<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="2" pageSize="10" timestamp="Sat, 25 Apr 2026 21:32:54 -0400" url="https://beta.my.umbc.edu/groups/umbc-ai/posts.xml?tag=cybersecurity">
<NewsItem contentIssues="false" id="157527" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/157527">
<Title>AI and Security: International Cyber Security Center of Excellence online seminar</Title>
<Tagline>7:00-8:30 am ET, Thursday, March 19, 2026, via Zoom</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The <a href="https://my3.my.umbc.edu/groups/cybersecurity/posts/153294/a6c/5a859aec82c5165d3516cc5fcf9bc273/email/link?link=https%3A%2F%2Fincs-coe.org%2F" rel="nofollow external" class="bo"><strong>International Cyber Security Center of Excellence</strong></a> (INCS-CoE), of which UMBC is a charter member, will hold an online seminar to explore the intersection of AI, cybersecurity, and safety. It will be take place from 7:00-8:30 am ET on Thursday, March 19, 2026, via Zoom and consist of three short presentations, with time for questions after each.</div><div><ul><li><p><strong>AI and Cyber: The Twain Have Met</strong><strong><br></strong><a href="https://umbc.edu/stories/joshi-named-vice-provost-chief-ai-officer-at-umbc/" rel="nofollow external" class="bo">Prof. Anupam Joshi</a>, UMBC</p></li></ul><ul><li><p><strong>Video Deepfake Classification Using Evolving Deep Neural Networks</strong><strong><br></strong><a href="https://pure.royalholloway.ac.uk/en/persons/li-zhang/" rel="nofollow external" class="bo">Prof. Li Zhang</a>, Royal Holloway, University of London</p></li></ul><ul><li><p><strong>Beyond the Surface: How Post-Training Artifacts Shape LLM Diversity and Safety</strong><strong><br></strong><a href="https://coe.northeastern.edu/people/shi-weiyan/" rel="nofollow external" class="bo">Prof. Weiyan Shi</a>, Northeastern University</p></li></ul><a href="https://virginiatech.zoom.us/webinar/register/WN_ZUSfRsnMTZSc7EsYsLlJ3A" rel="nofollow external" class="bo"><strong>Register here</strong></a> to get a link to the online seminar.</div><div><br></div><div><a href="https://www.youtube.com/watch?v=HE5g7rvQkWc" rel="nofollow external" class="bo"><strong>Recorded video</strong></a> of the session.</div></div>
]]>
</Body>
<Summary>The International Cyber Security Center of Excellence (INCS-CoE), of which UMBC is a charter member, will hold an online seminar to explore the intersection of AI, cybersecurity, and safety. It...</Summary>
<Website>https://incs-coe.org/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/157527/guest@my.umbc.edu/a68f87c66e8295c75094599ce56391d3/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>deepfake</Tag>
<Tag>incs-coe</Tag>
<Tag>llm</Tag>
<Tag>safety</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xxlarge.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xlarge.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/large.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/medium.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/small.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xsmall.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xxsmall.jpg?1773756363</ThumbnailUrl>
<ThumbnailAltText>International Cyber Security Center of Excellence</ThumbnailAltText>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 17 Mar 2026 10:10:40 -0400</PostedAt>
<EditAt>Fri, 20 Mar 2026 11:54:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="155750" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/155750">
<Title>UMBC and UMB collaborate on Institute for Clinical and Translational Research projects</Title>
<Tagline>UMBC brings expertise &amp; resources for AI, ML, cybersecurity</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>UMBC is providing AI, machine learning, and cybersecurity experience, resources, and support to the University of Maryland, Baltimore (UMB) <a href="https://www.umaryland.edu/ictr/" rel="nofollow external" class="bo"><strong>Institute for Clinical and Translational Research</strong></a> (ICTR). In turn, UMBC faculty are eligible for many of the ICTR's existing programs and resources for UMB researchers engaged in clinical translational research.</p><p>The UMBC expertise and systems will help UMB researchers explore the use of AI and machine learning to identify patterns in data and make decisions with minimal human intervention. For researchers developing applications and devices to improve the delivery and exchange of health information, UMBC's cybersecurity expertise can help protect those devices, systems, and data from attack. Read more about the ICTR programs and UMBC's collaboration <a href="https://www.umaryland.edu/ictr/investigator-resources/ictr-informatics-core-services/umbc-cybersecurity-and-artificial-intelligence---umb-ictr-core/" rel="nofollow external" class="bo"><strong>here</strong></a> and <a href="https://research.umbc.edu/ictr_core/" rel="nofollow external" class="bo"><strong>here</strong></a>.</p></div>
