<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Mon, 20 Apr 2026 01:42:33 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?tag=phd">
  <NewsItem contentIssues="true" id="134461" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/134461">
    <Title>PhD defense: Michael Tope, 2-4pm 8/16, ITE325</Title>
    <Body>
      <![CDATA[
          <div class="html-content"><span><h5><span>Ph.D. Dissertation Defense</span></h5><br><h4><span>Near Optimal Sampling to Discover and Bound the Communication Rate of a Discrete Memoryless Channel</span></h4><h4><span>Michael Tope</span></h4><br><p><span><strong>Date</strong></span><span><strong>: </strong>August 16, 2023 at 2:00pm -- 4:00pm EDT</span></p><p><span><strong>Location</strong></span><span><strong>:</strong> ITE 325B conference room or <a href="https://umbc.webex.com/meet/mtope1" rel="nofollow external" class="bo">Webex</a></span></p><p><span><strong>Committee</strong></span><span><strong>:</strong> </span><span>Drs. Joel Morris (Chair/Advisor), </span><span>Tulay Adali (Co-Chair), </span><span>E. F. Charles LaBerge, </span><span>Christopher Marron, </span><span>Anindya Roy</span></p><br><p><span>The aim of this research is to introduce, develop and evaluate active learning algorithms that provide near-optimal high-probability bounds on the channel capacity across a discrete memoryless channel (DMC), where the only information about the channel internals (i.e., the channel law) is from a set of observed input-output sample pairs (i.e., channel probes).   Channel capacity is the maximum rate (on average for each value sent into the channel) at which information can flow across the channel with an arbitrarily low error rate.</span></p><p><span>Extending results on the discrete memoryless compound channel, which is comprised of deterministic constraints on the channel law uncertainty, we first develop an offline algorithm to process an observed set of N input-output sample pairs (probes) to compute lower and upper bounds on channel capacity (such that the bounds hold with high probability).  A key ingredient of this result is our new probability approximately correct (PAC) sublevel set bound that improves the convergence rate of Sanov's Theorem from O(log(N)/N) to O(log(log(N)/N) (where the convergence rate is the 'big Oh' Bachmann-Landau limiting behavior).  The experimental (simulation) results match the analytical results.</span></p><p><span>Adapting techniques from pure-exploration multi-arm bandit problems, we further develop an online algorithm aimed at minimizing the sample complexity (i.e., the number of channel probes or samples of the DMC) required to establish a lower-bound channel rate RL that satisfies several stopping criteria, where the lower bound rate RL approaches the channel capacity with high probability.  We show that if the sample complexity of any optimal online algorithm (including a non-feasible clairvoyant algorithm that is given side information to simplify the analysis) is O(N) samples, then our online algorithm requires less than O(N*log(log(N))) sequential channel probes. Thus, we prove that our algorithm is within a sub-logarithmic factor of optimal (i.e. near optimal).</span></p><p><span>The results of this research may provide a deeper general understanding of active machine learning algorithms.</span></p><p><span><br></span></p><p><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2023/07/channel_rate_discovery.jpg" style="max-width: 100%; height: auto;"></p></span></div>
      ]]>
    </Body>
    <Summary>Ph.D. Dissertation Defense   Near Optimal Sampling to Discover and Bound the Communication Rate of a Discrete Memoryless Channel  Michael Tope   Date: August 16, 2023 at 2:00pm -- 4:00pm EDT...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/134461/guest@my.umbc.edu/1db881c130dcae75d75086a9331a8ae7/api/pixel</TrackingUrl>
    <Tag>defense</Tag>
    <Tag>phd</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 31 Jul 2023 09:41:38 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="130009" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/130009">
  <Title>UMBC alumnus Kemal Akkaya selected as a 2023 IEEE Fellow</Title>
