Monday, April 10, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this seminar I will present how to create 3D computer graphics and visualization systems for the web, using WebAssmbly and WebGPU language specifications, which are new, bleeding-edge technologies. Previously, accelerated graphics on the web was based on JavaScript libraries, which is still very popular, but they do not offer detailed memory management and code optimization, necessary for systems requiring high memory load and high computational demands. WebAssembly and WebGPU can be compiled from the C++ or Rust code, which also allows the deployment of the same codebase either for web or for the desktop-based applications.
Awais Rashid, Professor of Cybersecurity, the University of Bristol, Director of the EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-Scale Infrastructures
Monday, April 03, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person

This Distinguished Lecture is part of the CS Graduate Seminars.

Qiang Tang, Senior Lecturer (equal to U.S. Associate Professor), the University of Sydney
Thursday, March 30, 2023, 12:00
- 13:00
Building 4, Level 5, Room 5220.
Contact Person
Cloud storage is pervasive nowadays; surprisingly, how to secure cloud storage that is usable in the real world is in fact still open. In this work, we propose a novel system called End-to-Same-End Encryption (E2SEE) that can be deployed directly on existing infrastructure and provide both security and usability. Our system can be flexibly used to augment any App with secure storage, for users to create a personal digital lockbox, and for the cloud to provide secure storage service. A preliminary version of E2SEE was deployed in Snapchat, serving hundreds of millions of users, and the research result was published at USENIX Security 22.
Prof. Laure Berti, Computer Science, Research Director, French Institute of Research for Sustainable Development (IRD)
Tuesday, March 28, 2023, 14:00
- 15:00
Building 1, Level 4, Room 4214
Contact Person
This talk will present recent approaches for mitigation and adaptation, for which data analytics and ML are parts of the solution in a larger context of interdisciplinary and methodological research and innovations.
Monday, March 27, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Complex systems and software engineering, and associated challenges become increasingly important for the well-being and safety of our society of humans. Motivated by this push towards ever more complex systems and software of all sizes, spectacular failures, and decades of questioning in a variety of contexts and endeavors, this talk presents a theory of complex systems engineering, that is, a scientific theory in which an engineered system or software can be seen as a validated scientific hypothesis arising from a convergent mix of mathematical and validated experimental constructs. In its simplest form, a complex engineered system is a manufactured, validated scientific hypothesis arising from a mathematical theorem similar to those found in theoretical physics. This observation provides suggestions for improving system design, especially system architecture, by leveraging advanced mathematical and / or scientific concepts. In return, mathematicians and computer scientists can benefit from this bridge to engineering by bringing to bear many of their automated and manual theorem proving techniques to help with the design of complex systems.
Dr. Ruichuan Chen, Distinguished Member of Technical Staff and a Tech Lead, Nokia Bell Labs
Thursday, March 23, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Federated learning (FL) is increasingly deployed among multiple clients to train a shared model over decentralized data. To address the privacy concerns, FL systems need to protect the clients' data from being revealed during training, and also control data leakage through trained models when exposed to untrusted domains. However, existing FL systems (with distributed differential privacy) work impractically in the presence of client dropout, resulting in either poor privacy guarantees or degraded training accuracy. In addition, existing FL systems focus on safeguarding the privacy of training data, but not on protecting the confidentiality of the models being trained, which are increasingly of high business value. In this talk, I will present two pieces of our recent work that aim to address these aforementioned issues.
Wednesday, March 22, 2023, 12:30
- 14:30
B1, L3, R3119
Contact Person
This presentation addresses the challenges associated with trusting Neural Networks due to their black-box nature and limited ability to answer important questions on how they behave. The thesis proposes techniques that increase the trustworthiness of Neural Network models by employing approaches to overcome their black-box nature. The techniques include efficient extraction and verification of weights and decisions to ensure correctness with regards to pre-existing properties, continuous and exact explanations of the model behavior, and scalable training techniques providing strong, theoretically provable guarantees of privacy. We provide strong, approximation-free guarantees about Neural Networks, improving their trustworthiness to make it more likely that users will be willing to deploy them in the real world.
