Skip to main content Skip to navigation
Tuesday, February 1 @11 am
ESIC SP22 Power Seminar Series ~ Model-Based Security for High-Consequence Energy Systems
Presentation
Online - Online

A growing set of national security concerns regarding critical energy infrastructure pose significant risk to grid operators, owners and investors. Responsive cybersecurity, or more broadly, digital system flexibility in the face of malign influence, is critical to the prevention of large-scale system failure, particularly with respect to high-consequence and exquisite (i.e., sophisticated, expensive, custom, high-performance) energy systems.

Tuesday, February 1 @11:10 am
EECS Colloquium: Moving beyond scale-driven learning — Hangfeng He, UPenn

Abstract:

Machine learning, especially deep learning, has been recognized as a monumentally successful approach to many data-intensive applications across a broad range of domains. Despite the great success achieved, recent progress mainly relies on scaling up existing learning methods with regard to the size of models or training data, consuming…

Monday, February 7 @11:10 am
EECS Colloquium: Security and privacy in critical applications and services by Ruimin Sun, Northeastern Univ.
Online - Online

Abstract
Nowadays, the security community is facing challenges from not only lone individuals, but also organizations with strategic agendas, which have caused enormous loss in social welfare, national security, and global economy. To overcome the challenges, this talk focus on securing ubiquitous systems and protect end users from cyber attacks through enhanced security mechanisms with intelligent defense strategies.

Wednesday, February 9 @11:10 am
EECS Colloquium: AI in HPC Systems Stack: Storage Systems and Deep Learning Systems by Bing Xie, Oak Ridge National Laboratory Univ.
Online - Online

In high-performance computing (HPC), scientific codes have been evolving continuously. Moving from numerical simulations and analyses to AI/ML-based applications, scientific codes execute on larger computational scales and issue massive data movements periodically for network communication and I/O at application runtime.

Friday, February 11 @11:10 am
EECS Colloquium: Enhancing the Cybersecurity Ecosystem by Understanding and Mitigating Human Vulnerabilities by Zhibo “Eric” Sun, Arizona State Univ.
Online - Online

Abstract In today’s society, programs and systems exist in every corner of our lives, from smart portable devices and appliances to vehicles and computing devices. Despite the fact that high-tech offers enormous conveniences and opportunities, it is also a platform for criminals to launch illicit attacks. Therefore, developers try…

Monday, February 14 @11:10 am
EECS Colloquium: Holistic Performance Analysis and Optimization of Unified Memory by Tyler Allen, Clemson Univ.
Online - Online

High-performance computing systems have seen tremendous growth in theoretical performance with the inclusion of Graphics Processing Units (GPUs) and other accelerators. The difficulty and complexity of programming these systems has grown alongside the performance as programmers are required to manage separate programming models and device memories for accelerators alongside traditional CPU resources.

Wednesday, February 23 @10:30 am
EECS Colloquium: A Journey Through Android App Analysis: Solutions and Open Challenges by Jacques Klein, University of Luxembourg
Engineering Teaching Research Laboratory (ETRL)

Abstract

Users can today download a wide variety of apps ranging from simple toy games to sophisticated business-critical apps. They rely on these apps daily to perform diverse tasks, some of them related to sensitive information such as their finances or health. Ensuring high-quality, reliable, and secure apps…