CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

Past Seminars

May 2, 2024

Why do small language models underperform?

Speaker: Benoît Sagot, Director of Research at INRIA


April 19, 2024

Advances in Adversarial Risk Analysis

Speaker: Fabrizio Ruggeri, Consiglio Nazionale delle Ricerche, Italy


March 25, 2024

“Scrambling for Privacy” - Inside the Encryption Wars 1986-2000 and the battle over privacy, security, and the future of a secure Internet

Speaker: James Bidzos, CEO/Founder of Verisign


March 20, 2024

Human versus Machine Perception of Patterns - A visual Turing Test: “Are you a human or a robot?”

Speaker: Yanxi Liu, Penn State University


March 13, 2024

A Preliminary Study on Using Large Language Models in Software Pentesting

Speaker: Dr. Simon Ou, University of South Florida


February 16, 2024

Reinforcement Learning for Safety-Critical Systems

Speaker: Enrique Mallada, Johns Hopkins University


February 9, 2024

Unsupervised Learning of Depth Perception and Beyond

Speaker: Alex Wong, Yale University


November 30, 2023

High-Level Approaches to Hardware and Embedded Security

Speaker: Ramesh Karri, New York University


November 17, 2023

The Biodesign of Computing

Speaker: Stephanie Forrest, Arizona State University,


October 23, 2023

The Science of Generative AI: Focus on Reasoning

Speaker: Dan Roth, University of Pennsylvania


September 22, 2023

PAC Privacy: Automatic Privacy Measurement and Control of Data Processing

Speaker: Srini Devadas, Massachusetts Institute of Technology


September 6, 2023

Biometrics in a Deep Learning World

Speaker: Arun Ross, Michigan State University


September 1, 2023

Data Science at the Singularity

Speaker: David Donoho, Stanford University


May 5, 2023

Offensive Language Identification in Social Media

Speaker: Dr. Marcos Zampieri, Assistant Professor, George Mason University


April 19, 2023

Differential Privacy without Centralization

Speaker: Albert Cheu, Georgetown University


April 17, 2023

Cache-based Attacks against ARM TrustZone

Speaker: Kun Sun, George Mason University


April 12, 2023

AI-Enhanced Software Vulnerability and Security Patch Analysis

Speaker: Xinda Wang, George Mason University


March 31, 2023

Large-Scale Collaborative Data Management in Untrusted Environments

Speaker: Mohammad Amiri, University of Pennsylvania


March 29, 2023

Secure by Design, What does it mean? What does it take?

Speaker: Mehdi Mirakhorli, Rochester Institute of Technology


March 28, 2023

Cybersecurity Research in the Era of Quantum, IoT, AI, and 6G

Speaker: Zhengdao Wang, Iowa State University


March 24, 2023

Internet-Scale Discovery and Security Analysis of EV Charging Management Systems

Speaker: Dr. Sadegh Torabi, Assistant Professor, George Mason University


March 22, 2023

Leveraging Multimodal Sensing for Enhancing the Security and Privacy of Mobile Systems

Speaker: Habiba Farukh, Purdue University


February 3, 2023

AI-Enhanced Software Vulnerability and Security Patch Analysis

Speaker: Ms. Xinda Wang


January 26, 2023

Towards a Hardware/Software Co-Design Approach for CPS and IoT Security

Speaker: Anomadarshi Barua, University of California, Irvine


January 20, 2023

Cyber security over AI-empowered Internet-of-Things

Speaker: Chong Yu, University of Nebraska-Lincoln


October 28, 2022

Non-invasive Wireless Sensing with Machine Learning

Speaker: Xiaonan Guo, George Mason University


October 14, 2022

CSIS Seminar 10/14/2022

Speaker: Dr. Lei Yang, George Mason University


March 11, 2022

Specializing Computing Systems for Graph Algorithms

Speaker: Xuhao Chen, Massachusetts Institute of Technology


March 8, 2022

Towards Trustworthy Knowledge Sharing of Language Models

Speaker: Chenguang Wang, University of California, Berkeley


March 7, 2022

Securing Operating System Kernels with Fewer Shots

Speaker: Yueqi Chen, Penn State University


March 3, 2022

Strengthening and Enriching Machine Learning for Cybersecurity

Speaker: Wenbo Guo, Penn State


February 28, 2022

Memristive Nanoelectronics in Neuromorphic Computing and Considerations for Hardware Security

Speaker: Garrett S. Rose, Ph.D., University of Tennessee, Knoxville


February 24, 2022

Automating the Protection of Internet Freedoms

Speaker: Kevin Bock, Ph.D. Candidate, University of Maryland


February 23, 2022

Toward Resilience of Civil Infrastructures: Machine Learning-based Probabilistic Assessment

