Avi Wigderson
Institute for Advanced Study, Princeton
"Randomness"
[more info] [Zoom Link]
Amr El Abbadi
University of California at Santa Barbara
"Taming Big Data: Stream Summarization and its Many Applications"
[more info] [Zoom Link]
Hao Su
New York University
"Exoskeletons, Surgical Robots, and Humanoids: Building Physical Intelligence for Human Augmentation"
[more info] [Zoom Link]
Noga Alon
Princeton University
"Vantage Points and Sign Patterns"
[more info] [Zoom Link]
Mihalis Yannakakis
Columbia University
"Smoothed Complexity of Local Search Algorithms"
[more info] [Zoom Link]
Rebecca Wright
Barnard College
"Differential Privacy in Practice"
[more info] [Zoom Link]
Elisa Bertino
Purdue University
"The Persistent Problem of Software Insecurity"
[more info] [Zoom Link]
Javam Machado
Federal University of Ceará (UFC), Brazil
"Differentially Private Analysis of Graphs"
[more info] [Zoom Link]
Varun Narayanan
UCLA
"Perfectly/Statistically Secure MPC over Layered Graphs with Optimal Corruption Thresholds"
[more info] [Zoom Link]
Fan Yao
University of Central Florida
"Understanding and Enhancing Microarchitecture Security in the Era of AI and Emerging Hardware"
[more info] [Zoom Link]
Yuchen Zhang
New York University
"Combating Cyber Attacks by Securing the Software Lifecycle"
[more info] [Zoom Link]
Arka Rai Choudhuri
Nexus
"Foundations and Advancements in Cryptographic Proofs"
[more info] [Zoom Link]
Yossi Oren
Ben Gurion University of the Negev
"All Computers are Identical, and Other Lies we Tell Ourselves about Computer Design"
[more info] [Zoom Link]
Imtiaz Karim
Purdue University
"Systematic Security Analysis of Cellular Network Specifications and Implementations"
[more info] [Zoom Link]
Chongzhou Fang
University of California, Davis
"Cloud System Security: From Cloud Orchestration to Hardware Attacks"
[more info] [Zoom Link]
Jiaxin Guan
New York University
"Space Jammed: Cryptography against Space-Bounded Adversaries"
[more info] [Zoom Link]
Nusrat Zahan
North Carolina State University
"Evaluation of Security Controls Toward the Enhancement of Software Supply Chain Security"
[more info] [Zoom Link]
Rajeev Alur
University of Pennsylvania
"Neurosymbolic Programming"
[more info] [Zoom Link]
Takuya Ito
IBM T.J. Watson Research Center
"Measuring artificial intelligence through a science of generalization: Perspectives from computer science, cognitive science, and neuroscience"
[more info] [Zoom Link]
Shinan Liu
University of Chicago
"Weaving an Intelligent Net with More Connected, Accessible, and Reliable Machine Intelligence"
[more info] [Zoom Link]
Kieran Murphy
University of Pennsylvania
"Restricting information flow in deep learning for interpretability and insight"
[more info] [Zoom Link]
Haotian Zhang
University of Texas at Arlington
"Advancing Binary Code Analysis: Bridging Foundational Techniques and AI-Driven Innovations"
[more info] [Zoom Link]
Sebastian Zimmeck
Wesleyan University
"Implementing Privacy Rights on the Internet: From Laws to Systems"
[more info] [Zoom Link]
Soneya Binta Hossain
University of Virginia
"Solving the Test Oracle Problem with Program Analysis and Generative AI"
[more info] [Zoom Link]
Yanxue Jia
Purdue University
"User-Centric Privacy via Cryptography"
[more info] [Zoom Link]
Jingxi Xu
Columbia University
"Robot Learning with Sparsity and Scarcity"
[more info] [Zoom Link]
Mengyu Liu
University of Notre Dame
"Enhancing Safety of Cyber-Physical Systems in Real Time"
[more info] [Zoom Link]
Shivvrat Arya
University of Texas at Dallas
"Neural Solvers for Fast, Accurate Probabilistic Inference"
[more info] [Zoom Link]
Hau Chan
University of Nebraska-Lincoln
"AI-Empowered Collective Decision-Making for Improving Vitality of Communities"
[more info] [Zoom Link]
Ahmed Tanvir Mahdad
Texas A&M University
"New Frontiers in Authentication and Side-Channels in Emerging Platforms: 2FA Attacks, Sensor Exploits, and AR/VR Security"
[more info] [Zoom Link]
Yihan Du
University of Illinois at Urbana-Champaign
"Why is RLHF Data-Efficient in Policy Optimization?"
