information Systems Abstract: Modern critical industrial infrastructures increasingly rely on Cyber-Physical Systems (CPS), which enable advanced features like remote and automated control. However, the integration of CPS introduces significant risks, as these systems are potential targets for cyber-attacks that could result in catastrophic consequences. […]
The Multiple Desiderata Challenge in Trustworthy Machine Learning
Professor Depeng Xu, UNC Charlotte Oct 21, 2024. 12-1pm. WWH 335 Artificial Intelligence (AI) and Machine Learning (ML) have developed rapidly and been adopted in a variety of applications. Despite the popularity and efficiency of these models, society is concerned about the trustworthiness of machine learning models. (1) The intensive training process on large-scale data raises […]
Trustworthy Anomaly Detection
Professor Depeng Xu, UNC Charlotte September 30, 2024. 12-1pm. WWH 335 Abstract:Anomaly detection has a wide range of real-world applications, such as bank fraud detection and cyber intrusion detection. In the past decade, a variety of anomaly detection models have been developed, which lead to big progress towards accurately detecting various anomalies. Despite the successes, […]
Covariate Software Vulnerability Discovery Model to Support Cybersecurity Test & Evaluation
10:30-11:30 April 25 2024 WWH 335. Vulnerability discovery models (VDM) have been proposed as an application of software reliability growth models (SRGM) to software security-related defects. VDM model the number of vulnerabilities discovered as a function of testing time, enabling quantitative measures of security. Despite their obvious utility, past VDM have been limited to parametric […]
Security and Fairness in Biometric Recognition: Challenges and Opportunities
2-3pm. April 22, 2024 WWH 236. Performance of biometric recognition technology is a key aspect to mitigate security risks while not sacrificing the user’s experience. While algorithm testing has demonstrated the great strides in biometric performance, certification of biometric performance based on full system evaluation including the user interface and presentation attack detection is also needed. Furthermore, […]
Toward Trustworthy Smart Environments: Detecting Hidden Webcams using Cyber-Physical Correlations
11:00 April 22 2024, WWH 335 Security and privacy are critical for building reliable and trustworthy smart environments. This talk discusses my recent work in building secure smart spaces with a focus on privacy. Specifically, small, low-cost, wireless cameras are becoming increasingly commonplace making surreptitious observation of people more difficult to detect. Previous work in detecting […]
Software-defined infrastructures
April 12 11:30-12:30 WWH 335. Software-defined infrastructures (Cloud, Edge, and IoT) have opened new opportunities to enhance flexibility and reduce computer network management burdens. This talk covers some of my research group’s investigations on the design, prototyping, and performance analysis of software-defined service management architectures built to achieve programmability of edge computing mechanisms for several […]