Prof. Francesca Gardini, Università di Pavia
Tuesday, April 30, 2024, 16:00
- 17:00
Building 1, Level 3, Room 3119
We will discuss the solution of eigenvalue problems associated with partial differential equations (PDE)s that can be written in the generalised form Ax = λMx, where the matrices A and/or M may depend on a scalar parameter. Parameter dependent matrices occur frequently when stabilised formulations are used for the numerical approximation of PDEs. With the help of classical numerical examples we will show that the presence of one (or both) parameters can produce unexpected results.
Mustaque Ahamad is a professor in the School of Cybersecurity and Privacy, the Georgia Institute of Technology.
Sunday, April 28, 2024, 12:00
- 13:00
Building 9, Level 2, Room 2325, Hall 2
Contact Person

Abstract

Malicious software or malware is a serious cybersecurity threat, and the research communi

Prof. Sajal K. Das is a Curators’ Distinguished Professor of Computer Science, and Daniel St. Clair Endowed Chair, Missouri University of Science and Technology, USA.
Thursday, April 25, 2024, 15:30
- 16:30
Building 4, Level 5, Room 5220
Contact Person
Our daily lives are becoming increasingly dependent on smart cyber-physical infrastructures, such as smart homes and cities, smart grid, smart transportation, smart healthcare, smart agriculture, and so on.
Dr. Elia Onofri, Research fellow, the Institute for Applied Mathematics of the National Research Council of Italy (IAC-CNR).
Thursday, April 18, 2024, 15:30
- 16:30
Building 4, Level 5, Room 5220
Contact Person
Networks are nowadays pervasive in Big Data. It is often useful to regroup such data in clusters according to distinctive node features and use a representative element for each cluster, hence generating a novel contracted graph that shrank in size.
Prof. Edgard Pimentel, Department of Mathematics of the University of Coimbra
Tuesday, March 26, 2024, 16:00
- 17:00
Building 2, Level 5, Room 5220
Hessian-dependent functionals play a pivotal role in a wide latitude of problems in mathematics. Arising in the context of differential geometry and probability theory, this class of problems find applications in the mechanics of deformable media (mostly in elasticity theory) and the modelling of slow viscous fluids. We study such functionals from three distinct perspectives.
Reader, the Department of Computer Science, City, University of London.
Thursday, March 07, 2024, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person

 