]]>
</Body>
<Summary>UMBC is providing AI, machine learning, and cybersecurity experience, resources, and support to the University of Maryland, Baltimore (UMB) Institute for Clinical and Translational Research...</Summary>
<Website>https://www.umaryland.edu/ictr/investigator-resources/ictr-informatics-core-services/umbc-cybersecurity-and-artificial-intelligence---umb-ictr-core/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155750/guest@my.umbc.edu/3c0a9ad38927d4e25fd0d74cf48ae86a/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>ictr</Tag>
<Tag>machine-learning</Tag>
<Tag>umb</Tag>
<Tag>umbc</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 17 Jan 2026 11:25:37 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="155527" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/155527">
<Title>NIST Cybersecurity Framework for AI Workshop, register by Friday Jan. 9</Title>
<Tagline>Wednesday, January 14; in person 9-12pm or online 9-5pm</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>A recording of the hybrid session of this event is now available on the <a href="https://links-1.govdelivery.com/CL0/https:%2F%2Fwww.nccoe.nist.gov%2Fget-involved%2Fattend-events%2Fcyber-ai-workshop-2%2Fpost-event-materials/1/0100019c067a470c-8cc17216-c784-4db5-a6bb-ffd9051c33bb-000000/r_ZG5ag83NzOQGiaSLNle945yYIlTyJ21aTbtg9ncm4=442" rel="nofollow external" class="bo">NCCoE event page</a>.</p><p>Cybersecurity and AI are two of the most important research areas for information systems today. Join the NIST <a href="https://www.nccoe.nist.gov/" rel="nofollow external" class="bo"><strong>National Cybersecurity Center of Excellence</strong></a> (NCCoE) on January 14th, 2026, for a hybrid workshop to discuss the Preliminary Draft of the NIST <a href="https://www.nccoe.nist.gov/projects/cyber-ai-profile#project-promo" rel="nofollow external" class="bo">Cybersecurity Framework Profile for Artificial Intelligence</a> (Cyber AI Profile). </p><p><a href="https://events.nist.gov/profile/web/11743" rel="nofollow external" class="bo"><strong>Register now</strong></a> by Friday, January 9 to attend in-person (9-5) or virtually (9-12) to help shape the development of the NIST Cyber AI Profile. </p><p>Working with the cybersecurity and AI communities, the NIST NCCoE published a preliminary draft of the Cyber AI Profile to help organizations strategically adopt AI while addressing and prioritizing cybersecurity risks stemming from its advancements. The preliminary draft of the <a href="https://www.nccoe.nist.gov/projects/cyber-ai-profile" rel="nofollow external" class="bo">NIST Cyber AI Profile is available for public comment</a> through January 30, 2026.</p><p>This workshop will feature in-person and virtual presentations in the morning, followed by in-person only breakout sessions in the afternoon. The breakout sessions will allow in-person attendees to engage directly with the NIST Cyber AI Profile team and for in-depth discussion of the preliminary draft of the Profile. </p><p>This publication is a preliminary draft – and your feedback is crucial in shaping the next and final version of this publication.</p><p><a href="https://www.nccoe.nist.gov/get-involved/attend-events/cyber-ai-workshop-2" rel="nofollow external" class="bo"><strong>MORE INFORMATION</strong></a></p><p><a href="https://events.nist.gov/profile/web/index.cfm?PKwebID=0x11743abcd" rel="nofollow external" class="bo"><strong>REGISTER HERE</strong></a></p></div>
]]>
</Body>
<Summary>A recording of the hybrid session of this event is now available on the NCCoE event page.  Cybersecurity and AI are two of the most important research areas for information systems today. Join the...</Summary>
<Website>https://www.nccoe.nist.gov/get-involved/attend-events/cyber-ai-workshop-2</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/155527/guest@my.umbc.edu/93d4344360ba3bdbc9efcd309395e293/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>nist</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/xxlarge.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/xlarge.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/large.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/medium.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/small.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/xsmall.jpg?1767658378</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/155/527/f2b6761e86baeaa896cd0922afddc535/xxsmall.jpg?1767658378</ThumbnailUrl>
