A growing set of national security concerns regarding critical energy infrastructure pose significant risk to grid operators, owners and investors. Responsive cybersecurity, or more broadly, digital system flexibility in the face of malign influence, is critical to the prevention of large-scale system failure, particularly with respect to high-consequence and exquisite (i.e., sophisticated, expensive, custom, high-performance) energy systems.
School of Electrical Engineering and Computer Science
February 2022
Abstract:
Machine learning, especially deep learning, has been recognized as a monumentally successful approach to many data-intensive applications across a broad range of domains. Despite the great success achieved, recent progress mainly relies on scaling up existing learning methods with regard to the size of models or training data, consuming…
Emerging hardware, like FPGAs, is shaping the future of heterogeneous computing; however, the use of such extraordinary computing power is restricted to a few software developers with hardware expertise.
Machine learning provides powerful tools for data analytics while security and privacy attacks increasingly involve data. Therefore, machine learning naturally intersects with security and privacy.
Abstract
Nowadays, the security community is facing challenges from not only lone individuals, but also organizations with strategic agendas, which have caused enormous loss in social welfare, national security, and global economy. To overcome the challenges, this talk focus on securing ubiquitous systems and protect end users from cyber attacks through enhanced security mechanisms with intelligent defense strategies.
In high-performance computing (HPC), scientific codes have been evolving continuously. Moving from numerical simulations and analyses to AI/ML-based applications, scientific codes execute on larger computational scales and issue massive data movements periodically for network communication and I/O at application runtime.
Abstract In today’s society, programs and systems exist in every corner of our lives, from smart portable devices and appliances to vehicles and computing devices. Despite the fact that high-tech offers enormous conveniences and opportunities, it is also a platform for criminals to launch illicit attacks. Therefore, developers try…
High-performance computing systems have seen tremendous growth in theoretical performance with the inclusion of Graphics Processing Units (GPUs) and other accelerators. The difficulty and complexity of programming these systems has grown alongside the performance as programmers are required to manage separate programming models and device memories for accelerators alongside traditional CPU resources.
Abstract
Users can today download a wide variety of apps ranging from simple toy games to sophisticated business-critical apps. They rely on these apps daily to perform diverse tasks, some of them related to sensitive information such as their finances or health. Ensuring high-quality, reliable, and secure apps…