  <Tagline>Received Ph.D. in 2005, mentored by Prof. Mohamed Younis</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><span>Congratulations to UMBC alumnus </span><a href="https://ece.fiu.edu/people/faculty/profiles/akkaya-kemal/index.html" rel="nofollow external" class="bo"><strong>Kemal Akkaya</strong></a><span>, Ph.D. </span>'<span>05, Computer Science, for his selection as an IEEE fellow in 2023.  He was cited for </span><strong>contributions to routing and topology management in wireless ad hoc and sensor networks</strong><span>. </span></div><div><span><br></span></div><div>Dr. <span>Akkaya</span><span> completed his dissertation at UMBC on <strong>Energy and QoS Aware Routing Protocols for Wireless Sensor Networks</strong> in Computer Science in 2005 under the guidance of mentor Professor <a href="https://redirect.cs.umbc.edu/~younis/" rel="nofollow external" class="bo"><strong>Mohamed Younis</strong></a>. </span></div><div><div><br></div><div>Dr. Akkaya is currently a professor in the Department of  Electrical and Computer Engineering at Florida International University (FIU), where he leads the <a href="https://adwise.fiu.edu/" rel="nofollow external" class="bo">Advanced Wireless and Security Laboratory</a> and serves as the Research Director for <a href="https://cyber.fiu.edu/" rel="nofollow external" class="bo">FIU's Emerging Preeminent Program in Cybersecurity</a>. His current research interests include security and privacy, the internet of things, and cyber-physical systems. </div><div><span><br></span></div><div><span>The IEEE Grade of Fellow is conferred by the IEEE Board of Directors upon a person with an outstanding record of accomplishments in any of the IEEE fields of interest. The total number selected in any one year cannot exceed one-tenth of one- percent of the total voting membership. IEEE Fellow is the highest grade of membership and is recognized by the technical community as a prestigious honor and an important career achievement.</span></div></div></div>
]]>
  </Body>
  <Summary>Congratulations to UMBC alumnus Kemal Akkaya, Ph.D. '05, Computer Science, for his selection as an IEEE fellow in 2023.  He was cited for contributions to routing and topology management in...</Summary>
  <Website>https://www.computer.org/press-room/2022-news/ieee-computer-society-announces-2023-class-of-fellows</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/130009/guest@my.umbc.edu/c2faf306e9c91d6b600054f98d35ac63/api/pixel</TrackingUrl>
  <Tag>alum</Tag>
  <Tag>phd</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/xxlarge.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/xlarge.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/large.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/medium.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/small.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/xsmall.jpg?1672701191</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/130/009/21dd97a14dcd62395550d2cc5b7eed97/xxsmall.jpg?1672701191</ThumbnailUrl>
  <PawCount>3</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 02 Jan 2023 18:16:13 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="129984" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/129984">
    <Title>Congratulations to 363 new CSEE Fall '22 graduates</Title>
    <Tagline>They include BS, MS, MPS, and PhD degree recipients</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div><img src="https://umbc.edu/wp-content/uploads/2019/05/commencement2019.jpg" style="max-width: 100%; height: auto;"></div><div><br></div>We congratulate the <strong>363 students</strong> who graduated from one of the CSEE programs last week and look forward to the wonderful things they will accomplish as they embark on their careers. <div><br></div><div>The<strong> Fall 2022 graduates</strong> included:<div><ul><li><strong>155</strong> undergraduate students receiving <strong>BS</strong> degrees in computer engineering or computer science</li><li><strong>77</strong> graduate students awarded an <strong>MS</strong> degree in computer engineering, computer science, or electrical engineering;</li><li><strong>116</strong> graduate students receiving an <strong>MPS</strong> (Masters of Professional Studies) degree in cybersecurity or data science</li><li><strong>15</strong> graduate students obtaining a <strong>Ph.D.</strong> in computer engineering, computer science, or electrical engineering.</li></ul><div></div><div><br></div><div>A total of <strong>397</strong> students have received <strong>Ph.D.</strong> degrees from the department since <a href="https://www.linkedin.com/pub/sanjeev-ahuja/6/352/222" rel="nofollow external" class="bo">Dr. Sanjeev Ahuja</a> completed his dissertation in 1986 on applying abductive reasoning to analyzing and classifying errors in discrete sequential processes. We are very proud of our Ph.D. graduates, who contributed to advancing knowledge in their fields as doctoral students and continue to contribute in their current positions in academia, industry, or government organizations. See our <a href="https://www.csee.umbc.edu/phd-graduates/" rel="nofollow external" class="bo">complete list of Ph.D. graduates</a> <span>with information on their dissertations, mentors, and positions.</span></div><div><br></div><div><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2022/12/plot.png" style="max-width: 100%; height: auto;"></div><div><br></div></div></div></div>