<ThumbnailAltText>NIST Cyber AI Workshop</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 05 Jan 2026 19:44:41 -0500</PostedAt>
<EditAt>Thu, 29 Jan 2026 08:33:20 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="153741" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/153741">
<Title>Privacy and Cybersecurity - AI Ethics Foundation for the Everyday User</Title>
<Tagline>video online from a talk by Ted Murphree</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><p>AI is becoming more embedded in our daily lives - making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about privacy and security. See a <a href="https://www.youtube.com/watch?v=GmG1xtL9ixg" rel="nofollow external" class="bo"><strong>video</strong></a> of a talk by Ted Murphree, Manager of Security and Privacy Compliance at an international law firm and adjunct professor at UMBC-Shady Grove, and  learn how everyday users can protect themselves from these risks.</p><p><br></p></div>
]]>
</Body>
<Summary>AI is becoming more embedded in our daily lives - making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about...</Summary>
<Website>https://www.youtube.com/watch?v=GmG1xtL9ixg</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/153741/guest@my.umbc.edu/6341262ca17c0fdb18cad05452d366e5/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>privacy</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/xxlarge.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/xlarge.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/large.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/medium.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/small.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/xsmall.jpg?1761053135</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/153/741/e22ada63c78c615dfd4a5f64f65b2e82/xxsmall.jpg?1761053135</ThumbnailUrl>
<ThumbnailAltText>talk on ai and cybersecurity</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 21 Oct 2025 09:41:06 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="152964" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/152964">
<Title>Podcast: Computer Science isn't All Code: Exploring Entrepreneurships</Title>
<Tagline>Interview with UMBC CS major Adam Baji</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>UMBC undergraduate <a href="https://www.linkedin.com/in/adambaji/" rel="nofollow external" class="bo"><strong>Adam Baji </strong></a>was interviewed by fellow student <a href="https://www.linkedin.com/in/judson-aso/" rel="nofollow external" class="bo"><strong>Judson Asomani</strong></a> in the latest UMBC Careers Unleashed Podcast episode, <a href="https://www.youtube.com/watch?v=va1tA9yxoUs" rel="nofollow external" class="bo"><strong>Computer Science isn't All Code: Exploring Entrepreneurships</strong></a>. Adam is a Computer Science major at UMBC with a strong interest in the intersection of AI, machine learning, and cybersecurity. He is also the Vice President of the <a href="https://my3.my.umbc.edu/groups/entrepreneurs" rel="nofollow external" class="bo">Entrepreneurs@UMBC</a> student organization.  </div><div><br></div><div>One of the projects he is developing <strong>Courselens</strong>, a  platform designed to help students make smarter class-registration decisions by providing data-driven insights into individual course sections, tailored recommendations, and tools to optimize academic performance and balance workloads for students to make informed scheduling decisions.</div><div><br></div><div> In this <a href="https://www.youtube.com/watch?v=va1tA9yxoUs" rel="nofollow external" class="bo"><strong>Careers Unleashed podcast episode</strong></a>, Adam shares his thoughts on AI controversies, the challenge of digital content authenticity, and what the AI–cybersecurity intersection means for the future.</div><div><br></div></div>
]]>
</Body>
<Summary>UMBC undergraduate Adam Baji was interviewed by fellow student Judson Asomani in the latest UMBC Careers Unleashed Podcast episode, Computer Science isn't All Code: Exploring Entrepreneurships....</Summary>
<Website>https://www.youtube.com/watch?v=va1tA9yxoUs</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/152964/guest@my.umbc.edu/ae7d5f34e872bbb0c8ec65562ad8b351/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>entrepreneurship</Tag>
<Tag>machine-learning</Tag>
