Wednesday, June 07, 2023, 14:30
- 17:00
Building 2, Room 5209; https://kaust.zoom.us/my/yuxihong
Contact Person
This thesis addresses the exponential growth of experimental data and the resulting computational complexity seen in two major scientific applications, which account for most cycles consumed on today's supercomputers.
Edmond Chow, Professor and Associate Chair, School of Computational Science and Engineering, Georgia Institute of Technology
Tuesday, June 06, 2023, 16:00
- 17:00
Building 2, Level 5, Room 5220
Contact Person
Coffee Time: 15:30 - 16:00. Kernel matrices can be found in computational physics, chemistry, statistics, and machine learning. Fast algorithms for matrix-vector multiplication for kernel matrices have been developed, and is a subject of continuing interest, including here at KAUST. One also often needs fast algorithms to solve systems of equations involving large kernel matrices. Fast direct methods can sometimes be used, for example, when the physical problem is 2-dimensional. In this talk, we address preconditioning for the iterative solution of kernel matrix systems. The spectrum of a kernel matrix significantly depends on the parameters of the kernel function used to define the kernel matrix, e.g., a length scale.
Prof. Fatemah Alharbi, Assistant Professor, the Computer Science Department, Taibah University, Yanbu, KSA.
Thursday, May 25, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5220.
Contact Person
The Domain Name System (DNS) is a core protocol for the Internet. It resolves mappings between Internet Protocol (IP) addresses and their corresponding Fully Qualified Domain Names (FQDNs). Since all Internet communications rely on it, DNS structuring should therefore be resilient and robust against failure to avoid any service interruption. While the research community and experienced practitioners have established best practices to this end, many worldwide DNS implementations are still prone to many types of configuration errors. In this talk, I discuss the adoption of these approaches in some countries. Also, a case study is presented considering domains in Saudi Arabia (.sa) that illustrates the value of measuring the DNS at this scale. The results are valuable to improve the DNS infrastructure in the kingdom. Lastly, I provide recommendations to improve DNS service resilience and robustness.
Wednesday, May 10, 2023, 14:00
- 16:00
Building 1, Level 3, Room 3119
Contact Person
Edge devices refer to compact hardware that performs data processing and analysis close to the data source, eliminating the need for data transmission to centralized systems for analysis. These devices are typically integrated into other equipment, such as sensors or smart appliances, and can collect and process data in real time.
Prof.N.Asokan, Computer Science, University of Waterloo
Monday, May 08, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
The success of deep learning in many application domains has been nothing short of dramatic. The success has brought the spotlight onto security and privacy concerns with deep learning. One of them is the threat of "model extraction": when a machine learning model is made available to customers via an inference interface, a malicious customer can use repeated queries to this interface and use the information gained to construct a surrogate model. In this talk, I will describe our work in exploring whether model extraction constitutes a realistic threat. I will also discuss possible countermeasures, focussing on deterrence mechanisms that allow for the verification of ownership of ML models.
Marcello Cinque, Associate Professor, Computer Engineering, the University of Naples Federico Il, Italy.
Thursday, May 04, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
In recent years we are witnessing the advent of service computing and cloud technologies in industrial applications, with intriguing innovations and novel compelling challenges. For instance, in the automotive, there are initiatives for consolidating Electronic Control Units (ECUs) as virtual machines on the same board. Or in the Industry 4.0 (I4.0), researchers and practitioners are dealing with the challenge of making the factory floor programmable by softwarizing hardware elements with edge-cloud native components. The talk will delve into this novel trend, discussing enabling virtualization technologies for industrial systems, including hypervisors, real-time container-based solutions, and software orchestration approaches.
Tuesday, May 02, 2023, 18:00
- 20:00
https://kaust.zoom.us/j/93037578099
Contact Person
This dissertation focuses on the challenge of learning with small amounts of annotated data in graph machine learning. The scarcity of annotated data can severely degrade the performance of graph learning models, and the ability to learn with small amounts of data, known as data-efficient graph learning, is essential for achieving strong generalization in low-data regimes. The dissertation proposes three methods to address the challenges of graph learning in low-data scenarios, including a graph meta-learning framework, a solution for few-shot graph classification, and a cross-domain knowledge transfer model. Experimental results demonstrate the effectiveness of the proposed methods in improving model generalization for data-efficient graph learning.
