<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Sun, 26 Apr 2026 16:23:05 -0400" url="https://beta.my.umbc.edu/groups/umbc-ai/posts.xml?tag=security">
<NewsItem contentIssues="false" id="157527" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/157527">
<Title>AI and Security: International Cyber Security Center of Excellence online seminar</Title>
<Tagline>7:00-8:30 am ET, Thursday, March 19, 2026, via Zoom</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>The <a href="https://my3.my.umbc.edu/groups/cybersecurity/posts/153294/a6c/5a859aec82c5165d3516cc5fcf9bc273/email/link?link=https%3A%2F%2Fincs-coe.org%2F" rel="nofollow external" class="bo"><strong>International Cyber Security Center of Excellence</strong></a> (INCS-CoE), of which UMBC is a charter member, will hold an online seminar to explore the intersection of AI, cybersecurity, and safety. It will be take place from 7:00-8:30 am ET on Thursday, March 19, 2026, via Zoom and consist of three short presentations, with time for questions after each.</div><div><ul><li><p><strong>AI and Cyber: The Twain Have Met</strong><strong><br></strong><a href="https://umbc.edu/stories/joshi-named-vice-provost-chief-ai-officer-at-umbc/" rel="nofollow external" class="bo">Prof. Anupam Joshi</a>, UMBC</p></li></ul><ul><li><p><strong>Video Deepfake Classification Using Evolving Deep Neural Networks</strong><strong><br></strong><a href="https://pure.royalholloway.ac.uk/en/persons/li-zhang/" rel="nofollow external" class="bo">Prof. Li Zhang</a>, Royal Holloway, University of London</p></li></ul><ul><li><p><strong>Beyond the Surface: How Post-Training Artifacts Shape LLM Diversity and Safety</strong><strong><br></strong><a href="https://coe.northeastern.edu/people/shi-weiyan/" rel="nofollow external" class="bo">Prof. Weiyan Shi</a>, Northeastern University</p></li></ul><a href="https://virginiatech.zoom.us/webinar/register/WN_ZUSfRsnMTZSc7EsYsLlJ3A" rel="nofollow external" class="bo"><strong>Register here</strong></a> to get a link to the online seminar.</div><div><br></div><div><a href="https://www.youtube.com/watch?v=HE5g7rvQkWc" rel="nofollow external" class="bo"><strong>Recorded video</strong></a> of the session.</div></div>
]]>
</Body>
<Summary>The International Cyber Security Center of Excellence (INCS-CoE), of which UMBC is a charter member, will hold an online seminar to explore the intersection of AI, cybersecurity, and safety. It...</Summary>
<Website>https://incs-coe.org/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/157527/guest@my.umbc.edu/a68f87c66e8295c75094599ce56391d3/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>deepfake</Tag>
<Tag>incs-coe</Tag>
<Tag>llm</Tag>
<Tag>safety</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xxlarge.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xlarge.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/large.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/medium.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/small.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xsmall.jpg?1773756363</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/157/527/59b26ba0019013ab9877e6e6a67f2356/xxsmall.jpg?1773756363</ThumbnailUrl>
<ThumbnailAltText>International Cyber Security Center of Excellence</ThumbnailAltText>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 17 Mar 2026 10:10:40 -0400</PostedAt>
<EditAt>Fri, 20 Mar 2026 11:54:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="154923" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/154923">
<Title>Talk: Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory, 12/3</Title>
<Tagline>12-1pm ET Wednesday, Dec. 3 in UMBC iITE 459 and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h5><strong>Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory</strong></h5><p><a href="https://paveltariq.com/" rel="nofollow external" class="bo"><strong>Md Tariqul Islam 'Pavel'</strong></a><br>Assistant Professor of Cybersecurity<br>UMBC Department of Information Systems</p><p>12–1pm ET, Wednesday, December 3, 2025<br>UMBC ITE 459 and online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>Webex</strong></a></p><p><a href="https://en.wikipedia.org/wiki/Distributed_ledger" rel="nofollow external" class="bo"><strong>Distributed ledger technologies</strong></a> (DLTs) continue to face significant security challenges. While attackers constantly adapt their strategies, governance mechanisms often remain static. Our work addresses this critical gap by introducing a framework for self-defending ledgers, where nodes enforce ledger security through adaptive governance driven by<strong> <a href="https://en.wikipedia.org/wiki/Multi-agent_reinforcement_learning" rel="nofollow