<Tag>umbc</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Career Center</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/xxlarge.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/xlarge.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/large.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/medium.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/small.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/xsmall.jpg?1759089917</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/964/fe78aa98a591d5a94c57d03cfb4ab0f2/xxsmall.jpg?1759089917</ThumbnailUrl>
<ThumbnailAltText>podcast announcement</ThumbnailAltText>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 28 Sep 2025 16:47:18 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="152908" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/152908">
<Title>talk: Privacy and Cybersecurity&#8211;AI Ethics Foundation for the Everyday User</Title>
<Tagline>10-11am EDT Saturday, October 18, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content">AI is becoming more embedded in our daily lives—making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about privacy and security.  Join Ted Murphree, Manager of Security and Privacy Compliance at an international law firm and adjunct professor at UMBC-Shady Grove, to learn how everyday users can protect themselves from these risks.<div><br></div><div><p>Edward (Ted) Murphree is a seasoned cyber/privacy legal professional with over 20 years of experience in myriad legal and operational roles. Ted currently works as the Manager for Security and Privacy Compliance for a large international law firm, where he operationalizes risk management processes involving privacy, security, and AI.</p><p>In addition to his law degree, Ted holds a Ph.D. in Engineering Management with emphasis in information security and five information privacy certifications through ISACA, IAsecurity, and PP. Ted enjoys learning and has taught a course in Cybersecurity Law and Policy for UMBC-Shady Grove the last few years. His dual perspective in law and operations provides an additional layer of understanding to this continuously evolving field.</p><h4><strong>Get more information and register <a href="https://shadygrove.umbc.edu/event/privacy-and-cybersecurity-ai-ethics-foundation-for-the-everyday-user/" rel="nofollow external" class="bo"><strong>here</strong></a>.</strong></h4></div></div>
]]>
</Body>
<Summary>AI is becoming more embedded in our daily lives—making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about...</Summary>
<Website>https://shadygrove.umbc.edu/event/privacy-and-cybersecurity-ai-ethics-foundation-for-the-everyday-user/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/152908/guest@my.umbc.edu/8fd3ccdec93f9c43a921eb82a5b96c65/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Shady Grove</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xxlarge.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xlarge.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/large.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/medium.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/small.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xsmall.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xxsmall.jpg?1758819996</ThumbnailUrl>
<ThumbnailAltText>Privacy and Cybersecurity &#8211; AI Ethics Foundation for the Everyday User</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 25 Sep 2025 13:17:44 -0400</PostedAt>
<EditAt>Thu, 16 Oct 2025 12:09:15 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="148790" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/148790">
<Title>talk: Adaptive Domain Inference Attack with Concept Hierarchy 4/11</Title>
<Tagline>12-1pm EDT Friday, April 11, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><strong><span>Adaptive Domain Inference Attack with Concept Hierarchy</span></strong></h3><div><h4><strong><span><a href="https://www.csee.umbc.edu/keke-chen/" rel="nofollow external" class="bo">Professor Keke Chen</a>, CSEE, </span><span><span>UMBC</span></span></strong></h4><h4><span>12:00 noon–1pm </span><span>Friday,</span><span> April 11<span>, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></span></span></h4><p><span> </span><span>Joint work with</span><span> <a href="https://yue-chun.com/" rel="nofollow external" class="bo">Yuechun Gu</a> and </span><span><span><a href="https://www.linkedin.com/in/jiajie-he-672673243/" rel="nofollow external" class="bo">Jiajie He</a></span></span></p><p><span>To appear, 2015 Int. Conf. on Knowledge Discovery and Data Mining</span></p><p><span>With increasingly deployed deep neural networks in sensitive application domains, such as healthcare and security, it is essential to understand