Abstract

The talk will give an overview of research at the Department of Computer

Prof. Silvia Bertoluzza
Tuesday, March 05, 2024, 16:00
- 17:00
Building 2, Level 5, Room 5209
We present a theoretical analysis of the Weak Adversarial Networks (WAN) method, recently proposed in [1, 2], as a method for approximating the solution of partial differential equations in high dimensions and tested in the framework of inverse problems. In a very general abstract framework.
Prof. Christof Schmidhuber, ZHAW School of Engineering
Tuesday, February 27, 2024, 16:00
- 17:00
Building 9, Level 2, Room 2322
Analogies between financial markets and critical phenomena have long been observed empirically. So far, no convincing theory has emerged that can explain these empirical observations. Here, we take a step towards such a theory by modeling financial markets as a lattice gas.
Prof. Dr. Victorita Dolean, Mathematics and Computer Science, Scientific Computing, TU Eindhoven
Tuesday, February 06, 2024, 16:00
- 17:00
Building 2, Level 5, Room 5220
Wave propagation and scattering problems are of huge importance in many applications in science and engineering - e.g., in seismic and medical imaging and more generally in acoustics and electromagnetics.
Gene Tsudik, Distinguished Professor of Computer Science, the University of California, Irvine (UCI)
Monday, February 05, 2024, 11:30
- 12:30
Building 9, Level 2, Room 2325, Hall 2
Contact Person
As many types of IoT devices worm their way into numerous settings and many aspects of our daily lives, awareness of their presence and functionality becomes a source of major concern. Hidden IoT devices can snoop (via sensing) on nearby unsuspecting users, and impact the environment where unaware users are present, via actuation.
Prof. Zhiming Chen, Academy of mathematics and Systems Science, Chinese Academy of Sciences
Wednesday, January 24, 2024, 14:30
- 16:00
Building 4, Level 5, Room 5220
In this short course, we will introduce some elements in deriving the hp a posteriori error estimate for a high-order unfitted finite element method for elliptic interface problems. The key ingredient is an hp domain inverse estimate, which allows us to prove a sharp lower bound of the hp a posteriori error estimator.
Prof. Mohamed Abdelfattah, Electrical and Computer Engineering Department at Cornell University
Sunday, December 17, 2023, 14:00
- 15:30
Building 2, Level 5, Room 5209
Contact Person
Deep neural networks (DNNs) are revolutionizing computing, necessitating an integrated approach across the computing stack to optimize efficiency. In this talk, I will explore the frontier of DNN optimization, spanning algorithms, software, and hardware. We'll start with hardware-aware neural architecture search, demonstrating how tailoring DNN architectures to specific hardware can drastically enhance performance.
Prof. Ahmad-Reza Sadeghi, Distinguished Professor of Computer Science, the Technical University of Darmstadt, Germany.
Sunday, December 10, 2023, 12:00
- 13:00
Building 4, Level 5, Room 5220
Contact Person
The rapid growth of Artificial Intelligence (AI) and Deep Learning mirrors an infectious phenomenon. While AI systems promise diverse applications and benefits, they bear substantial security and privacy risks. Indeed, AI represents a goldmine for the security and privacy research domain.
RC3 Advisory Board
Tuesday, December 05, 2023, 08:30
- 12:30
Building 5, Level 5, Room 5220
Contact Person
Machine learning (ML) has witnessed remarkable advancements in recent years, demonstrating its effectiveness in a wide array of applications, including intrusion detection systems (IDS). However, when operating in adversarial environments, ML-based systems are susceptible to a range of attacks.
Prof. Marcus Völp, Head of the CritiX lab, the Interdisciplinary Centre for Security, Reliability and Trust (SnT), the University of Luxembourg.
Thursday, November 30, 2023, 15:30
- 16:30
Building 5, Level 5, Room 5209
Contact Person
Our society keeps entrusting ICT systems with high value cyber-only assets, such as our most sensitive data, finances, etc. However, when it comes to cyber-physical systems and their ability to act in and with the physical world, lifes are at risk and require rigorous protection against accidental faults and cyberattacks.
Nuno Neves, Professor at the Department of Computer Science, Faculty of Sciences, the University of Lisboa (FCUL), Portugal.
Thursday, November 23, 2023, 15:30
- 16:30
Building 5, Level 5, Room 5209
Contact Person
Federated Learning (FL) is a distributed machine learning approach that allows multiple parties to train a model collaboratively without sharing sensitive data.
Adrian Perrig, Professor, the Department of Computer Science, ETH Zürich, Switzerland
Monday, November 13, 2023, 11:30
- 12:30
Building 9, Level 2, Room 2325, Hall 2
Contact Person
Imagining a new Internet architecture enables us to explore new networking concepts without the constraints imposed by the current Infrastructure. In this presentation, we invite you to join us on our 14-year-long expedition of creating the SCION next-generation secure Internet architecture.
Josep Domingo-Ferrer, Distinguished Professor, Computer Science and an ICREA-Acadèmia, Research Professor, Universitat Rovira i Virgili, Tarragona, Catalonia.
Thursday, November 09, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Machine learning (ML) is vulnerable to security and privacy attacks. Whereas security attacks aim at preventing model convergence or forcing convergence to wrong models, privacy attacks attempt to disclose the data used to train the model.
Stefano Chessa, Professor, Department of Computer Science, the University of Pisa, Italy.
Thursday, November 02, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Internet of Things (IoT) applications can exploit energy harvesting systems to guarantee virtually uninterrupted operations. However, the use of energy harvesting poses issues concerning the optimization of the utility of the application while guaranteeing energy neutrality of the devices.
Davide Balzarotti, Professor and head of the Digital Security department, EURECOM, France.
Monday, October 30, 2023, 11:30
- 12:30
Building 9, Level 2, Room 2325, Hall 2
Contact Person
The risk of security breaches is now higher than ever, and attackers routinely break into corporate networks, government services, and even critical infrastructures. As a result, it is not a matter of `if' a system will be compromised, but only a matter of `when' -- thus making the way we handle computer incidents and investigations of paramount importance.
Eman Alashwali, Assistant Professor, the College of Computing and IT, King Abdulaziz University (KAU), KSA
Thursday, October 05, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
Security and privacy systems are often composed of complex components and details. However, users’ experience shouldn’t be as complex. In this seminar, Eman will discuss the human factor in the security and privacy chain. While human privacy perceptions and behaviors have been investigated in Western societies, little is known about these issues in non-Western societies.
Prof. Fatemah Alharbi, Assistant Professor, the Computer Science Department, Taibah University, Yanbu, KSA.
Thursday, May 25, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5220.
Contact Person
The Domain Name System (DNS) is a core protocol for the Internet. It resolves mappings between Internet Protocol (IP) addresses and their corresponding Fully Qualified Domain Names (FQDNs). Since all Internet communications rely on it, DNS structuring should therefore be resilient and robust against failure to avoid any service interruption. While the research community and experienced practitioners have established best practices to this end, many worldwide DNS implementations are still prone to many types of configuration errors. In this talk, I discuss the adoption of these approaches in some countries. Also, a case study is presented considering domains in Saudi Arabia (.sa) that illustrates the value of measuring the DNS at this scale. The results are valuable to improve the DNS infrastructure in the kingdom. Lastly, I provide recommendations to improve DNS service resilience and robustness.
N. Asokan, Professor of Computer Science, the University of Waterloo, a David R. Cheriton Chair, and the Executive Director of Waterloo Cybersecurity and Privacy Institute (CPI), Canada
Monday, May 08, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person
Marcello Cinque, Associate Professor, Computer Engineering, the University of Naples Federico Il, Italy.
Thursday, May 04, 2023, 15:30
- 16:30
Building 4, Level 5, Room 5209
Contact Person
In recent years we are witnessing the advent of service computing and cloud technologies in industrial applications, with intriguing innovations and novel compelling challenges. For instance, in the automotive, there are initiatives for consolidating Electronic Control Units (ECUs) as virtual machines on the same board. Or in the Industry 4.0 (I4.0), researchers and practitioners are dealing with the challenge of making the factory floor programmable by softwarizing hardware elements with edge-cloud native components. The talk will delve into this novel trend, discussing enabling virtualization technologies for industrial systems, including hypervisors, real-time container-based solutions, and software orchestration approaches.
Awais Rashid, Professor of Cybersecurity, the University of Bristol, Director of the EPSRC Centre for Doctoral Training in Trust, Identity, Privacy and Security in Large-Scale Infrastructures
Monday, April 03, 2023, 12:00
- 13:00
Building 9, Level 2, Room 2325 Hall 2.
Contact Person

This Distinguished Lecture is part of the CS Graduate Seminars.