[more info] [Zoom Link]
Tsung-Chi Lin
Johns Hopkins University
"Designing User-Centered Interfaces for Human-Robot Interaction"
[more info] [Zoom Link]
Bhavani Thuraisingham
The University of Texas at Dallas
"Trustworthy Artificial Intelligence for Securing Transportation Systems"
[more info] [Zoom Link]
C. Mohan
Hong Kong Baptist University, China; Tsinghua University, China and Former IBM Research Fellow, USA
"The Data Landscape: Trends and Directions"
[more info] [Zoom Link]
Divyakant Agrawal
University of California at Santa Barbara
"Trust in the Untrusted World?"
[more info] [Zoom Link]
Christos H. Papadimitriou
Columbia University
"Building a brain"
[more info] [Zoom Link]
Divesh Srivastavai
Database Research at AT&T
"Towards High-Quality Data for Responsible Data Science"
[more info] [Zoom Link]
Xiali (Sharon) Hei
University of Louisiana at Lafayette
"Investigate and Mitigate the Attacks Caused by Out-of-Band Signals"
[more info] [WebEx]
Shahram Ghandeharizadeh
FLSLab
"Intelligent 3D Multimedia Displays using Flying Light Specks"
[more info] [WebEx]
Zichen Gui
ETH Zurich
"Why Designing and Implementing Encrypted Search is Hard?"
[more info] [WebEx]
Liang Wang
Princeton University
"A Holistic View of Internet Security"
[more info] [Zoom Link]
Bahruz Jabiyev
Dartmouth University
"Security Challenges of Distributed Content Delivery on the Web"
[more info] [WebEx]
Nikolaos Tziavelis
Northeastern University
"A New Generation of Query Processing for Advanced Data Analytics"
[more info] [WebEx]
Guannan Wei
Purdue University
"Types and Metaprogramming for Correct, Safe, and Performant Software Systems"
[more info] [WebEx]
Kaushal Kafle
William & Mary
"Investigating the Latent Security and Privacy Risks in Consumer Software Systems"
[more info] [WebEx]
Moshe Vardi
Rice University
"AI and Democracy"
[more info] [Zoom Link]
Tapti Palit
Purdue University
"Program Analysis for Software Security"
[more info] [Zoom Link]
Yanan Guo
University of Pittsburgh
"Security Vulnerabilities in Modern Computing Hardware: Causes and Consequences"
[more info] [WebEx]
Muslum Ozgur Ozmen
Purdue University
"Achieving Compositional Safety and Security in IoT Environments"
[more info] [Zoom Link]
Yan Long
University of Michigan
"Privacy and Security of Sensing in Cyber-physical Systems"
[more info] [WebEx]
Ning Luo
Northwestern University
"Going From Strength to Strength: Synergizing Formal Methods and Cryptography"
[more info] [WebEx]
Konstantinos Kallas
University of Pennsylvania
"Programmable Software Systems for Correct High-performance Applications"
[more info] [WebEx]
Tomer Galanti
Center for Brains, Minds, and Machines at MIT
"Fundamental Problems in AI: Transferability, Compressibility and Generalization"
[more info] [Zoom Link]
Arslan Khan
Purdue University
"Securing embedded systems using compartmentalization"
[more info] [Zoom Link]
Hyungsub Kim
Purdue University
"Defeating Cyber and Physical Attacks in Robotic Vehicles"
[more info] [WebEx Link]
Ziming Zhao
SUNY Buffalo
"HOLMES: Holistic and Hardware-assisted Control-Flow Security for Microcontroller Systems"
[more info] [WebEx Link]
Huining Li
SUNY Buffalo
"Privacy-aware Computing in Mobile Health Systems"
[more info] [WebEx Link]
Michael Houle
New Jersey Institute of Technology
"Local Intrinsic Dimensionality and Machine Learning: The Dynamical Systems Perspective"
[more info] [WebEx Link]
Murat Kantarcioglu
University of Texas at Dallas
"Securing Big Data in the Age of Artificial Intelligence"
[more info] [WebEx Link]
Marek Rusinkiewicz
Dean Emeritus NJIT
"From AI to Cybersecurity (and back?)"