what kind of sensitive information can be inferred from these models. Most known model-targeted attacks assume attackers have learned the application domain or training data distribution to ensure successful attacks. Can removing the domain information from model APIs protect models from these attacks? Our work studies this critical problem. Unfortunately, even with minimal knowledge, i.e., accessing the model as an unnamed function without leaking the meaning of input and output, the proposed adaptive <em>domain inference (ADI)</em> attack can still successfully estimate relevant subsets of training data. We show that the extracted relevant data can significantly improve the performance of model-inversion attacks, for instance. Specifically, the ADI method uses the <em>concept hierarchy</em> extracted from the public and private datasets that the attacker can access, and it applies a novel algorithm to adaptively tune the likelihood of leaf concepts in the hierarchy showing up in the unseen training data. For comparison, we also designed a straightforward hypothesis-testing-based attack called LDI. Among all candidate methods, the ADI attack extracts partial training data at the concept level, converges fastest, and requires the fewest target-model accesses.</span></p><p><span><strong><a href="https://www.csee.umbc.edu/keke-chen/" rel="nofollow external" class="bo">Dr. Keke Chen</a></strong></span><span> is an associate professor in the UMBC CSEE Department. His recent research focuses on privacy and security issues with AI model training and deployment. He earned his PhD in computer science from Georgia Tech in 2006. Before joining UMBC, he was a Northwestern Mutual associate professor of computer science at Marquette University. </span></p><p><em><span>Support for this event was provided in part by the NSF under SFS grant </span></em><em><span>DGE-1753681<span>.</span></span></em></p></div>
    <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>Adaptive Domain Inference Attack with Concept Hierarchy   Professor Keke Chen, CSEE, UMBC  12:00 noon–1pm Friday, April 11, 2025 online   Joint work with Yuechun Gu and Jiajie He  To appear, 2015...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148790/guest@my.umbc.edu/9e106ae6a0cbfff305aab7e741edc334/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>inference</Tag>
<Tag>ontology</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 07 Apr 2025 16:52:34 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="146793" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/146793">
<Title>Talk: Do LLMs Exhibit Cybersecurity Misconceptions? 1/31 online</Title>
<Tagline>Evaluation of LLMs on Cybersecurity Concept Inventories</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4>Do LLMs Show Cybersecurity Misconceptions?<br></h4><h5>Evaluation of LLMs Performance on Cybersecurity Concept Inventories</h5><h5>Shan Huang, UIUC</h5><div><strong>Joint work with Jeffrey Herman and Alan Sherman, et al.</strong></div><div><strong>12:00–1pm ET Friday, Jan. 31, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></strong> </div><div><br></div><div>We evaluated the performance of five LLMs (Llama a, GPT-3.5-turbo, GPT-4, GPT-4O, and GPT-O1) on two cybersecurity concept inventories: <a href="https://dl.acm.org/doi/fullHtml/10.1145/3451346" rel="nofollow external" class="bo"><strong>Cybersecurity Concept Inventory</strong></a> (CCI) and <strong><a href="https://dl.acm.org/doi/10.1145/3545945.3569762" rel="nofollow external" class="bo">Cybersecurity Curriculum Assessment</a> </strong>(CCA). Using a zero-shot setting to minimize external influencing factors, we compared the performance of these LLMs with that of students previously studied, and we conducted a qualitative analysis of GPT-O1's output to examine if it exhibits misconceptions. Quantitative analysis reveals that, for the CCI and CCA, GPT-O1 significantly outperformed other models and students, correctly answering 92% of CCI and 72% of CCA test items. These results indicate GPT-O1’s strong proficiency in foundational topics (CCI) but reveal its limitations in addressing these concepts in more technically advanced scenarios (CCA). Qualitative analysis of GPT-O1’s reasoning patterns uncovered instances of insightful reasoning but also highlighted ways in which GPT-O1's answers reflect persistent student mistakes, such as biases, overgeneralizations, and logical inconsistencies. This work highlights the significant potential of GPT-O1 as a tool for introductory cybersecurity education in its ability to provide detailed explanations and structured reasoning for novice learners.