Semeen Rehman, Assistant Professor, Electrical Engineering and Information Technology, TU Wien
Monday, May 01, 2023, 12:00
- 13:00
Building 9, Level 1, Room 3131
Embedded systems are currently an indispensable part of our lives because of their pervasive deployment in a wide range of critical applications (e.g., automotive, encryption, and healthcare, etc.) as well as non-critical applications (e.g., image/video processing, etc.). These embedded system form the fundamental components of today’s Cyber Physical Systems (CPS) and Internet-of-Things (IoT), which are subjected to stringent constraints in terms of reliability, security, and power-/energy especially in case of battery-driven scenarios. Due to the shrinking transistor dimensions, embedded computing hardware are increasingly susceptible to a wide range of reliability threats e.g., transient faults (such as soft errors due to high-energy particle strikes) and permanent faults due to design-time process variations and run-time aging effects. These threats may lead to functional and timing errors that may jeopardize the correct application’s executions. Furthermore, security has also become a crucial aspect in today’s systems because of several security threats, e.g., confidentiality threat to steal the IP or private information via side channel attacks. These reliability and security threats may lead to a catastrophic impact on the robustness of embedded systems. Another key design constraint of a battery-driven embedded platform is power-/energy-wise efficiency, e.g., a device under a low power/battery mode during the critical application execution may miss a critical event that may lead to a catastrophic outcome. In order to address the above-mentioned challenges, it is crucial to investigate different techniques at the hardware and software layers. In this talk, I will first highlight the key robustness and energy efficiency challenges in embedded computing systems, and will present techniques to address these challenges.
Prof.Essam Mansour, Computer Science and Software Engineering, Concordia University
Monday, May 01, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Conversational AI and Question-Answering systems (QASs) for knowledge graphs (KGs) are both emerging research areas: they empower users with natural language interfaces for extracting information efficiently and effectively. While Conversational AI simulates human-like conversations, its effectiveness is limited by the available training data. However, QASs retrieve the most up-to-date information from KGs by translating natural language queries into formal queries that the database engine can process. In this talk, we examine the characteristics of existing approaches for combining Conversational AI and QASs to create novel KG chatbots. We also introduce KGQAn, a universal QA system that can be applied to any KG without the need for customization.
Monday, April 17, 2023, 17:30
- 18:30
Building 5, Level 5, Room 5220; Zoom Link: https://kaust.zoom.us/j/91763886566; Passcode: KAUST
Contact Person
Generative Adversarial Networks (GANs) are a very successful method for high-quality image synthesis and are a powerful tool to generate realistic images by learning their visual properties from a dataset of exemplars. However, the controllability of the generator output still poses many challenges. In this thesis, we propose several methods for achieving larger and/or higher visual quality in GAN outputs by combining latent space manipulations with image compositing operations
Monday, April 17, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
This talk introduces serverless computing, a programming model that has flourished in the last few years, mainly because it allows developers to concentrate on the application logic and not worry about scalability and resource management. Current serverless offerings give users limited flexibility for configuring the resources allocated to their function invocations. We take a principled approach to the problem of resource allocation for serverless functions, analyzing the effects of automating this choice in a way that leads to the best combination of performance and cost.
Monday, April 10, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this seminar I will present how to create 3D computer graphics and visualization systems for the web, using WebAssmbly and WebGPU language specifications, which are new, bleeding-edge technologies. Previously, accelerated graphics on the web was based on JavaScript libraries, which is still very popular, but they do not offer detailed memory management and code optimization, necessary for systems requiring high memory load and high computational demands. WebAssembly and WebGPU can be compiled from the C++ or Rust code, which also allows the deployment of the same codebase either for web or for the desktop-based applications.
Awais Rashid, Professor of Cybersecurity, the University of Bristol, Director of the EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-Scale Infrastructures
Monday, April 03, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person

This Distinguished Lecture is part of the CS Graduate Seminars.

Qiang Tang, Senior Lecturer (equal to U.S. Associate Professor), the University of Sydney
Thursday, March 30, 2023, 12:00
- 13:00
Building 4, Level 5, Room 5220.
Contact Person
Cloud storage is pervasive nowadays; surprisingly, how to secure cloud storage that is usable in the real world is in fact still open. In this work, we propose a novel system called End-to-Same-End Encryption (E2SEE) that can be deployed directly on existing infrastructure and provide both security and usability. Our system can be flexibly used to augment any App with secure storage, for users to create a personal digital lockbox, and for the cloud to provide secure storage service. A preliminary version of E2SEE was deployed in Snapchat, serving hundreds of millions of users, and the research result was published at USENIX Security 22.
Prof. Laure Berti, Computer Science, Research Director, French Institute of Research for Sustainable Development (IRD)
Tuesday, March 28, 2023, 14:00
- 15:00
Building 1, Level 4, Room 4214
Contact Person
This talk will present recent approaches for mitigation and adaptation, for which data analytics and ML are parts of the solution in a larger context of interdisciplinary and methodological research and innovations.