      ]]>
    </Body>
    <Summary>We congratulate the 363 students who graduated from one of the CSEE programs last week and look forward to the wonderful things they will accomplish as they embark on their careers.     The Fall...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/129984/guest@my.umbc.edu/f5e0e5af12ee2d5eaaa1c65dbeb2173a/api/pixel</TrackingUrl>
    <Tag>bs</Tag>
    <Tag>csee</Tag>
    <Tag>fall</Tag>
    <Tag>fred-phelps</Tag>
    <Tag>graduates</Tag>
    <Tag>ms</Tag>
    <Tag>phd</Tag>
    <Tag>umbc</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>4</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 26 Dec 2022 13:38:13 -0500</PostedAt>
    <EditAt>Wed, 04 Jan 2023 10:35:37 -0500</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="129142" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/129142">
  <Title>PhD Defense: Backdoor Attacks in Computer Vision</Title>
  <Tagline>Towards Adversarially Robust Machine Learning Models</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><strong>PhD Dissertation Defense</strong></div><div><br></div><div><strong>Backdoor Attacks in Computer Vision: Towards Adversarially Robust Machine Learning Models</strong></div><div><strong><br></strong></div><div><strong>PhD Candidate: <a href="https://ani0075.github.io/" rel="nofollow external" class="bo">Aniruddha Saha</a> (Computer Science)</strong></div><div><br></div><div><strong>12-2 ET Friday, 18 November 2022, <a href="https://umbc.webex.com/meet/anisaha1" rel="nofollow external" class="bo">WebEx </a></strong></div><div><br></div><div>Committee: Drs. Hamed Pirsiavash (Advisor/Co-Chair), Anupam</div><div>Joshi (Chair), Tim Oates, Tom Goldstein (UMCP), Dr. Pin-Yu Chen (IBM)</div><div><br></div><div>Deep Neural Networks (DNNs) have become the standard building block in numerous machine learning applications, including computer vision, speech recognition, machine translation, and robotic manipulation, achieving state-of-the-art performance on complex tasks. The widespread success of these networks has driven their deployment in sensitive domains like health care, finance, autonomous driving, and defense-related applications. </div><div><br></div><div>However, DNNs are vulnerable to adversarial attacks. An adversary is a person with malicious intent whose goal is to disrupt the normal functioning of a machine learning pipeline. Research has shown that an adversary can tamper with the training process of a model by injecting misrepresentative data (poisons) into the training set. Moreover, if provided control over the training process as a third party, they can deliver a model to a victim, which deviates from normal behavior. These are called backdoor attacks. The manipulation is done in a way that the victim's model will malfunction only when a trigger is pasted on a test input. For instance, a backdoored model in a self-driving car might work accurately for days before it suddenly fails to detect a pedestrian when the adversary decides to exploit the backdoor. Vulnerability to backdoor attacks is dangerous when deep learning models are deployed in safety-critical applications.    </div><div> </div><div>This dissertation studies ways in which state-of-the-art deep learning methods for computer vision are vulnerable to backdoor attacks and proposes defense methods to remedy the vulnerabilities. We push the limits of our current understanding of backdoors and address the following research questions.  </div><div><br></div><div>Can we design practical backdoor attacks? We propose Hidden Trigger Backdoor Attack - a novel clean-label backdoor attack where the poisoned images do not contain a visible trigger. This enables the attacker to keep the trigger hidden until its use at test-time. We believe such practical attacks reveal an important vulnerability of deep learning models. These flaws need to be studied extensively before deploying models in critical real-world applications.