external" class="bo"><strong>multi-agent reinforcement learning</strong> </a></strong>(MARL) grounded in game-theoretic principles. We model DLT consensus as a repeated Bayesian game, in which participants hold probabilistic beliefs about peer behavior, allowing agents to make strategic decisions under partial observability of adversarial actions. Our framework enables nodes to model, detect, and respond to a wide range of malicious behaviors, including bribery, selfish mining, equivocation, Sybil attacks, and collusive voting, by continuously updating Bayesian trust beliefs and governance policies based on network observations. We formally prove that networks with an honest majority reach stable equilibria and provide bounds on adversarial influence. Experiments across five major protocols show that agents effectively identify attacks with high accuracy while substantially reducing adversarial success. This work demonstrates the potential of game-theoretic MARL to provide robust, self-adaptive security in varied DLT environments, paving the way for resilient and autonomous ledger governance.</p><p><a href="https://paveltariq.com/" rel="nofollow external" class="bo"><strong>Md Tariqul Islam 'Pavel'</strong></a> is an assistant professor of cybersecurity in UMBC's Department of Information Systems. His research centers on the security, efficiency, and fault-tolerance of distributed computing systems, with a strong emphasis on blockchain, cloud, and vehicular networks. He develops formal models, algorithms, and protocols that address critical vulnerabilities in decentralized ecosystems, spanning inter-blockchain communication, smart contract migration, and trustworthy governance. His work combines cryptography, game theory, and system design to build scalable, resilient infrastructures. He earned his PhD and MS from the University of Kentucky and BS from the University of Dhaka, Bangladesh.</p></div>
]]>
</Body>
<Summary>Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory  Md Tariqul Islam 'Pavel' Assistant Professor of Cybersecurity UMBC...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/154923/guest@my.umbc.edu/ad9c9a40fe2dbade50fd23a5526a49bc/api/pixel</TrackingUrl>
<Tag>agent</Tag>
<Tag>ai</Tag>
<Tag>distributed-ledger</Tag>
<Tag>multi-agent</Tag>
<Tag>reinforcement</Tag>
<Tag>security</Tag>
<Tag>talk</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/xxlarge.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/xlarge.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/large.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/medium.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/small.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/xsmall.jpg?1764613031</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/154/923/957b18759a71704bb5fccbbaa7841be1/xxsmall.jpg?1764613031</ThumbnailUrl>
<ThumbnailAltText>Self-Defending Ledgers: Automating Distributed Ledger Security Using Multi-Agent Reinforcement Learning and Game Theory</ThumbnailAltText>
<PawCount>2</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 01 Dec 2025 13:28:41 -0500</PostedAt>
<EditAt>Mon, 01 Dec 2025 14:16:04 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="152908" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/152908">
<Title>talk: Privacy and Cybersecurity&#8211;AI Ethics Foundation for the Everyday User</Title>
<Tagline>10-11am EDT Saturday, October 18, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content">AI is becoming more embedded in our daily lives—making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about privacy and security.  Join Ted Murphree, Manager of Security and Privacy Compliance at an international law firm and adjunct professor at UMBC-Shady Grove, to learn how everyday users can protect themselves from these risks.<div><br></div><div><p>Edward (Ted) Murphree is a seasoned cyber/privacy legal professional with over 20 years of experience in myriad legal and operational roles. Ted currently works as the Manager for Security and Privacy Compliance for a large international law firm, where he operationalizes risk management processes involving privacy, security, and AI.</p><p>In addition to his law degree, Ted holds a Ph.D. in Engineering Management with emphasis in information security and five information privacy certifications through ISACA, IAsecurity, and PP. Ted enjoys learning and has taught a course in Cybersecurity Law and Policy for UMBC-Shady Grove the last few years. His dual perspective in law and operations provides an additional layer of understanding to this continuously evolving field.</p><h4><strong>Get more information and register <a href="https://shadygrove.umbc.edu/event/privacy-and-cybersecurity-ai-ethics-foundation-for-the-everyday-user/" rel="nofollow external" class="bo"><strong>here</strong></a>.</strong></h4></div></div>
