<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="2" pageSize="10" timestamp="Wed, 29 Apr 2026 12:14:44 -0400" url="https://dev.my.umbc.edu/groups/umbc-ai/posts.xml?page=2&amp;tag=cybersecurity">
  <NewsItem contentIssues="false" id="143016" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/143016">
  <Title>UMBC faculty receive NSF award for audio deepfake detection</Title>
  <Body>
    <![CDATA[
    <div class="html-content"><span><p><span>UMBC professors <a href="https://userpages.umbc.edu/~vjaneja/" rel="nofollow external" class="bo"><strong>Vandana Janeja</strong></a>, <a href="https://hcc.umbc.edu/people/faculty/anita_komlodi/" rel="nofollow external" class="bo"><strong>Anita Komlodi</strong></a>, <a href="null" rel="nofollow external" class="bo"><strong>Christine Mallinson,</strong></a> and <a href="https://sanjayp.is.umbc.edu/" rel="nofollow external" class="bo"><strong>Sanjay Purushotham</strong></a> received an </span><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2346473" rel="nofollow external" class="bo"><span><strong>NSF award</strong></span></a><span> to develop a prototype </span><span>Community Infrastructure to Strengthen AI for Audio Deepfake analysis</span><span> (CISAAD).  Deepfakes, or AI-generated content, are widely recognized as a major societal concern and challenge and <a href="https://en.wikipedia.org/wiki/Audio_deepfake" rel="nofollow external" class="bo">audio deepfakes</a> are increasingly being used to spread disinformation on the web and social media and for identity theft and financial scams.</span></p><p><span>The CISAAD project builds on a 2022 <a href="https://umbc.edu/stories/can-you-catch-a-deepfake/" rel="nofollow external" class="bo"><strong>NSF EAGER grant</strong></a> to Drs. Janeja and Mallinson that studied and evaluated listener perceptions of audio deepfakes and novel interdisciplinary methods for detection.  The new effort </span><span>has three main goals:</span></p><ul><li><p><span>Helping to solve the challenges of limited data availability for audio deepfakes and human-augmented data about them through open datasets shared by the community</span></p></li><li><p><span>Enabling  both single and multi-speaker deepfake analysis across various use cases </span></p></li><li><p><span>Addressing the ethical, social, and political challenges associated with deploying deepfake technology developed from open-sourced community data</span></p></li></ul><p><span>Their work will inform our understanding of mis/dis-information as a significant societal concern and challenge. It will also help understand the opportunities for content generation in positive applications such as voice restoration and smart and connected community research. </span></p><p><span>With an interdisciplinary team across AI, linguistics, cyber infrastructure, and human-centered computing, the project develops an innovative infrastructure for expanding research informed by types of audio deepfakes. Their research and dissemination efforts will expand formal and informal learning in AI and STEM fields related to cybersecurity analytics at the intersection of technology, language, behavior, and society. The principles developed through this project will expand to multiple types of deepfakes and support media and communications experts working to address challenges related to information integrity.</span></p><p><a href="https://cisaad.umbc.edu/" rel="nofollow external" class="bo"><span><strong>CISAAD</strong></span></a><span> will be developed as a prototype community resource. It will include a deep fake data catalog and repository for English audio data, tools, models for deep fake audio analysis use cases, and educational material.</span></p><div></div></span><hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
  </Body>
  <Summary>UMBC professors Vandana Janeja, Anita Komlodi, Christine Mallinson, and Sanjay Purushotham received an NSF award to develop a prototype Community Infrastructure to Strengthen AI for Audio Deepfake...</Summary>
  <Website>https://cisaad.umbc.edu/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/143016/guest@my.umbc.edu/c314aba3cb0c119c5a04508c0c439113/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>audio</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>deepfake</Tag>
  <Tag>speech</Tag>
  <Group token="umbc-ai">UMBC AI</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
  <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
  <Sponsor>UMBC AI</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 01 Aug 2024 18:31:41 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="140264" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/140264">
  <Title>Talk: Tensor Decomposition for Cybersecurity, 12-1pm ET 3/29</Title>