</div><div><br></div><div><strong><a href="https://www.linkedin.com/in/shan-huang-262041193/" rel="nofollow external" class="bo">Shan Huang</a> </strong>is a Ph.D. candidate in Computer Science at the University of Illinois Urbana-Champaign. She is broadly interested in how educational games can improve student learning. Current work includes improving student learning in cybersecurity with educational games and accessing student knowledge of cybersecurity concepts. Shan is also involved in various educational data mining projects.</div><div><br></div><hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>Do LLMs Show Cybersecurity Misconceptions?   Evaluation of LLMs Performance on Cybersecurity Concept Inventories  Shan Huang, UIUC  Joint work with Jeffrey Herman and Alan Sherman, et al....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146793/guest@my.umbc.edu/1ca42e886baeb4a9edbebb1da8e736fc/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cca</Tag>
<Tag>cci</Tag>
<Tag>cybersecurity</Tag>
<Tag>llm</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/xxlarge.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/xlarge.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/large.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/medium.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/small.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/xsmall.jpg?1738081136</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/793/f8af6870dd1080f5b47500ad019d548b/xxsmall.jpg?1738081136</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 28 Jan 2025 11:53:43 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="146680" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/146680">
<Title>Talk: Securing Networks with Reinforcement Learning &amp; Game Theory</Title>
<Tagline>10-11am Thursday, Jan. 30, 2025; ITE459 and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h4><span>Securing Distributed Networks: Leveraging Reinforcement Learning and Game Theory for Attack Detection and Mitigation</span></h4><h4><a href="https://ischool.syracuse.edu/md-tariqul-islam-pavel/#Biography" rel="nofollow external" class="bo"><span><strong>Dr. Md Tariqul Islam</strong></span></a><span>, Syracuse University</span></h4><h4><span>10-11am January 30, 2025;  ITE 459, UMBC and </span><a href="https://umbc.webex.com/umbc/j.php?MTID=m47153e19db08254c1e0d30e43cad1b24" rel="nofollow external" class="bo"><span>online</span></a></h4><p><br></p><p><span><a href="https://en.wikipedia.org/wiki/Reinforcement_learning" rel="nofollow external" class="bo"><strong>Reinforcement learning</strong></a> (RL) has demonstrated remarkable success across diverse domains, from mastering complex games to optimizing real-time feedback systems in robotics and industrial control. However, its potential in cybersecurity, particularly for autonomous attack detection and mitigation in distributed systems, remains largely underexplored. Traditional single-agent RL approaches struggle in decentralized environments where multiple entities make independent decisions, necessitating <a href="https://en.wikipedia.org/wiki/Multi-agent_reinforcement_learning" rel="nofollow external" class="bo"><strong>multi-agent reinforcement learning</strong></a> (MARL). Our research explores blockchain networks as an ideal test case due to their decentralized architecture and trustless consensus mechanisms. We developed a novel MARL-based consensus mechanism for Proof-of-Stake blockchains, enabling nodes to collaboratively identify and penalize malicious behavior while preserving decentralization. This approach </span><span>effectively mitigated six major blockchain attack types with minimal computational overhead. Building on these results, we propose integrating game-theoretic principles into the MARL framework to model adversarial strategies and enhance system resilience. The synergy between reinforcement learning and game theory establishes a robust foundation for dynamic and adaptive security in distributed systems, effectively addressing current vulnerabilities while anticipating and countering future threats. This integrated approach enables the design of resilient, scalable defense mechanisms tailored to the complex dynamics of decentralized architectures.</span></p><p><span><br></span></p><a href="https://ischool.syracuse.edu/md-tariqul-islam-pavel/#Biography" rel="nofollow external" class="bo"><span><strong>Dr. Md Tariqul Islam</strong></span></a><span> is an Assistant Professor of Trustworthy Cyberspace in the School of Information Studies (iSchool) at Syracuse University. His research focuses on advancing the security, efficiency, and fault tolerance of networks and distributed systems, particularly in the domains of cloud and blockchain technologies.</span></span><div><span><br></span><hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a> </div></div>