]]>
</Body>
<Summary>AI is becoming more embedded in our daily lives—making everyday tasks easier and improving how we track and manage our health. But as these technologies grow more powerful, so do concerns about...</Summary>
<Website>https://shadygrove.umbc.edu/event/privacy-and-cybersecurity-ai-ethics-foundation-for-the-everyday-user/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/152908/guest@my.umbc.edu/8fd3ccdec93f9c43a921eb82a5b96c65/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Shady Grove</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xxlarge.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xlarge.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/large.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/medium.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/small.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xsmall.jpg?1758819996</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/908/bf46fab320110a2b9e4890025199c1d3/xxsmall.jpg?1758819996</ThumbnailUrl>
<ThumbnailAltText>Privacy and Cybersecurity &#8211; AI Ethics Foundation for the Everyday User</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 25 Sep 2025 13:17:44 -0400</PostedAt>
<EditAt>Thu, 16 Oct 2025 12:09:15 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="152032" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/152032">
<Title>Talk: Existing Risks of Generative AI and Surveying Public Perceptions</Title>
<Tagline>online 11-12 EDT Fri. Sept 5 by CWIT Alum Wendy Bickersteth</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>UMBC <a href="https://cwit.umbc.edu/" rel="nofollow external" class="bo">CWIT</a> alumna <a href="https://www.linkedin.com/in/wendy-bickersteth-15b374219/" rel="nofollow external" class="bo">Wendy Bickersteth</a> will give an online talk on </span><span>Existing Risks of Generative AI and Surveying Public Perceptions </span><span>on Friday, September 5, 2025, from 11am-12pm EDT. </span><span>She is currently a Societal Computing PhD student at the Carnegie Mellon University </span><a href="https://www.cylab.cmu.edu/" rel="nofollow external" class="bo"><span>CyLab Security and Privacy Institute</span></a><span>.</span></p><p><span>Working with Dr. Lorrie Cranor, she conducts research on usable privacy and security, focusing on privacy labels and the use of AI. Read more about this work in this recent </span><a href="https://arxiv.org/abs/2505.22073" rel="nofollow external" class="bo"><span>paper</span></a><span>.</span></p><p><span>Join the online event via this </span><a href="https://my3.my.umbc.edu/groups/cwitaffiliates/events/145564/join_meeting" rel="nofollow external" class="bo"><span>WebEx link</span></a><span>.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>UMBC CWIT alumna Wendy Bickersteth will give an online talk on Existing Risks of Generative AI and Surveying Public Perceptions on Friday, September 5, 2025, from 11am-12pm EDT. She is currently a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/152032/guest@my.umbc.edu/589e8ee69a1f8c2ab61da78072e1b7ea/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>privacy</Tag>
<Tag>risk</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/xxlarge.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/xlarge.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/large.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/medium.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/small.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/xsmall.jpg?1756991147</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/152/032/db5e90221899158f8077ab439daf4106/xxsmall.jpg?1756991147</ThumbnailUrl>
<ThumbnailAltText>Wendy Bickersteth give talk.</ThumbnailAltText>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 04 Sep 2025 09:16:48 -0400</PostedAt>
<EditAt>Thu, 04 Sep 2025 09:22:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="148404" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/148404">
<Title>Talk: Privacy and Security Analysis of myUMBC's AI Answers, 3/28</Title>