  <Tagline>Extracting hidden patterns from cybersecurity datasets</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><div>The UMBC Cyber Defense Lab presents</div><div><br></div><h4><strong>Tensor Decomposition Methods for Cybersecurity</strong></h4><div><br></div><h5><strong>Maksim E. Eren<br></strong><strong>Los Alamos National Laboratory</strong></h5><h5><br><strong>12–1pm ET, Friday, March 29, 2024, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h5><div><br></div><div>Tensor decomposition is a powerful unsupervised machine learning method used to extract hidden patterns from large datasets. This presentation aims to illuminate the extensive applications and capabilities of tensors within the realm of cybersecurity. We offer a comprehensive overview by encapsulating a diverse array of capabilities, showcasing the cutting-edge employment of tensors in the detection of network and power grid anomalies, identification of SPAM e-mails, mitigation of credit card fraud, and detection of malware. Additionally, we delve into the utility of tensors for classifying malware families, pinpointing novel forms of malware, analyzing user behavior, and utilizing tensors for data privacy through federated learning techniques.</div><div><br></div><div><a href="https://www.maksimeren.com/" rel="nofollow external" class="bo"><strong>Maksim E. Eren</strong></a> is an early career scientist in A-4, Los Alamos National Laboratory (LANL) Advance Research in Cyber Systems division. He graduated Summa Cum Laude with a Computer Science Bachelor’s at University of Maryland Baltimore County (UMBC) in 2020 and Master’s in 2022. He is currently pursuing his Ph.D. in the <a href="https://umbc-dream-lab.github.io/" rel="nofollow external" class="bo"><strong>UMBC DREAM Lab</strong></a>, and he is a Scholarship for Service CyberCorps alumnus. His interdisciplinary research interests lie at the intersection of machine learning and cybersecurity, with a concentration in tensor decomposition. His tensor decomposition-based research projects include large-scale malware detection and characterization, cyber anomaly detection, data privacy, text mining, knowledge graphs, and high-performance computing. Maksim has developed and published state-of-the-art solutions in anomaly detection and malware characterization. He has also worked on various other machine learning research projects such as detecting malicious hidden code, adversarial analysis of malware classifiers, and federated learning. At LANL, Maksim was a member of the 2021 R&amp;D 100 winning project <a href="https://tensors.lanl.gov/" rel="nofollow external" class="bo"><strong>SmartTensors</strong></a>, where he has released a fast tensor decomposition and anomaly detection software, contributed to the design and development of various other tensor decomposition libraries, and developed state-of-the-art text mining tools. Maksim is currently the lead for the <a href="https://cyberfire.energy.gov/school/2024/research/#t=Overview&amp;p=Anomaly+Detection" rel="nofollow external" class="bo"><strong>Cyber Science Research Program</strong></a> (CSRP), a cybersecurity research internship at LANL.</div><div> </div><div>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.</div><div><br></div><div><br></div><div> </div><div><br></div><div> </div><div><br></div></div><div><br></div><div> </div><div><br></div><div> </div><div><br></div></div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents     Tensor Decomposition Methods for Cybersecurity     Maksim E. Eren Los Alamos National Laboratory   12–1pm ET, Friday, March 29, 2024, via WebEx     Tensor...</Summary>
  <Website>https://ai.umbc.edu/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/140264/guest@my.umbc.edu/3de18d1b1156b5984b0bb32b31b41544/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>machine-learning</Tag>
  <Tag>tensor-decomposition</Tag>
  <Group token="umbc-ai">UMBC AI</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
  <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
  <Sponsor>UMBC AI Center</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/xxlarge.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/xlarge.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/large.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/medium.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/small.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/xsmall.jpg?1711567271</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/140/264/e44b6263328ff2868fdaa07d047fda22/xxsmall.jpg?1711567271</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 27 Mar 2024 15:27:05 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="140160" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/140160">
    <Title>Professors Mallinson &amp; Janeja on detecting audio deep fakes</Title>