Monday, March 27, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Complex systems and software engineering, and associated challenges become increasingly important for the well-being and safety of our society of humans. Motivated by this push towards ever more complex systems and software of all sizes, spectacular failures, and decades of questioning in a variety of contexts and endeavors, this talk presents a theory of complex systems engineering, that is, a scientific theory in which an engineered system or software can be seen as a validated scientific hypothesis arising from a convergent mix of mathematical and validated experimental constructs. In its simplest form, a complex engineered system is a manufactured, validated scientific hypothesis arising from a mathematical theorem similar to those found in theoretical physics. This observation provides suggestions for improving system design, especially system architecture, by leveraging advanced mathematical and / or scientific concepts. In return, mathematicians and computer scientists can benefit from this bridge to engineering by bringing to bear many of their automated and manual theorem proving techniques to help with the design of complex systems.
Dr. Ruichuan Chen, Distinguished Member of Technical Staff and a Tech Lead, Nokia Bell Labs
Thursday, March 23, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Federated learning (FL) is increasingly deployed among multiple clients to train a shared model over decentralized data. To address the privacy concerns, FL systems need to protect the clients' data from being revealed during training, and also control data leakage through trained models when exposed to untrusted domains. However, existing FL systems (with distributed differential privacy) work impractically in the presence of client dropout, resulting in either poor privacy guarantees or degraded training accuracy. In addition, existing FL systems focus on safeguarding the privacy of training data, but not on protecting the confidentiality of the models being trained, which are increasingly of high business value. In this talk, I will present two pieces of our recent work that aim to address these aforementioned issues.
Wednesday, March 22, 2023, 12:30
- 14:30
Building 1, Level 3, Room 3119; https://kaust.zoom.us/j/96771488660
Contact Person
This presentation addresses the challenges associated with trusting Neural Networks due to their black-box nature and limited ability to answer important questions on how they behave. The thesis proposes techniques that increase the trustworthiness of Neural Network models by employing approaches to overcome their black-box nature. The techniques include efficient extraction and verification of weights and decisions to ensure correctness with regards to pre-existing properties, continuous and exact explanations of the model behavior, and scalable training techniques providing strong, theoretically provable guarantees of privacy. We provide strong, approximation-free guarantees about Neural Networks, improving their trustworthiness to make it more likely that users will be willing to deploy them in the real world.
Michael Reiter, James B. Duke Distinguished Professor, Departments of Computer Science and Electrical & Computer Engineering, Duke University
Monday, March 20, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person
Despite long-ago predictions (e.g., see Bill Gates, 2004) that other user-authentication technologies would replace passwords, passwords remain not only pervasive but have flourished as the dominant form of account protection, especially at websites such as retailers that require a low-friction user experience. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same users' accounts at another.
Prof.Gustavo Alonso, Computer Science, ETH Zurich
Monday, March 13, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this talk I will discuss the shift towards hardware acceleration and show with several examples from industry and from research the large role that FPGAs are playing. I will hypothesize that we are in a new era where most of the established assumptions, rules of thumb, and accumulated wisdom about many aspects of computation in general and of data processing in particular no longer hold and need to be revisited.
Monday, March 13, 2023, 08:55
- 17:00
Building 4, Level 5, Room 5209
Contact Person
The “KAUST Workshop on Applied Geometry and Visual Computing” brings together leading scientists from Europe and the United States, presenting their latest results in - Applied and Discrete Differential Geometry - Geometry Processing - Computational Fabrication The talks are related to various problems in Applied Mathematics in general and to further areas of Visual Computing such as Computer Graphics, Physical Simulation and Scientific Visualization. The workshop provides a great opportunity to learn about latest developments and to discuss ongoing work with top researchers in the field.
Pramod Bhatotia, Chair Professor, Department of Computer Science, the Technical University of Munich (TUM), Germany.
Thursday, March 09, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
In this talk, Professor Pramod Bhatotia will give an overview of systems research at TU Munich. He will cover his teaching and ongoing research projects. And will conclude the talk with a brief overview of his ERC project.
Prof.Manolis Koubarakis, Informatics and Telecommunications, National and Kapodistrian University of Athens
Monday, March 06, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
I will present a data science pipeline which starts with Earth observation data arriving in the ground segment of a satellite mission and ends with a complete user application. I will first briefly present all the tools my group has been developing since 2010 for supporting the various stages of the pipeline. Then, I will concentrate on the recently developed system Strabo 2 which can store big geospatial data encoded in RDF and query them using the Open Geospatial Consortium standard GeoSPARQL. Strabo 2 is the only parallel and distributed RDF store available today that can manage terabytes of geospatial data efficiently.
Monday, February 27, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Propagation of acoustic waves in time-varying and/or moving media has attracted a lot of attentions and is expected to lead to many intriguing applications. In this talk, I will discuss our recent work on acoustic wave propagation in spinning media (air or water). I will start with a review of the theoretical foundation built upon the Mie scattering framework, in which both the wave equation and the boundary conditions will be specifically discussed. The study is limited in the linear regime and exhibit the peculiar scattering features.