<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 26 Apr 2026 06:51:57 -0400" url="https://beta.my.umbc.edu/groups/umbc-ai/posts.xml?tag=phd">
<NewsItem contentIssues="true" id="147948" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/147948">
<Title>UMBC PhD student recognized for research modeling hurricanes with machine learning</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Mechanical engineering Ph.D. student </span><span><a href="https://www.linkedin.com/in/badtanjil/" rel="nofollow external" class="bo">Md Badrul Hasan</a></span><span> received the </span><a href="https://www.aiaa.org/SciTech/call-for-content/call-for-papers/student-paper-competitions#fluid-dynamics" rel="nofollow external" class="bo"><span>2025 Professor Kirti “Karman” Ghia Memorial Award</span></a><span> from the American Institute of Aeronautics and Astronautics for his research modeling the fluid flow inside hurricanes with physics-informed machine learning. </span></p><p><span>The award recognizes an international graduate student in the U.S. who has developed an innovative approach to computational fluid dynamics, in which computers are used to analyze and predict how fluids flow, with applications in aerospace engineering, weather forecasting, and more. </span></p><p><span>Hasan and his UMBC mentors—</span><a href="https://me.umbc.edu/dr-meilin-yu/" rel="nofollow external" class="bo"><span>Meilin Yu</span></a><span>, mechanical engineering, and </span><a href="https://www.csee.umbc.edu/people/faculty/tim-oates/" rel="nofollow external" class="bo"><span>Tim Oates</span></a><span>, computer science and electrical engineering—looked at the layer of atmosphere in a hurricane that is directly above the ocean surface. Called the hurricane boundary layer, it is where turbulent flows bring heat and moisture from the water into the air, and it plays a crucial role in determining a hurricane’s intensity and track.</span></p><p><span>Hasan says he is grateful for the guidance of Professor Oates in selecting and understanding the machine learning models. “It was a great team effort between mechanical engineering and computer science—really productive and rewarding for both sides,” he says.</span></p><span>Read more about Hassan’s award in this </span><a href="https://umbc.edu/quick-posts/modeling-hurricanes-with-machine-learning/" rel="nofollow external" class="bo"><span>UMBC News post</span></a><span> by </span><a href="https://ucm.umbc.edu/our-team/person/xk56452/" rel="nofollow external" class="bo"><span>Catherine Meyers</span></a></span><div><br>
    <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a> </div></div>
]]>
</Body>
<Summary>Mechanical engineering Ph.D. student Md Badrul Hasan received the 2025 Professor Kirti “Karman” Ghia Memorial Award from the American Institute of Aeronautics and Astronautics for his research...</Summary>
<Website>https://umbc.edu/quick-posts/modeling-hurricanes-with-machine-learning/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147948/guest@my.umbc.edu/c67b7000ff4289871fdf68ba420a328b/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>award</Tag>
<Tag>machine-learning</Tag>
<Tag>oates</Tag>
<Tag>phd</Tag>
<Tag>student</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/xxlarge.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/xlarge.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/large.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/medium.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/small.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/xsmall.jpg?1741446945</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/948/c0a5ce753ef70f6ef7ee370b35dab1dd/xxsmall.jpg?1741446945</ThumbnailUrl>
<PawCount>8</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 08 Mar 2025 10:21:01 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="140158" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/140158">
<Title>PhD defense: Khondoker Murad Hossain, 3-5pm ET 3/26</Title>
<Tagline>Trojan (Backdoor) Attack Detection in Deep Neural Networks</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>Khondoker Murad Hossain will defend his Ph.D. dissertation on Tuesday, March 26, 2024 from 3:00-5:00pm ET <a href="https://meet.google.com/rbj-mnbv-cfs" rel="nofollow external" class="bo"><strong>online</strong></a>.</div><div><br></div><div><strong>Trojan (Backdoor) Attack Detection in Deep Neural Networks </strong></div><div><strong><br></strong></div><div><strong>Khondoker Murad Hossain</strong></div><div><strong>University of Maryland, Baltimore County</strong></div><div><br></div><div>Deep Neural Networks (DNNs) are increasingly being used in critical applications, which heightens the concern over their vulnerability to trojan attacks. As these networks become more widespread, malicious actors gain greater incentives and opportunities to implant trojans that can alter the behavior of trained models.  