</div><div><br></div><div>Is it secure to train models on large-scale public data? Self-supervised learning (SSL) methods for vision have utilized large-scale unlabeled data to learn rich visual representations. These methods use public images downloaded from the web, e.g., Instagram-1B and Flickr image datasets. We show that if a small part of the unlabeled training data is poisoned, SSL methods are vulnerable to backdoor attacks. Backdoor attacks are more practical in self-supervised learning, since the use of large unlabeled data makes data inspection to remove poisons prohibitive. Hence, using large and diverse data to remove data biases and reduce labeling costs might unknowingly set up avenues for adversarial manipulation. Practitioners must make informed choices when choosing training data for machine learning models.</div><div><br></div><div>Can we design efficient and generalizable backdoor detection methods? Methods to detect backdoors in trained models have relied on analysis of model behavior on carefully chosen inputs. But often, this analysis has to be repeated for a new model. We propose a backdoor detection method that optimizes for a set of images which, when forwarded through any model, indicates successfully whether the model contains a backdoor. Our "litmus" test for backdoored models improves on state-of-the-art methods without requiring access to clean data during detection. It is computationally efficient and generalizes to new triggers as well as new architectures. We effectively detect backdoor attacks on thousands of networks with different architectures trained on four benchmark datasets, namely the German Traffic Sign Recognition Benchmark (GTSRB), MNIST, CIFAR10, and Tiny-ImageNet. This will serve as a benchmark for future research.</div><div><br></div><div>Do architectural design choices contribute to backdoor robustness? We find an intriguing difference between Vision Transformers and Convolutional Nets; interpretation algorithms effectively highlight the backdoor trigger on test images for transformers but not for CNNs when attacked with Hidden Trigger Backdoor Attacks. Based on this observation, we find that a test-time image blocking defense reduces attack success rate by a large margin for transformers. We show that such blocking mechanisms can be incorporated during the training process to improve robustness even further. We believe our findings will encourage the community to make better design choices in developing novel architectures robust to backdoor attacks.</div><div><br></div></div>
]]>
  </Body>
  <Summary>PhD Dissertation Defense     Backdoor Attacks in Computer Vision: Towards Adversarially Robust Machine Learning Models     PhD Candidate: Aniruddha Saha (Computer Science)     12-2 ET Friday, 18...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/129142/guest@my.umbc.edu/6086ff0dc18b53a492753e50848966c0/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>defense</Tag>
  <Tag>phd</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 11 Nov 2022 17:08:36 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="129076" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/129076">
  <Title>Janerra Allen, EE PhD student, in UMBC Magazine</Title>
  <Tagline>Her brain imaging research helps understand brain functions</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><img src="https://i.imgur.com/UiItJBv.jpg" style="max-width: 100%; height: auto;">
    <p><small>Allen (far left) celebrates with UMBC colleagues as UMBC President Valerie Sheares Ashby accepts the 2022 Technologist of the Year award at the Women of Color STEM DTX Conference.</small></p><p>The latest issue of <a href="https://umbc.edu/magazine-home/" rel="nofollow external" class="bo">UMBC Magazine</a> features CSEE Ph.D. student  <a href="https://meyerhoffgrad.umbc.edu/janerra-allen/" rel="nofollow external" class="bo">Janerra Alle</a>n who is working with Professor <a href="https://www.csee.umbc.edu/people/faculty/fow-sen-choa/" rel="nofollow external" class="bo">Fow-Sen Choa</a> on advancing and applying brain imaging research.  Janerra is a first-generation college student from Brooklyn, a student leader, and a <a href="https://meyerhoffgrad.umbc.edu/" rel="nofollow external" class="bo">Meyerhoff Graduate Fellow</a>.</p>
    
    <p>She recently presented <a href="She%20recently%20presented%20research%20results%20on%20analyzing%20how%20different%20regions%20of%20the%20brain%20are%20engaged%20and%20if%20they%20are%20working%20together%20at%20the%20SPIE%20Conference%20on%20Defense%20and%20Commercial%20Sensing." rel="nofollow external" class="bo">r</a><a href="https://www.spiedigitallibrary.org/conference-proceedings-of-spie/12122/1212215/Flexible-energy-landscape-analysis-of-functional-connectivity-through-region-bundling/10.1117/12.2619126.short" rel="nofollow external" class="bo">esearch results</a> on analyzing how different regions of the brain are engaged and if they are working together at the SPIE conference on Defense and Commercial Sensing.</p>
    