Speaker: Farahnaz Soleimani, Ph.D., Georgia Insititute of Technology


February 15, 2022

Artificial Intelligence in Biometrics: Past, Present, and Future Challenges

Speaker: Dr. Damon L. Woodard, University of Florida


February 14, 2022

Squashing Bugs and Empowering Programmers with User-Centered Programming Language Design

Speaker: Michael Coblenz, University of Maryland, College Park


February 11, 2022

Watermarking for Protecting Deep Image Classifiers against Adversarial Attacks: A Framework and Algorithms

Speaker: Dr. En-hui Yang, University of Waterloo, Waterloo, Ontario, Canada


January 25, 2022

An Eigenmodel for Dynamic Multilayer Networks

Speaker: Joshua Loyal, University of Illinois at Urbana-Champaign


November 12, 2021

Algorithmic Fairness: Collisions and Collaborations Between Technology and Society

Speaker: Suresh Venkatasubramanian, PhD


October 21, 2021

Cache-based Attacks Against ARM TrustZone

Speaker: Dr. Kun Sun, George Mason University


July 26, 2021

Implementation and Assessment of Strong Logic Encryption Techniques

Speaker: Shervin Roshanisefat, Volgenau School of Engineering, George Mason University


July 22, 2021

Towards Efficient and Scalable SDN-based Data Center Monitoring and Management

Speaker: Zili Zha, Volgenau School of Engineering, George Mason University


June 4, 2021

Machine Learning for Wireless Cyber-Physical Systems Security

Speaker: Amir Alipour-Fanid, The Volgenau School of Engineering, George Mason University


June 1, 2021

Vulnerability Assessment of Logic Locking Techniques: Towards Next Generation Attacks on Logic Locking

Speaker: Kimia Zamiri Azar, The Volgenau School of Engineering, George Mason University


May 28, 2021

Secure Hardware Implementations of Lightweight and Post-Quantum Cryptography; Trade-offs, Applicability, and Tools

Speaker: Abubakr Abdulgadir, The Volgenau School of Engineering, George Mason University


April 6, 2021

CYSE Faculty Candidate Seminar: AI for Cyber-Physical Systems: Cyber Security and Efficiency

Speaker: Dr. Yanhai Xiong, Dartmouth College


April 5, 2021

CYSE Faculty Candidate Seminar: Explore Security and Privacy in Deep Image Retrieval Systems

Speaker: Dr. Cong Wang, Old Dominion University


April 2, 2021

CYSE Tenure-Track Faculty Candidate Seminar: Malware in the Electrical Power Grid: Attacks and Defenses

Speaker: Dr. Julian Rrushi, Oakland University, Michigan


April 1, 2021

CYSE Tenure-Track Faculty Candidate Seminar #4: Measurement Integrity in Network Tomography and Resource Allocation: Attacks and Defenses

Speaker: Shangqing Zhao, University of South Florida


March 31, 2021

CYSE Tenure-Track Faculty Candidate Seminar #3: Artificial Intelligence-Driven 5G and Beyond Radio Access Networks (RANs)

Speaker: Vijay Shah, Virginia Tech


March 30, 2021

Towards Trustworthy Decision-Making and AI: Explainability and Safety

Speaker: Bo Liu, Auburn University


March 29, 2021

CYSE Tenure-Track Faculty Candidate Seminar #2: Toward Safe and Secure Vehicular Networked Systems

Speaker: Bin Hu, Old Dominion University


March 26, 2021

CYSE Tenure-Track Faculty Candidate Seminar #1

Speaker: Linghan Zhang, Florida State University


March 25, 2021

Toward a Securer, Smarter, and Healthier World!

Speaker: Rajesh Kumar, Syracuse University


March 23, 2021

Sensitive Data Analytics with Local Differential Privacy

Speaker: Tianhao Wang, Purdue University


March 5, 2021

Machine Learning, Security, and Privacy: Challenges and Opportunities

Speaker: Binghui Wang, Duke University


March 4, 2021

Wireless AI for the Internet of Things

Speaker: Chenshu Wu, University of Maryland, College Park


March 2, 2021

Detecting and Visualizing Internet Failures: From Measurements to Streaming Analytics

Speaker: Alberto Dainotti, University of California San Diego


February 15, 2021

Mining and Learning from Graph Processes

Speaker: Arlei Silva, University of California, Santa Barbara


February 11, 2021

Opportunities and Barriers to Facilitating Evidence-Based Discussion about Civic Issues

Speaker: Brian McInnis, UC San Diego


February 5, 2021

Building Trustworthy Systems for Fighting Modern Threats

Speaker: Peng Gao, Postdoctoral Researcher in Computer Science at UC Berkeley


February 3, 2021

Side-Channel Threats on Modern Platforms

Speaker: Xiaokuan Zhang, Ohio State University


January 25, 2021

Decentralized cryptography eliminates identity and transaction fraud for everyone

Speaker: Manu Fontaine, CEO, Hushmesh Inc.