Michael Reiter, James B. Duke Distinguished Professor, Departments of Computer Science and Electrical & Computer Engineering, Duke University
Monday, March 20, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person
Despite long-ago predictions (e.g., see Bill Gates, 2004) that other user-authentication technologies would replace passwords, passwords remain not only pervasive but have flourished as the dominant form of account protection, especially at websites such as retailers that require a low-friction user experience. This talk will describe our research on methods to tackle three key ingredients of account takeovers for password-protected accounts today: (i) site database breaches, which is the largest source of stolen passwords for internet sites; (ii) the tendency of users to reuse the same or similar passwords across sites; and (iii) credential stuffing, in which attackers submit breached credentials for one site in login attempts for the same users' accounts at another.
Prof.Gustavo Alonso, Computer Science, ETH Zurich
Monday, March 13, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this talk I will discuss the shift towards hardware acceleration and show with several examples from industry and from research the large role that FPGAs are playing. I will hypothesize that we are in a new era where most of the established assumptions, rules of thumb, and accumulated wisdom about many aspects of computation in general and of data processing in particular no longer hold and need to be revisited.
Monday, March 13, 2023, 08:55
- 17:00
Building 4, Level 5, Room 5209
Contact Person
The “KAUST Workshop on Applied Geometry and Visual Computing” brings together leading scientists from Europe and the United States, presenting their latest results in - Applied and Discrete Differential Geometry - Geometry Processing - Computational Fabrication The talks are related to various problems in Applied Mathematics in general and to further areas of Visual Computing such as Computer Graphics, Physical Simulation and Scientific Visualization. The workshop provides a great opportunity to learn about latest developments and to discuss ongoing work with top researchers in the field.
Pramod Bhatotia, Chair Professor, Department of Computer Science, the Technical University of Munich (TUM), Germany.
Thursday, March 09, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
In this talk, Professor Pramod Bhatotia will give an overview of systems research at TU Munich. He will cover his teaching and ongoing research projects. And will conclude the talk with a brief overview of his ERC project.
Prof.Manolis Koubarakis, Informatics and Telecommunications, National and Kapodistrian University of Athens
Monday, March 06, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
I will present a data science pipeline which starts with Earth observation data arriving in the ground segment of a satellite mission and ends with a complete user application. I will first briefly present all the tools my group has been developing since 2010 for supporting the various stages of the pipeline. Then, I will concentrate on the recently developed system Strabo 2 which can store big geospatial data encoded in RDF and query them using the Open Geospatial Consortium standard GeoSPARQL. Strabo 2 is the only parallel and distributed RDF store available today that can manage terabytes of geospatial data efficiently.
Monday, February 27, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Propagation of acoustic waves in time-varying and/or moving media has attracted a lot of attentions and is expected to lead to many intriguing applications. In this talk, I will discuss our recent work on acoustic wave propagation in spinning media (air or water). I will start with a review of the theoretical foundation built upon the Mie scattering framework, in which both the wave equation and the boundary conditions will be specifically discussed. The study is limited in the linear regime and exhibit the peculiar scattering features.
Prof.Oliver Deussen, Visual Computing, University of Konstanz
Monday, February 20, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Inevitably, the projection of most graph structures on two-dimensional screens will create errors and therefore visually wrong impressions. In the past, two types of methods have been developed to minimize projection errors and distribute them in a visually pleasing way. The first group of methods, force-directed layouts, interpret the links of a graph as physical springs, while stress-based methods minimize an energy function, which aims to map graph distances faithfully.
Wednesday, February 15, 2023, 20:10
- 22:00
B1, L2, R2202
Contact Person
In computer vision, generative AI models are typically built for images, videos, and 3D objects. Recently, there has emerged a paradigm of neural fields, which unifies the representations of such types of data by parametrizing them via neural networks. In this thesis, we develop generative models for images, videos, and 3D scenes which treat the underlying data in such a form and explore the benefits which such a perspective provides.
Wednesday, February 15, 2023, 18:00
- 20:00
B1, L2, R2202
Contact Person
The success of Generative Adversarial Networks (GANs) has resulted in unprecedented quality both for image generation and manipulation. Recent state-of-the-art GANs (e.g., the StyleGAN series) have demonstrated outstanding results in photo-realistic image generation. In this dissertation, we explore the latent space properties, including image manipulation, extraction of 3D properties, and performing various weakly supervised and unsupervised downstream tasks using StyleGAN and its derivative architectures.