<Tagline>12-1pm ET Friday, March 28, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3>A Privacy and Security Analysis of myUMBC's AI Answers: UMBC SFS Scholar Winter Study 2025</h3><div><br></div><h4><a href="https://damslabumbc.github.io/author/christian-badolato/" rel="nofollow external" class="bo">Christian Badolato<br></a>12–1pm Friday, March 28, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></h4><div><br></div><div><a href="https://en.wikipedia.org/wiki/Generative_artificial_intelligence" rel="nofollow external" class="bo"><strong>Generative AI</strong></a> has the potential to improve user search experiences by supporting natural language querying and providing more detailed and domain-specific responses. UMBC is seeking to provide this convenience to myUMBC users through the <a href="https://my3.my.umbc.edu/groups/doit/posts/147188" rel="nofollow external" class="bo"><strong>myUMBC Answers</strong></a> system, which enables users to access both personal and UMBC services information from the myUMBC search bar. In this talk, we investigate the resiliency of Answers against several common generative AI attacks that were performed by the UMBC Scholarship for Service (SFS) scholars in collaboration with other students and the UMBC Division of Information Technology (DoIT). We first provide an overview of the study and the myUMBC Answers system before discussing the types of attacks which were launched against the system. We then explore the behavior of the Answers system in response to these attacks. Finally, we outline the recommendations provided to DoIT by the study participants to improve the security and user experience of myUMBC Answers.</div><div><br></div><div><a href="null" rel="nofollow external" class="bo"><strong>Christian Badolato</strong></a> is a PhD student working with Professor <a href="https://robertoyus.com/" rel="nofollow external" class="bo"><strong>Roberto Yus</strong></a> focusing on data privacy in the Internet of Things at UMBC after having received his master’s degree from the same university. He has several years of experience as a software architect and is a Certified Information Systems Security Professional.</div><div><br></div><div>Support for this <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cyber Defense Lab</strong></a> event was provided in part by NSF under SFS grant DGE-1753681.</div><div><br></div>
    
    <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>A Privacy and Security Analysis of myUMBC's AI Answers: UMBC SFS Scholar Winter Study 2025     Christian Badolato 12–1pm Friday, March 28, 2025 online     Generative AI has the potential to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148404/guest@my.umbc.edu/e555069cae91aa516eacb20a06794466/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Tag>umbc</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/xxlarge.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/xlarge.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/large.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/medium.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/small.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/xsmall.jpg?1743122783</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/404/5674ab159589d1e24eea700a35c3d8d1/xxsmall.jpg?1743122783</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 27 Mar 2025 20:47:20 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="146044" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/146044">
<Title>AI Lunchbox: Security Risk in AI/ML, 12/12</Title>
<Tagline>12:00-1:00 pm EST, Thursday, December 12, 2024</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In the AI Lunchbox session </span><span><strong>Security Risk in AI/ML</strong></span><span>, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach participants how to incorporate AI security risk into their organizational strategy and AI development workflows. </span><a href="https://www.linkedin.com/in/randyabernethy/" rel="nofollow external" class="bo"><span>Randy Abernethy</span></a><span> from </span><a href="https://rx-m.com/" rel="nofollow external" class="bo"><span>RX-M, LLC</span></a><span> will be a speaker.</span></div><div><span><br></span></div><div><span><p><span><span>The session will be held online from 12 to 1 p.m. EST on December 12, 2024. Register <a href="https://c4ai.umbctraining.com/event/security-risk-in-ai-ml/" rel="nofollow external" class="bo"><strong>here</strong></a> to receive a link to the</span><span> event from the UMBC Training Centers </span><a href="https://c4ai.umbctraining.com/" rel="nofollow external" class="bo"><span>Center for Applied AI</span></a><span>.</span></span></p></span></div>
    <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>In the AI Lunchbox session Security Risk in AI/ML, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach...</Summary>