January 22, 2021

Demystifying Leakage in Encrypted Systems

Speaker: Evgenios Kornaropoulos, Postdoctoral Researcher, University of California, Berkeley


February 28, 2020

Policy Compliance in Online Services

Speaker: Aastha Mehta, Max Planck Institute for Software Systems (MPI-SWS)


February 6, 2020

(Em)powering Users and Their Devices

Speaker: Matthew Lentz, University of Maryland


November 1, 2019

Data Privacy and Statistical Inference

Speaker: Adam Smith, Boston University


October 30, 2019

Why Don't People ... Use Security, Protect Their Data, and Adopt the Available Solutions?

Speaker: Jean Camp, Indiana University


May 23, 2019

Machine Learning through Graph Algorithms, Systems and Cybersecurity Applications

Speaker: Howie Huang, George Washington University


April 29, 2019

Cyber Resilience in Japan and US-Japan Cybersecurity Relationships

Speaker: Kenzo FUJISUE, Ph.D, Member of Japanese House of Councillors (Upper House)


April 22, 2019

Cybersecurity Dynamics: Framework, Some Results, and Future Research Directions

Speaker: Shouhuai Xu, University of Texas at San Antonio


April 17, 2019

Is my GPU Secure? Covert and Side Channel Attacks on GPUs

Speaker: Dr. Nael Abu-Ghazaleh, University of California, Riverside


April 12, 2019

FingerPIN: A Novel Authentication Scheme Combining Fingerprints and Numeric PINs

Speaker: Tanmoy Chowdhury, George Mason University


April 5, 2019

Deep Learning in the Biomedical Sciences

Speaker: Pierre Baldi, University of California Irvine


April 3, 2019

From Theory to Practice: From Zero-Knowledge via Secure Computation to a Next-Generation Signature Scheme

Speaker: Jonathan Katz, University of Maryland


March 22, 2019

Computational Social Science with Latents

Speaker: Prof. Il-Chul Moon, Korea Advanced Institute of Science and Technology


March 8, 2019

Robust Phishing URL Detection via Generative Models and Graphical Inference

Speaker: Prof. Noseong Park, George Mason University


March 1, 2019

Adversarial learning on deep graph generative models and applications

Speaker: Liang Zhao, George Mason University


February 22, 2019

Mission Dependency Analysis with Physical Network Relationships*

Speaker: Dr. Les Servi, The MITRE Corporation


February 15, 2019

Probabilistic Reasoning Meets Heuristic Search

Speaker: Rina Dechter, University of California, Irvine


February 8, 2019

Network Analysis for Time Series Data

Speaker: Brandon Park, George Mason University


February 7, 2019

Assuring the Root of Trust for Internet-of-Things (IoTs)

Speaker: Qiaoyan Yu, University of New Hampshire


January 23, 2019

Machine Learning for Time Series via Optimally Compressed Bayesian Methods

Speaker: Dr. Alec Koppel, Army Research Laboratory


November 19, 2018

Information Based Sensor Management for ISR

Speaker: Ken Hintz, George Mason University


November 16, 2018

A Hierarchical Framework to Detect Targeted Attacks using Deep Neural Network

Speaker: Dr. Nahid Farhady Ghalaty, Accenture Technology Labs


November 9, 2018

Explainable AI

Speaker: Ricardo Baeza-Yates, NTENT & Northeastern University


November 8, 2018

Falling Out of Love with Science

Speaker: Milan P. Yager, American Institute for Medical & Biological Engineering


November 5, 2018

Building Cyber Resilience in the "Age of Accelerations"

Speaker: Linton Wells II, George Mason University


October 24, 2018

Digital Artifact Persistence, Extraction, Analysis, and Manipulation

Speaker: Jim Jones, George Mason University


October 22, 2018

GAN based Privacy Attacks on Decentralized Deep Learning

Speaker: Briland Hitaj, Sapienza University, Rome, Italy


October 19, 2018

Designing and Fabricating Trusted Hardware in an Untrusted Manufacturing Supply Chain, a Seminar on Hardware Level Attacks and Defenses

Speaker: Avesta Sasan, George Mason University


October 18, 2018

Distributed Optimization and Resource Allocation: Algorithms and the Mirror Relation