    <p>In addition to her academic studies and research, Janerra is an active student leader. She is the president of the Black Graduate Student Organization (BGSO), GSA Senator for the College of Engineering and Information Technology, and serves on the tenure track search committee for the CSEE Department.</p>
    
    <p>You can read the full interview with  Janerra Allen in the Fall UMBC Magazine <a href="https://umbc.edu/stories/meet-a-retriever-janerra-allen-ph-d-student-in-electrical-engineering/" rel="nofollow external" class="bo">here</a>.</p>
    
    
    
    </div>
]]>
  </Body>
  <Summary>Allen (far left) celebrates with UMBC colleagues as UMBC President Valerie Sheares Ashby accepts the 2022 Technologist of the Year award at the Women of Color STEM DTX Conference.  The latest...</Summary>
  <Website>https://umbc.edu/stories/meet-a-retriever-janerra-allen-ph-d-student-in-electrical-engineering/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/129076/guest@my.umbc.edu/7c7fc5e147d306f7f8887f04998de435/api/pixel</TrackingUrl>
  <Tag>phd</Tag>
  <Tag>research</Tag>
  <Tag>students</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>7</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 10 Nov 2022 11:09:47 -0500</PostedAt>
  <EditAt>Sat, 12 Nov 2022 13:03:17 -0500</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="128164" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/128164">
    <Title>PhD Defense: Lifelong Multitask Learning Algorithms</Title>
    <Tagline>Nonlinearity, Scalability, and Applications</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><h5><span><strong>Dissertation Defense</strong></span></h5><div><br></div><h3>Lifelong Multitask Learning Algorithms: Nonlinearity, Scalability and Applications</h3><div><br></div><h4>Rami Mowakeaa<br>Electrical Engineering, CSEE Department</h4><div><br></div><h4>4-6:00 pm Wed., 5 October 2022, ITE 325B</h4><div><br></div><div>With the deluge of data in the modern world, machine learning has become a mainstay of industry and science. Machine learning algorithms aim to find underlying relationships hidden in a task that agree with prior knowledge and best generalize to unseen data making as few assumptions about the nature of the data as possible. In cases where several tasks are expected to share underlying structure, multitask learning aims to identify and exploit this shared structure to benefit all tasks. In functional magnetic resonance imaging (fMRI), for example, datasets collected from a group of subjects can be separated into statistically independent sources by joint processing to yield improved performance over what can be achieved considering each dataset alone. In other applications, such as recommender systems, tasks and the corresponding datasets may arrive sequentially over time. This introduces further challenges associated with online processing and modeling of the joint structure in an efficient manner -- key issues toward lifelong learning. Furthermore, where linear models are insufficient to adequately describe underlying task relations, it is desirable to capitalize on rich nonlinear function spaces to develop machine learning algorithms.</div><div><br></div><div>In this work, multitask learning is developed and applied to various machine learning problems. In unsupervised statistical learning, an independent vector analysis algorithm is developed based on a flexible, yet simple, family of distributions termed the complex-valued multivariate generalized Gaussian distribution. In lifelong supervised and reinforcement learning, kernel dictionary learning is used to capture the joint structure of streaming tasks in rich reproducing kernel Hilbert spaces. A sparsification technique is utilized to mitigate the effects of growing computational and storage complexity typical of kernel methods without sacrificing convergence guarantees. This approach is further generalized to tasks where the data emanate from different sources, or views, yielding a kernel lifelong multitask multiview learning algorithm. To affirm the effectiveness of the algorithms developed, experiments based on synthetic as well as real-world datasets are performed. The convergence of the developed supervised lifelong learning algorithms is also rigorously established.</div><div><br></div><div>Committee: Drs. Seung-Jun Kim (Chair), Tulay Adali, Tim Oates, Mohamed Younis, Ramana Vinjamuri</div></div>