[more info] [Zoom Link]
Chenghong Wang
Duke University
"Balancing Privacy with System Guarantees: Key to Practical Private Databases"
[more info] [Zoom Link]
Dr. Behrooz Omidvar-Tehrani
AWS AI Labs
"Data-Informed Interaction Learning"
[more info] [Zoom Link]
Saurabh Kadekodi
Google
"Designing Exascale Distributed Systems"
[more info] [WebEx Link]
Simon Oya
University of Waterloo
"A principled approach to privacy design"
[more info] [WebEx Link]
Constantinos Chamzas
Rice University
"Learning and Planning for Robotic Manipulation: Bringing Theory to Practice"
[more info] [WebEx Link]
Juan Zhai
Rutgers
"Software Quality Assessment via Specification Synthesis"
[more info] [WebEx Link]
Nathan Malkin
University of Maryland
"Privacy for Proactive Intelligent Assistants, or: How To Design for Something That Doesn't Exist (Yet)"
[more info] [WebEx Link]
Jacques Klein
University of Luxembourg
"A Journey Through Android App Analysis: Solutions and Open Challenges"
[more info] [WebEx Link]
Michael J. DeLucia
U.S. Army Research Laboratory
"Machine Learning Enhanced Network Security"
[more info] [WebEx Link]
Jessica Shi
MIT
"Bridging Theory and Practice in Parallel Graph Processing"
[more info] [WebEx Link]
Kasthuri Jayarajah
Center for Real-time Distributed Sensing and Autonomy (CARDS) at UMBC
"Designing Systems for Collaborative Intelligence in Pervasive Environments"
[more info] [WebEx Link]
Sri AravindaKrishnan Thyagarajan
NTT Research
"Cryptography For Fast and Scalable Distributed Applications"
[more info] [WebEx Link]
Seyedhamed Ghavamnia
Stony Brook University
"Attack surface reduction through system calling filtering"
[more info] [WebEx Link]
Anrin Chakraborti
Duke University
"Cryptographically Secure Systems for Modern Applications"
[more info] [WebEx Link]
Zhihao Yao
University of California, Irvine
"Doublethink Vulnerabilities and System Security"
[more info] [WebEx Link]
Michael Houle
The University of Melbourne, Australia
"Local Intrinsic Dimensionality: An Extreme-Value-Theoretic Foundation"
[more info] [WebEx Link]
Dor Bitan
Simons Institute for the Theory of Computing at UC Berkeley
"Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases"
[more info] [WebEx Link]
Avigdor Gal
Technion - Israel Institute of Technology
"Loch Data and Other Monsters: on Creating Data Ecosytems, the Intelligent Way"
[more info] [WebEx Link]
Indrakshi Ray
Colorado State University
"Cyber Security of Embedded Networks in Heavy Vehicles"
[more info] [WebEx Link]
Robert Kozma
Center for Large-Scale Intelligent Optimization and Networks
Department of Mathematics, University of Memphis
"Energy-Aware Intelligence: Biological and Technical Systems"
[more info] [WebEx Link]
Daniele Panozzo
Courant Institute, NYU
"Black-Box Finite Element Analysis"
[more info] [WebEx Link]
Samira Mirbagher Ajorpaz
UC San Diego
"Proactive and Adaptable Architecture for Security and Performance"
[more info] [WebEx Link]
William Hallahan
Yale University
"Automated Approaches for Analysis and Synthesis"
[more info] [WebEx Link]
Jiaoyang LI
University of Southern California
"Intelligent Planning for Large-Scale Multi-Agent Coordination"
[more info] [WebEx Link]
Jin Sun
Cornell Tech, New York
"Visual Analysis of People in Context"
[ more info] [WebEx Link]
Yueqi Chen
Pennsylvania State University & Northwestern University
"Securing Operating Systems Kernels with Fewer Shots"
[more info] [WebEx Link]
Dongkuan Xu
Pennsylvania State University
"Resource-efficient Deep Learning: Democratizing AI at Scale"
[more info] [WebEx Link]
Souyoung Jin
MIT
"Cross-Modal Learning for Video Understanding"
[more info] [WebEx Link]
Pratik Soni
Carnegie Mellon University
"Foundations of Advanced Cryptography"
[more info] [WebEx Link]
Martin Kellogg
University of Washington
"Verification for Working Developers"
[more info] [WebEx Link]
Cong Shi
Rutgers University, NJ
"Security Vulnerabilities and Defenses in Emerging Mobile Applications (AR/VR and Voice Assistant Systems)"
[more info] [WebEx Link]
Song Li
Johns Hopkins University
"Dig Deeper - Mining Object Related Vulnerabilities via Static Analysis"
[more info] [WebEx Link]
Junqiao Qiu
Michigan Technological University
"Model-Centric Speculative Parallelization for Scalable Data Processing"
[more info] [WebEx Link]
Meisam Mohammady
CSIRO Data61 & Data Science Institute at Columbia University
"Novel Approaches to Preserving Utility in Privacy Enhancing Technologies"
[more info] [WebEx Link]
Adithya Vadapalli
University of Waterloo
"DPFs to the rescue: Applications of Distributed Point Functions to Secure Multiparty Computations"
[more info] [WebEx Link]