Speaker: Wilbur Shi, Princeton University


October 12, 2018

The Impact of AI and IT Synergies on Healthcare and Biomedicine

Speaker: Dr. Nikolaos Bourbakis, Wright State University


October 11, 2018

Self Monitoring Goal Driven Autonomous Agents

Speaker: Dr. Dustin Dannenhauer, Naval Research Lab


October 5, 2018

The Internet of Acoustic Things (IoAT)

Speaker: Romit Roy Choudhury, University of Illinois at Urbana-Champaign


September 21, 2018

Privacy, Stability and Generalization

Speaker: Adam Smith, Boston University


July 9, 2018

Limitations of Data-driven Frequency-based Approaches for Social Computing

Speaker: Prof. Valerie Shalin, Wright State University


June 21, 2018

Data Series Management: Fulfilling the Need for Big Sequence Analytics

Speaker: Themis Palpanas, Institut Universitaire de France (IUF) and Paris Descartes University


June 8, 2018

The Importance of Protecting Critical Transportation Infrastructure

Speaker: Michael Lowder, Retd. Director of Office of Intelligence, Security, & Emergency Response at U.S. DOT; Principal, MWL Global Associates


April 23, 2018

Studying and Exploiting the "naturalness" of code

Speaker: Prem Devanbu, Computer Science Department University of California at Davis


April 12, 2018

Mining in Big Networks with Incomplete Information

Speaker: Xiang Li, University of Florida


April 4, 2018

Formal- and Data-driven Analytics for High-Assurance Decision-Making in Cyber Defense

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


April 3, 2018

Towards Autonomous Cyber Defense for Effective Attack Mitigating

Speaker: Prof. Ehab Al-Shaer, University of North Carolina, Charlotte


March 29, 2018

Supporting Smart Exploratory Data Analysis

Speaker: Professor Xiaoyang Sean Wang


March 27, 2018

Lateral Smart Network Security

Speaker: Dr. Edoardo Serra, Boise State University


March 26, 2018

Addressing Real-world Societal Challenges: Advanced Game-Theoretic Models and Algorithms

Speaker: Dr. Thanh H. Nguyen, University of Michigan


March 22, 2018

Generative Model and Knowledge Graph Query Processing and their Applications to Cybersecurity

Speaker: Dr. Noseong Park, University of North Carolina, Charlotte


February 23, 2018

Privacy, security, and ethical challenges in the era of ubiquitous data collection

Speaker: Dr. Jessica Vitak, University of Maryland, College Park


April 7, 2011

A Framework for Scalable Analysis of Attack Scenarios

Speaker: Dr. Massimiliano Albanese, University of Maryland, College Park



January 12, 2018

Collaborative Robotics

Speaker:  Dr. Hao Zhang, Colorado School of Mines


June 30, 2017

DRWFM: Readers Writers Flow Model - A Complete Generative Label Model for Decentralized Information Flow Control

Speaker:  Dr. R. K. Shyamasundar, Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Bombay, India


April 08, 2016

Pipelined Symbolic Taint Analysis on Multi-core Architectures

Speaker: Jiang Ming, Ph.D. candidate, College of Information Sciences and Technology, Pennsylvania State University


April 06, 2016

Attack-Resilient Systems and Networks

Speaker:  Dr. Aron Laszka, Postdoctoral Scholar, University of California, Berkeley


April 05, 2016: How to secure your outsourced data and computations without harming utility

Speaker:  Dr. Nikos Triandopoulos, Adjunct Assistant Professor in Computer Science at Boston University.



April 01, 2016: Hardware-assisted Trusted Execution Environments on ARM Processors

Speaker:  Dr. Kun Sun, Assistant Professor at College of William and Mary



March 30, 2016: New Techniques for Secure Computation

Speaker:  Dr. Alessandra Scafuro, Postdoctoral Researcher at Boston University


April 06, 2015: Efficient Cryptographic Tools for Privacy-Preserving Applications

Speaker:  Dr. Foteini Baldimtsi, Postdoctoral Researcher at Boston University


April 02, 2015: Practice-Oriented Cryptography: A Definition-Centric Approach

Speaker:  Dr. Viet Tung Hoang, Postdoctoral Researcher at Georgetown University and University of Maryland College Park


March 23, 2015: Practical Methods for Computing on Encrypted Data

Speaker:  Dr. Samuel Dov Gordon, Research Scientist at Applied Communication Sciences


March 20, 2015: The Success of Question Answering Communities: How Diversity Influences Ad Hoc Groups

Speaker:  Mr. Emanuel Alsina, PhD Student at University of Modena and Reggio Emilia in Italy


March 19, 2015: Computing on Unbounded Private Data

Speaker:  Dr. Omkant Pandey, Postdoctoral Researcher at University of Illinois at Urbana Champaign


March 05, 2015: Distributed Data Usage Control

Speaker:  Prof. Alexander Pretschner, Technische Universität München