      ]]>
    </Body>
    <Summary>Dissertation Defense     Lifelong Multitask Learning Algorithms: Nonlinearity, Scalability and Applications     Rami Mowakeaa Electrical Engineering, CSEE Department     4-6:00 pm Wed., 5 October...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/128164/guest@my.umbc.edu/d149463d674322b1224220ec271bd47a/api/pixel</TrackingUrl>
    <Tag>defense</Tag>
    <Tag>machine-learning</Tag>
    <Tag>phd</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 04 Oct 2022 10:38:15 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="127760" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127760">
  <Title>Interweave Cognitive Radio for 4G Long Term Evolution and 5G</Title>
  <Tagline>PhD Defense: Brian Stevens, Computer Engineering</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><strong>Ph.D. Dissertation Defense</strong></div><div><br></div><h4>Interweave Cognitive Radio for 4G Long Term Evolution and 5G New Radio Self-Reliant Networks</h4><div> </div><h5>Brian Stevens, Computer Engineering</h5><div> </div><h5>1-3 pm ET Tuesday, 20 September 2022, <a href="https://jhuapl.zoomgov.com/j/1612413585?pwd=bk1CK3duRjYyVXBodmhNRUdQQmxTUT09" rel="nofollow external" class="bo">Zoom</a></h5><div><br></div><div><strong>Committee: Drs. Mohamed Younis (Chair),  Tulay Adali, Sunita Bhatia</strong></div><div><strong>(JHUAPL), Seung-Jun Kim, Dmitri Perkins, Ting Zhu</strong></div><div><br></div><div>Existing cellular networks have untapped radio frequency resources, also known as white space, available for cognitive radio applications. A secondary network can opportunistically interweave communication within the white space of an existing cellular signal by leveraging cognitive radio. This thesis presents a novel methodology for forming a cognitive interwoven self-reliant secondary network with no additional physical infrastructure, collaboration from the existing primary network, and software or hardware changes in the primary network. The methodology is tested first with 4G and later with 5G cellular technological standards. For the physical layer, this thesis optimizes synchronization as the initial step in aligning to a cellular signal in time, frequency, and sector identity. We improve synchronization through sensitivity, execution time, and applies a threshold to form a "cell detector" instead of the traditional "cell search," which only considers the most detectable signal. </div><div><br></div><div>After synchronization, resource detectors monitor the available spectral resources of the entire cellular infrastructure. Modern cellular networks have grown in complexity and become an ecosystem that includes the host technologies, such as 4G Long Term Evolution (LTE) and 5G New Radio (NR), along with subsystems such as narrowband internet of things (NB-IoT), category M1 (Cat-M1/LTE-M), observed time difference of arrival (OTDOA), and support for 4G/5G coexistence using dynamic spectrum sharing (DSS). Such an increased complexity has driven the need for network monitoring to enable load tracking, congestion control, spectral efficiency analysis, intrusion detection, and cognitive radio communications.</div><div><br></div><div>This thesis develops resource monitoring that can passively monitor the entire cellular ecosystem, including reservations configured with high-layer messages that are only accessible to in-network, active, and sometimes user-specific equipment. Resource monitoring provides white-space reservations for cognitive communications. We define interference control to prevent interference with the primary network through physical layer access schemes and power control cluster protocols to access resources safely. With the added complexity of 5G as a host technology, our research leverages geospatial beamforming of known signals as spatially dependent white space. In this case, the known synchronization signal burst must be detected with a "beam detector" instead of a "beam search" to properly use beam resources that are not close to cognitive radio nodes. The thesis applies the self-reliant methodology, which defines opportunistic access and power control protocols that limit interference between cellular networks in both the time and frequency domains with additional support in the geospatial domain for 5G NR. Our research determines that an adapted version of Slotted ALOHA for medium access control (MAC) with a no-back-off contention fits the self-reliant approach of our work and timing constraints found in 4G LTE and 5G NR networks.</div><div><br></div><div><br></div></div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense     Interweave Cognitive Radio for 4G Long Term Evolution and 5G New Radio Self-Reliant Networks     Brian Stevens, Computer Engineering     1-3 pm ET Tuesday, 20...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127760/guest@my.umbc.edu/e64a5f0ad7f42f9b06c9171ad1fbc11c/api/pixel</TrackingUrl>