<Website>https://c4ai.umbctraining.com/event/security-risk-in-ai-ml/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146044/guest@my.umbc.edu/087ef1fcf91d8453c6a6ee4e7c258f09/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>c4ai</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/xxlarge.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/xlarge.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/large.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/medium.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/small.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/xsmall.jpg?1733348525</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/044/458f2dc81e02222f34a3a2feb6f85c9c/xxsmall.jpg?1733348525</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 04 Dec 2024 09:55:09 -0500</PostedAt>
<EditAt>Wed, 04 Dec 2024 16:57:39 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="144637" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/144637">
<Title>Talk: Trust but verify, building production ready Gen AI applications</Title>
<Tagline>1-2pm EDT, Thur 10 Oct 2024, UMBC ITE 325b &amp; online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><h3><strong><span>Trust but verify, building production ready Gen AI applications</span></strong></h3><h4><strong><a href="https://my3.my.umbc.edu/groups/umbc-ai/posts/144637/2668/d61b3558aa5a22f13d6bce4888b8b1ff/web/link?link=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fanupamdatta%2F" rel="nofollow external" class="bo">Dr. Anupam Datta,</a> Co-Head of Snowflake AI Research</strong></h4><h4><strong><br></strong><strong><span>1-2pm EDT, Thur. 10 Oct. 2024, ITE 325b, <a href="https://umbc.webex.com/umbc/j.php?MTID=m2292130a5fac70c2541905be14a7ae18" rel="nofollow external" class="bo">online via WebEx</a></span></strong></h4><div>We have seen a tremendous surge of interest in enterprises for generative AI applications – from chatbots and summarization to agents and multi-modal apps. Yet most of these apps remain in the prototype and experimentational stage. To move apps into production and keep them there, it is critical to make them efficient and to address common failure modes  – hallucinations, retrieval failures, safety issues such as toxicity and bias and more, all while providing robust governance.</div><div><br>In this talk, we will share learnings from building and maintaining production-grade apps. Using two concrete examples – <strong><a href="https://docs.snowflake.com/en/user-guide/snowflake-cortex/cortex-search/cortex-search-overview" rel="nofollow external" class="bo">Cortex Search</a></strong> (which incorporates hybrid search to power question-answering over unstructured data) and <strong><a href="https://docs.snowflake.com/en/user-guide/snowflake-cortex/cortex-analyst" rel="nofollow external" class="bo">Cortex Analyst</a></strong> (which enables business users to talk to their structured data with SOTA accuracy) – we will examine key design patterns to build efficient and trusted generative AI apps. Building on <strong><a href="https://www.trulens.org/" rel="nofollow external" class="bo">TruLens</a></strong>, our open source project, we will also present a methodology for evaluating, experimenting, and monitoring generative AI apps that enables developers to measure app quality, identify and debug failure modes, and build the trust that’s needed to move apps into production and keep them there. Specifically, we will discuss evaluation methodologies based on the RAG Triad -- context relevance, groundedness, and answer relevance -- that can surface flaws in LLM apps and guide iteration to improve them. We will also show how this can be done practically using our open source framework, TruLens, leveraging both LLMs-as-a-judge and smaller, custom models that scale better to production monitoring workloads.</div><div><strong><br></strong></div><div><strong><a href="https://www.linkedin.com/in/anupamdatta/" rel="nofollow external" class="bo">Anupam Datta</a> </strong>is Co-Head of <strong><a href="https://www.snowflake.com/en/data-cloud/workloads/ai-ml/ai-research/" rel="nofollow external" class="bo">Snowflake AI Research</a></strong>. He joined Snowflake as part of the acquisition of TruEra where he served as Co-Founder, President, and Chief Scientist from 2019-2024. Datta was on the faculty at Carnegie Mellon University from 2007-2022, most recently as a tenured Professor of Electrical &amp; Computer Engineering and Computer Science. Datta's current research focuses on Trustworthy AI and includes pioneering work on evaluation, explainability, fairness, and adversarial robustness of ML models and GenAI applications. His research has also had significant product impact at TruEra and Snowflake. Datta served as Chair of the National Academies Workshop on Assessing and Improving AI Trustworthiness, on the Steering Committee of of the ACM Conference on Fairness, Accountability, and Transparency, and the IEEE Computer Security Foundations Symposium, and as an Editor-in-Chief of Foundations and Trends in Privacy and Security. He obtained a B.Tech. from IIT Kharagpur, and Ph.D. and M.S. degrees from Stanford University, all in Computer Science. </div></div><div><br></div><div><strong>Host:</strong> Dr. Richard Forno (<a href="mailto:rforno@umbc.edu" rel="nofollow external" class="bo">rforno@umbc.edu</a>)</div> <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>Trust but verify, building production ready Gen AI applications  Dr. Anupam Datta, Co-Head of Snowflake AI Research   1-2pm EDT, Thur. 10 Oct. 2024, ITE 325b, online via WebEx  We have seen a...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/144637/guest@my.umbc.edu/350bd2257a1b7ccbcfff2cf906dd55ed/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>genai</Tag>