    <Tagline>Their approach combines people, linguistics, and technology</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div><br></div><div><span><span>UMBC professors <a href="https://llc.umbc.edu/dr-christine-mallinson/" rel="nofollow external" class="bo">Christine Mallinson</a> and <a href="https://userpages.umbc.edu/~vjaneja/" rel="nofollow external" class="bo">Vandana Janeja</a> have a new article on the <strong>Maryland Matters</strong> site for news about Maryland government and politics on </span><a href="https://www.marylandmatters.org/2024/03/25/commentary-bringing-people-and-technology-together-to-combat-the-threat-of-deepfakes/" rel="nofollow external" class="bo"><span>Bringing people and technology together to combat the threat of deep fakes</span></a>. <span>They briefly describe how they are working with a team of students to develop better ways to detect <a href="https://en.wikipedia.org/wiki/Audio_deepfake" rel="nofollow external" class="bo">audio deep fakes </a>with the support of an NSF grant.  </span></span></div><div><span><span><br></span></span></div><div><span>Audio deep fakes involves using AI algorithms to generate or manipulate audio recordings so that they sound like a specific person speaking or singing, typically without their consent. It poses a serious problem because it can be used to create convincing fake content for fraud, misinformation, or harassment, undermining trust in communications and media.</span></div><div><span><span><br></span></span></div><div><span><span>Their </span><a href="https://mdata.umbc.edu/deep-fake-detection/" rel="nofollow external" class="bo"><span>approach</span></a><span> to detecting these deep fakes takes into account human behavioral perspectives by encouraging collaborative research across sociolinguistics, human-centered analytics, and data science. </span></span></div><div><br></div></div>
      ]]>
    </Body>
    <Summary>UMBC professors Christine Mallinson and Vandana Janeja have a new article on the Maryland Matters site for news about Maryland government and politics on Bringing people and technology together to...</Summary>
    <Website>https://umbc.edu/stories/can-you-catch-a-deepfake/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/140160/guest@my.umbc.edu/06aef9d6d91e5a76f741a59b4524bb74/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>audio-deepfakes</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>linguistics</Tag>
    <Group token="umbc-ai">UMBC AI</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
    <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
    <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
    <Sponsor>UMBC AI</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Mon, 25 Mar 2024 22:15:32 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="139630" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/139630">
    <Title>Online course on applying AI and HPC to cybersecurity</Title>
    <Tagline>Apply by March 30, starts on May 20, 2024</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><img src="https://ai.umbc.edu/wp-content/uploads/sites/734/2024/03/op.png" style="max-width: 100%; height: auto;"><div><br></div><div><span><p><span>UMBC Professor </span><span><strong><a href="https://informationsystems.umbc.edu/home/faculty-and-staff/new-faculty-spotlights/houbing-herbert-song/" rel="nofollow external" class="bo">Houbing Herbert Song</a></strong></span><span>, in collaboration with </span><a href="http://www.cis.umassd.edu/~jyuan/cybertraining/application.html" rel="nofollow external" class="bo"><span><strong>Dr. Jiawei Yuan</strong></span></a><span> of UMass Dartmouth, will offer an online course on applying AI and high-performance computing knowledge and skills to solve cybersecurity challenges.</span></p><p><span>The </span><a href="http://www.cis.umassd.edu/~jyuan/cybertraining/index.html" rel="nofollow external" class="bo"><span><strong>12-week course</strong></span></a> <span>starts on May 20, 2024. It consists of instruction in AI, machine learning, and cybersecurity, supported by teaching assistants. It is followed by faculty-guided research projects in multidisciplinary teams of participants from each area.</span></p><p><span>The pilot course is available to junior or senior undergraduate students, graduate students, postdoctoral fellows, or early-career faculty and researchers in related disciplines in a US institute at the time of participation. Those interested in participating can <strong><a href="http://www.cis.umassd.edu/~jyuan/cybertraining/application.html" rel="nofollow external" class="bo">apply online</a> </strong>by March 31, 2024. The course is free, and participants who successfully complete the training course will receive a $1,000 stipend.</span></p><p><span>The development of this </span><span>pilot course is supported by collaborative NSF grants </span><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2309760" rel="nofollow external" class="bo"><span><strong>OAC-2309760</strong></span></a><span> and </span><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2229976" rel="nofollow external" class="bo"><span><strong>OAC-2229976</strong></span></a><span><strong>.</strong> </span></p></span></div></div>
      ]]>
    </Body>
    <Summary>UMBC Professor Houbing Herbert Song, in collaboration with Dr. Jiawei Yuan of UMass Dartmouth, will offer an online course on applying AI and high-performance computing knowledge and skills to...</Summary>
    <Website>http://www.cis.umassd.edu/~jyuan/cybertraining/index.html</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/139630/guest@my.umbc.edu/0af1ff2537568110150ef98530769bf5/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>online-course</Tag>
    <Group token="umbc-ai">UMBC AI</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