Prof.Bülent Erbilgin and Dr.Lama Hakem, KAUST Entrepreneurship Center
Monday, February 13, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Entrepreneurs continue to be the driver for economic development and innovation. Some startups invent brand new markets while other manage to enter markets crowded by existing large companies. In this seminar we will explore making critical early decisions starting from chaos and creating an exciting new business. We will gain insights on the value of learning by doing, prototyping, discussing tradeoffs between analysis, experimentation and scale.  We will also review courses offered by KAUST Entrepreneurship Center.
Jian Weng, PhD student, Computer Science Department, UCLA
Sunday, February 12, 2023, 08:30
- 09:30
KAUST
Contact Person
In this talk, I will first discuss how my research democratizes the accelerator designs and unifies the hardware/software innovations by automating the accelerator design process under a unified programming paradigm. By taking advantage of the compiler’s awareness of the program behaviors that profit from hardware specialization, accelerators can be automatically synthesized by searching through a well-defined design space. These automatically designed accelerators achieve comparable cost/performance efficiency compared with prior handcrafted designs. In the rest of the talk, I will also cover how this work inspires me to develop techniques to accelerate emerging application domains by orders-of-magnitude speedup, including digital signal processing and DNN inference, and how I take advantage of this work to revolutionize the FPGA programming paradigm.
Prof. Sven Dietrich, the Computer Science Department, Hunter College, the City University of New York (CUNY)
Thursday, February 09, 2023, 15:30
- 16:30
Building 5, Level 5, Room 5209
Contact Person
Vulnerability discovery can be challenging: many software packages, both open and closed-source projects, build on existing code from public software repositories to network drives, derived from earlier versions or related software packages. Even implemented protocols rely on such repositories. It is important to detect such copies of code when the original code contains a software vulnerability, especially one that is exploitable, as seen with flaws such as the bash vulnerability Shellshock or the SSL vulnerability Heartbleed.
Prof. George Mohler, Computer Science, Boston College
Wednesday, February 08, 2023, 17:00
- 18:00
KAUST
In this talk we first provide an introduction to point processes, which are stochastic models for the occurrence of events in space and time. We then discuss the application of point processes to investigate the relationship between law enforcement drug seizures and accidental overdoses in Indianapolis. We will also discuss results from a field-experiment in Indianapolis where point process based harm indices were used to inform the distribution of addiction treatment information. 
Andrea Bianco, Full Professor, Electronics and Telecommunications Department at Politecnico di Torino
Wednesday, February 08, 2023, 13:00
- 14:00
Building 9, Level 4, Room 4125
Contact Person
Machine Learning (ML) tools have recently been adopted for a wide range of automated operations in optical networking, moving fundamental steps towards the paradigm of zero-touch infrastructures. One example of such tasks is estimating the Quality of transmission of a lightpath prior to its establishment, which is particularly challenging due to the non-linear characteristics of signal propagation in optical fibers and to the often-incomplete knowledge of equipment parameters. This talk provides an overview of the contribution of my research team in the field of ML-based lightpath QoT estimation, including transfer learning approaches for inter-domain model adaptation, active learning for model building with small-sized training dataset, quantification of prediction uncertainty, and adoption of Explainable AI framework to expose the internal decisional mechanisms of trained models.
Monday, February 06, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this work we focus our attention on distributed optimization problems in the context where the communication time between the server and the workers is non-negligible. We obtain novel methods supporting bidirectional compression (both from the server to the workers and vice versa) that enjoy new state-of-the-art theoretical communication complexity for convex and nonconvex problems.
Prof. David Bromberg, Distributed computing systems, University of Rennes (IRISA)
Thursday, February 02, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5220.
Contact Person
In this talk we will explore how research in systems and distributed systems may improve the resilience to cyber attacks following 3 axes targeting mobile systems, distributed systems, and operating systems
Monday, January 30, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person
In this talk, we will define prototypical random walks, a mechanism we introduced to improve visual classification with limited data (few-shot learning), and then developed the mechanism in a conceptually different way to facilitate novel image generation and unseen class recognition tasks. More specifically, in the few-shot learning setting, we will show how we can develop a random walk semi-supervised loss that enables the network to learn representations that are compact and well-separated.