]]>
</Body>
<Summary>Securing Distributed Networks: Leveraging Reinforcement Learning and Game Theory for Attack Detection and Mitigation  Dr. Md Tariqul Islam, Syracuse University  10-11am January 30, 2025;  ITE 459,...</Summary>
<Website>https://informationsystems.umbc.edu/home/calendar/events/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146680/guest@my.umbc.edu/bf62a2f97b078a9fbd21ce8220294317/api/pixel</TrackingUrl>
<Tag>agent</Tag>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>game-theory</Tag>
<Tag>machine-learning</Tag>
<Tag>multiagent</Tag>
<Tag>reinforcement-learning</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 23 Jan 2025 10:32:43 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="143474" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/143474">
<Title>talk: Cyber4All: Innovating Cybersecurity Education through Design Science and AI</Title>
<Tagline>12-1pm EDT Friday, September 11, 2024, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><span>The UMBC Cyber Defense Lab</span></a></p><h3><span>Cyber4All: Innovating Cybersecurity Education </span><span>Through Design Science and AI</span></h3><h4><strong><span>Blair Taylor and Paige Zaleppa, </span><span>Towson University</span></strong></h4><h4><strong><span>12–1pm, Friday, September 6, 2024 via </span><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><span>WebEx</span></a></strong></h4><p><a href="https://clark.center/home" rel="nofollow external" class="bo"><span><strong>CLARK</strong></span></a><span> is a digital repository aimed at advancing cybersecurity education by delivering high-quality curriculum resources to educators throughout the United States. We will explore the design science methodology that guided its development, emphasizing how these principles maintain the repository’s usability and relevance for users. Additionally, the presentation will address the integration of artificial intelligence into CLARK and how its extensive dataset of curriculum content has facilitated this process. Attendees will learn how CLARK meets the changing demands of cybersecurity education and contributes to shaping the next generation of cyber professionals.</span></p><p><a href="https://www.towson.edu/fcsm/departments/computerinfosci/facultystaff/btaylor.html" rel="nofollow external" class="bo"><span><strong>Dr. Blair Taylor</strong></span></a><span> is the Director of the</span><a href="https://www.towson.edu/provost/initiatives/center-cybersecurity/" rel="nofollow external" class="bo"><span> <strong>Center for Interdisciplinary and Innovation Cybersecurity</strong></span></a><span> (Cyber4All) and a Professor in the Department of Computer and Information Sciences at Towson University. She is a national expert in cybersecurity education and curriculum development. She worked with NSA’s College of Cyber as a subject matter expert on long-term strategies to increase the pipeline of qualified students and build the nation’s cyber workforce.</span></p><p><a href="mailto:pzaleppa@towson.edu" rel="nofollow external" class="bo"><span><strong>Paige Zaleppa</strong></span></a><span> is a Ph.D. student in Information Technology at Towson University, where she is studying the intersection of cybersecurity education and artificial intelligence. She has led the development of the CLARK project since late 2019 and has been an adjunct faculty member at Towson University since 2021. She is passionate about connecting educators and students with educational resources that can be utilized to create the next generation of cyber heroes.</span></p><p><span>Support for this event was provided in part by NSF under SFS grant DGE-1753681. The <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly, Fridays 12-1pm.  All meetings are open to the public.</span></p></span> <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab  Cyber4All: Innovating Cybersecurity Education Through Design Science and AI  Blair Taylor and Paige Zaleppa, Towson University  12–1pm, Friday, September 6, 2024 via...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/143474/guest@my.umbc.edu/e15d9bda3d543e4243f98cad277e7e07/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>artificial-intelligence</Tag>
<Tag>cybersecurity</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 29 Aug 2024 17:32:09 -0400</PostedAt>
<EditAt>Thu, 29 Aug 2024 17:41:56 -0400</EditAt>
</NewsItem>

</News>