In this dissertation, we will discuss four distinct pipelines that have been developed for trojan detection across various scenarios.</div><div><br></div><div>First, we have developed two distinct pipelines using tensor decomposition algorithms IVA, MCCA, and PARAFAC2 for trojan (backdoor) detection in DNNs, focusing respectively on DNN activations and DNN weights. The first pipeline employs these tensor decomposition techniques to analyze the structure of activations from a few sample inputs, providing a versatile solution that can evaluate multiple models concurrently, accommodate a broad spectrum of network architectures, operate independently of trigger characteristics, and deliver exceptional computational efficiency. This method has been shown to surpass existing trojan detection algorithms in accuracy and efficiency, validated through rigorous testing on challenging datasets from the TrojAI competition, MNIST digits, and CIFAR-10 datasets. The second pipeline, innovatively applying the same tensor decomposition techniques, extracts features directly from the DNN model weights without necessitating training data. This approach is uniquely suited for both image classification and object detection models, marking a departure from traditional methods reliant on training data and preprocessing. By utilizing the frozen weights of DNNs for feature extraction, this method significantly enhances the accuracy and efficiency of detecting compromised models across both image classification and object detection datasets.</div><div><br></div><div>Second, we introduce a novel backdoor attack detection pipeline, detecting attacked models using graph convolutional networks (DeBUGCN). To the best of our knowledge, ours is the first use of GCNs for trojan detection. We use the static weights of a DNN's final fully connected (FC) layer in our pipeline where the FC layer and its weights are converted to graphs. The GCN is then used as a binary classifier yielding a trojan or clean determination for the CNN. To demonstrate the efficacy of our pipeline, we train hundreds of clean and trojaned CNN models on the MNIST handwritten digits dataset, and show the detection results using DeBUGCN.  Moreover, our pipeline is implemented on the TrojAI dataset with various CNN architectures showing the robustness and model-agnostic behavior of DeBUGCN. Furthermore, DeBUGCN exhibits comparable accuracy with lesser computation time when we compare our results with state-of-the-art trojan detection algorithms, thus ensuring safe and robust DNN models</div><div><br></div><div>Finally, we unveil a pioneering framework designed for the detection of trojans in individual neural network models, marking an unprecedented advancement in the field of AI security. This significant advancement addresses the challenge of detecting trojans in scenarios where we have access to only one model, sidestepping the traditional dependency on multiple models or large amounts of training data. Our unique detection framework represents an innovative first in the field, utilizing a two-step student-teacher knowledge distillation strategy. This approach effectively identifies and detects trojan behaviors by implementing a straightforward outlier detection method at the final stage. The effectiveness of this method has been extensively validated across a variety of contexts and challenges, including tests on major datasets such as MNIST, CIFAR-10, and CIFAR-100 with different triggers, and on real-world models like ResNet-32 and ResNet-50 sourced from Hugging Face. These comprehensive evaluations have confirmed the method's robustness, adaptability, and reliability in accurately detecting trojans under a wide range of conditions.</div><div><br></div><div><strong>Committee:</strong> Drs. Tim Oates (Chair), Anupam Joshi, Seung Jun Kim, James Foulds, and Naresh Sundaram Iyer</div></div>
]]>
</Body>
<Summary>Khondoker Murad Hossain will defend his Ph.D. dissertation on Tuesday, March 26, 2024 from 3:00-5:00pm ET online.     Trojan (Backdoor) Attack Detection in Deep Neural Networks      Khondoker...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/140158/guest@my.umbc.edu/87cf34e73040fb8fd630498f78173ebc/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>deep-neural-network</Tag>
<Tag>defense</Tag>
<Tag>dissertation</Tag>
<Tag>phd</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 25 Mar 2024 18:29:23 -0400</PostedAt>
<EditAt>Mon, 25 Mar 2024 18:30:02 -0400</EditAt>
</NewsItem>

</News>
