Events

Categories:Events, Seminar Series

Dylan Christensen Nov 5th 2025 11:30 WWH 335 Abstract: The security and reliability of our critical infrastructure is increasingly dependent on the integrity of millions of interconnected Cyber-Physical Systems (CPS) and IoT devices. UNCC’s Center for Energy Security and Reliability (CESAR) addresses this challenge by demonstrating vulnerability discovery through emulating threat actor approaches on components […]

Categories:Events, Seminar Series

Oct 29 11:30-12:30. WWH 335 Jian Xiang Department of Software and Information Systems Abstract: Cyber-physical systems, such as autonomous vehicles, must defend against attacks that target sensor hardware. Analyzing system design can help system engineers understand how a compromised sensor could impact the system’s behavior; however, developing security guarantees, especially formal guarantees, for cyber-physical systems is […]

Categories:Events, Seminar Series

Oct 8th 11:30-12:30 WWH 335 Cori Faklaris Department of Software and Information Systems UNC Charlotte Abstract: As mobile phone usage continues to rise, so do scams targeting these devices. SMiShing, or SMS phishing, involves fraudsters sending phishing links via text messages. Despite its growing prevalence, little is known about who is most vulnerable to these […]

Categories:Events, Seminar Series

Bill Chu Department of Software and Information Systems UNC Charlotte Wed Sept 24, 11:30-12:30 WWH 335 ABSTRACT We attempt to automate parts of threat hunting, taking cyber threat intelligence messages as input and generating queries to search logs for attack evidence using a popular query language used in Security Operations Centers (SOC). Our prototype uses […]

Categories:Seminar Series

L Jean CampProfessor of Informatics and Computer ScienceLuddy School of Informatics, Computing, and EngineeringIndiana University. April 17 11am. WWH 335 The Software Bill of Materials (SBOM) is a list of components that can be used to identify any documented vulnerability associated with the enumerated dependencies. Analogies have been made to safety, as with materials safety […]

Categories:Events, Seminar Series

Yanchao Zhang Professor in the School of Electrical, Computer and Energy Engineering at Arizona State University (ASU). April 10th 10-11 WWH335 As wireless networks evolve toward FutureG—encompassing 6G and beyond—theypromise transformative capabilities through ultra-high-speed connectivity, ultra-densedeployments, AI-native architectures, and the convergence of sensing, communication,and computation. These advancements are expected to enable a wide range ofmission-critical applications across […]

Categories:Events, Seminar Series

Dr. Satyajayant Misra, Department of Computer Science, New Mexico State University. April 7th 2-3pm. WWH 335 Pervasive Edge Computing (PEC), a recent addition to the edge computing paradigm, leverages the computing resources of end-user devices to execute computation tasks in close proximity to end users. One of the primary challenges in the PEC environment is […]

Categories:Events, Seminar Series

Ece Gumusel, Luddy School of Informatics, Computing, and Engineering at Indiana University Bloomington. March 31 11-12 WWH 335 Conversational AI presents significant privacy challenges due to the complex interplay between user behavior, trust, and data protection. Design choices in user interfaces and language models can unknowingly threaten user privacy and create risks to both privacy […]

Categories:Events, Seminar Series

Pietro Liguori  Department of Electrical Engineering and Information Technology  University of Naples Federico II, Italy.  March 27 11-12 WWH 335 AI-generated code promises faster software development and innovative solutions. Yet, behind these advantages lies a pressing security challenge. In this talk, we reveal how AI code generators can be weaponized through subtle data poisoning attacks, […]

Categories:Events, Seminar Series

Zitao ChenElectrical and Computer Engineering (ECE)University of British Columbia (UBC) March 19 202511-12 WWH 335 Machine Learning (ML) has seen increasing use in many high-stakes scenarios across our society. Despite their impressive performance in typical operations, ML models are subject to catastrophic failures, such as information leakage or safety violations. This talk will examine three […]

Categories:Events, Seminar Series

Shinan Liu  Computer Science Department  University of Chicago WWH 335 11-12 March 10 2025 Modern computer networks generate extensive amounts of data that can benefit network research, management, and security. This data is fast-evolving, increasingly encrypted, and highly siloed, which makes it difficult to analyze using traditional methods based on predefined rules and signatures. Machine […]

Categories:Events, Seminar Series

Feb 28 11-12 WWH 335 Sepideh Ghanavati , Department of Computer Science, University of Maine The rapid rise of generative AI and mobile/IoT applications has made it crucial to ensure AI models and software applications adhere to ethical guidelines and protect privacy. Despite recent advances in privacy and software engineering research, developers still face significant challenges […]

Categories:Events, Seminar Series

Feb 24, 2025 11-12, WWH 335 Arjun Arunasalam Department of Computer SciencePurdue University Sociotechnical systems are broadly defined as systems that blend technological aspects with human elements including human behaviors and mental models. These structures are increasingly integrating complex components such as extended reality and generative AI, to enable applications across interfaces such as the […]

Categories:Events, Seminar Series

Oct 28 2024 12:00-1:00pm. WWH 335 Dr. Chenglong Fu Software and Information Systems Abstract: Modern critical industrial infrastructures increasingly rely on Cyber-Physical Systems (CPS), which enable advanced features like remote and automated control. However, the integration of CPS introduces significant risks, as these systems are potential targets for cyber-attacks that could result in catastrophic consequences. […]

Categories:Events, Seminar Series

Professor Depeng Xu, UNC Charlotte Oct 21, 2024. 12-1pm. WWH 335 Artificial Intelligence (AI) and Machine Learning (ML) have developed rapidly and been adopted in a variety of applications. Despite the popularity and efficiency of these models, society is concerned about the trustworthiness of machine learning models. (1) The intensive training process on large-scale data raises […]

Categories:Seminar Series

Professor Depeng Xu, UNC Charlotte September 30, 2024. 12-1pm. WWH 335 Abstract:Anomaly detection has a wide range of real-world applications, such as bank fraud detection and cyber intrusion detection. In the past decade, a variety of anomaly detection models have been developed, which lead to big progress towards accurately detecting various anomalies. Despite the successes, […]

Categories:Seminar Series

10:30-11:30 April 25 2024 WWH 335. Vulnerability discovery models (VDM) have been proposed as an application of software reliability growth models (SRGM) to software security-related defects. VDM model the number of vulnerabilities discovered as a function of testing time, enabling quantitative measures of security. Despite their obvious utility, past VDM have been limited to parametric […]

Categories:Seminar Series

2-3pm. April 22, 2024 WWH 236. Performance of biometric recognition technology is a key aspect to mitigate security risks while not sacrificing the user’s experience. While algorithm testing has demonstrated the great strides in biometric performance, certification of biometric performance based on full system evaluation including the user interface and presentation attack detection is also needed. Furthermore, […]