<Tag>llm</Tag>
<Tag>security</Tag>
<Tag>trust</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/xxlarge.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/xlarge.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/large.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/medium.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/small.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/xsmall.jpg?1728489026</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/144/637/7e39dacb738dc58571ffdbe007f3c5df/xxsmall.jpg?1728489026</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Oct 2024 11:51:26 -0400</PostedAt>
<EditAt>Thu, 10 Oct 2024 09:23:23 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="142670" important="false" status="posted" url="https://beta.my.umbc.edu/groups/umbc-ai/posts/142670">
<Title>Talk: Networked Systems and Security in the age of AI</Title>
<Tagline>IEEE Systems Council Distinguished Lecture, 9am ET July 17</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div><br></div><div>UMBC Professor <strong><a href="https://informationsystems.umbc.edu/home/faculty-and-staff/new-faculty-spotlights/houbing-herbert-song/" rel="nofollow external" class="bo">Houbing Song</a> </strong>will give an online distinguished lecture on <strong>Networked Systems and Security Research in the Age of AI/Machine Learning</strong> at 9:00am ET on Wednesday, 17 July 2024, sponsored by the I<a href="https://ieeesystemscouncil.org/" rel="nofollow external" class="bo">EEE Systems Council</a>. <strong><a href="https://us02web.zoom.us/webinar/register/WN_jA9WLDvjRNiGHmVxSneXbA#/registration" rel="nofollow external" class="bo">Register here.</a></strong> </div><div><br></div><div>Networked systems have created new opportunities with major societal implications. At the same time, security has emerged as one of the most important socio-technical challenges confronting society. AI/machine learning (ML) techniques are expected to enable networked systems and enhance security. In this talk, I will present my recent research on networked systems and security in the age of AI/ML. First, I will introduce my ML-enabled Counter Unmanned Aircraft System(s) (C-UAS) technology that detects and safely neutralizes rogue drones without destroying them or causing them to crash. This research has been featured by 100+ news media outlets. Next I will present my follow-up research on real-time ML for quickest event (threat/intrusion/vulnerability) detection. Then I will introduce my research on data-efficient ML, particularly distant domain transfer learning.</div></div><div><br></div><hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>UMBC Professor Houbing Song will give an online distinguished lecture on Networked Systems and Security Research in the Age of AI/Machine Learning at 9:00am ET on Wednesday, 17 July 2024,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/142670/guest@my.umbc.edu/266bea41e5c5df2abf3ab03972943581/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>ieee</Tag>
<Tag>ml</Tag>
<Tag>networks</Tag>
<Tag>security</Tag>
<Group token="umbc-ai">UMBC AI</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/umbc-ai</GroupUrl>
<AvatarUrl>https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="original">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
<AvatarUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
<Sponsor>UMBC AI</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/xxlarge.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/xlarge.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/large.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/medium.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/small.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/xsmall.jpg?1720384655</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/142/670/cd1ecce9302015fedf43e56232a4c902/xxsmall.jpg?1720384655</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 07 Jul 2024 16:48:30 -0400</PostedAt>
</NewsItem>

</News>