  <Tag>cognitive</Tag>
  <Tag>defense</Tag>
  <Tag>phd</Tag>
  <Tag>radio</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 19 Sep 2022 16:52:50 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="127467" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/127467">
    <Title>PhD Defense: Md Shafiqul Islam, Computer Eng., 9-11am 9/14</Title>
    <Tagline>Communication Across the Air-Water Interface</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><h5><img src="https://i.imgur.com/YKcu163.png" style="max-width: 100%; height: auto;"></h5><h5><br></h5><h5>PhD Defense, <span>Computer Engineering</span></h5><div><br></div><h4>Analysis and Protocols to Establish Downlink for<br>Communication Across the Air-Water Interface</h4><div><br></div><h4>Md Shafiqul Islam</h4><h5><br>9-11 am Wed. 14 Sept. 2022 <span>via </span><a href="https://umbc.webex.com/umbc/j.php?MTID=mb47a365016b4714771f2c3a50624fec0" rel="nofollow external" class="bo">WebEx </a></h5><div><br></div><div>In underwater wireless networks (UWNs), conventionally there is no direct communication between an underwater node and a remote command center, because there is no known physical signal that propagates well in both the water and air mediums. Radio signals are the popular choice in the air while acoustics are the prime means for communication underwater. Hence, the typical architecture of an UWN includes surface nodes or gateways which have dual modems, an acoustic modem to communicate with underwater nodes and a radio modem to interact with terrestrial command centers. However, such an architecture is logistically complicated and could expose the network to security threat. Therefore, it is desirable to establish a direct communication from air to underwater without having any intermediate surface node. </div><div><br></div><div>This dissertation opts to fulfill such a need by pursuing two viable solutions, namely, using visual light communications (VLC) and exploiting the optoacoustic (photoacoustic) effect. Through extensive analysis and experiments we show that VLC is an effective means for scenarios where the distance between the airborne and underwater nodes is relatively short. We first analyze the coverage area and intensity inside the water for a light transmitter placed in the air. We then provide guidelines for using single and multiple light sources to establish robust VLC links under rough environmental conditions like high water current and turbidity. Furthermore, we investigate effective modulation techniques that suit VLC. For long distance communication, VLC is not a viable option since light gets absorbed at an exponentially growing rate with the increase of water depth. Photoacoustic (PA) energy transfer mechanism is the promising method for long distance communication. </div><div><br></div><div>Although the use of the photoacoustic mechanism is quite common in medical imaging, little progress has been made on building the communication protocol stack for air-to-underwater communication. In our research work, at first, we have studied the channel characteristics of the PA based air-to-underwater communication. We show that by carefully choosing the relative position of the airborne unit and underwater node, we can generate a narrowband acoustic signal which is very crucial for long distance communication. Moreover, we develop suitable modulation and demodulation schemes for PA communication.</div><div><br></div><div><strong>Committee:</strong> Drs. Mohamed Younis, Fow-Sen Choa, Gary Carter, Lloyd Emokpae, Akram Fadhl N. Ahmed</div><div><br></div></div>
      ]]>
    </Body>
    <Summary>PhD Defense, Computer Engineering     Analysis and Protocols to Establish Downlink for Communication Across the Air-Water Interface     Md Shafiqul Islam   9-11 am Wed. 14 Sept. 2022 via WebEx ...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/127467/guest@my.umbc.edu/7195032010c7ec3a0266f38c0b84b179/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>defense</Tag>
    <Tag>phd</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sun, 11 Sep 2022 22:08:42 -0400</PostedAt>
    <EditAt>Sun, 11 Sep 2022 22:10:58 -0400</EditAt>
  </NewsItem>
</News>