    <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
    <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
    <Sponsor>UMBC AI</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Tue, 05 Mar 2024 14:29:22 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="139103" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/139103">
  <Title>Talk: GotCHA: CAPTCHAs for an AI Era, 12-1 ET Friday Feb 23</Title>
  <Tagline>Creating CAPCHAs that challenge AI systems</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a><span> presents</span></div><div><br></div><p><strong>GotCHA: CAPTCHAs for an AI Era</strong></p><div><a href="https://www.linkedin.com/in/myaksetig/" rel="nofollow external" class="bo"><strong>Mario Yaksetig</strong></a></div><div><strong>Cryptographer, <a href="https://www.linkedin.com/company/gotcha-labs/about/" rel="nofollow external" class="bo">GotCHA Labs</a></strong></div><div><strong><br></strong></div><div><strong>12-1pm ET, Friday, Feb. 23, 2024 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></div><div><br></div><div>In the rapidly evolving digital landscape, CAPTCHAs have transitioned from simple tests of humanity to sophisticated challenges that aim to differentiate humans and bots. Presently, CAPTCHAs are a fundamental part of securing the Internet. Unexpectedly, ChatGPT can already solve many real-world CAPTCHAs. Therefore, these AI developments result in an unforeseen problem where AIs are almost indistinguishable from real humans on the Internet. The need for advanced CAPTCHAs that can effectively thwart automated attacks has never been more critical. GotCHA is exploring short games that enhance security and contribute to the overall user experience, turning a traditionally tedious task into an engaging interaction. GotCHA's team includes a former developer from the famous Crash Bandicoot video game and a storyboard artist connected with the popular show Rick &amp; Morty. This talk will highlight the significance of the need for new CAPTCHAs with the latest AI advancements to stay ahead of malicious bots.</div><div><br></div><div><a href="https://www.linkedin.com/in/myaksetig/" rel="nofollow external" class="bo">Mario Yaksetig</a> is an applied cryptographer who thrives at the intersection of privacy and the intricate world of cryptographic protocols. Mario started his cryptography journey at UMBC under Professor Alan Sherman, notable student of cryptography icon Ron Rivest. He then worked alongside David Chaum, the creator of digital cash, blind signatures, and mix networks. While working with Chaum, Mario has created multiple state-of-the-art cryptographic protocols. Recently, Vitalik Buterin, one of the creators of Ethereum, has cited some of his work on ZK-rollups. Mario's latest paper exposes a sublinear forgeability attack on a post-quantum signature scheme created by Vitalik Buterin. Email: <a href="mailto:myaksetig@gmail.com">myaksetig@gmail.com</a></div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>, Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.  The <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly Fridays 12-1pm.  All meetings are open to the public. Upcoming CDL meetings: March 8, Cyrus Bonyadi, Metametaphysical Ontologies for Consensus; March 29, Maksim Eren, Tensor Decomposition Methods for Cybersecurity; April 12, Anupam Joshi; April 26, Dan Ragsdale, National Cybersecurity Policy; May 10, Enis Golaszewski, Automatically Binding Cryptographic Context to Messages Using Formal Methods</div><div><br></div></div>
]]>
  </Body>
  <Summary>UMBC Cyber Defense Lab presents     GotCHA: CAPTCHAs for an AI Era  Mario Yaksetig  Cryptographer, GotCHA Labs     12-1pm ET, Friday, Feb. 23, 2024 via WebEx     In the rapidly evolving digital...</Summary>
  <Website>https://cisa.umbc.edu/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/139103/guest@my.umbc.edu/3a3aea3b772824dc679738ca88400118/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>captcha</Tag>
  <Tag>cybersecurity</Tag>
  <Group token="umbc-ai">UMBC AI</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
  <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
  <Sponsor>UMBC Cyber Defense Lab</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/xxlarge.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/xlarge.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/large.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/medium.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/small.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/xsmall.jpg?1708362341</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/139/103/1df1abbfe5282e744093088135b9570b/xxsmall.jpg?1708362341</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 19 Feb 2024 12:18:15 -0500</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="139080" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/139080">
    <Title>AI Lunchbox: Ethical Hacking &amp; Cybersecurity with HackerGPT</Title>
    <Tagline>Free online session, 12-1pm ET Thursday Feb 22, 2024</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><div>The next event in the <a href="https://c4a.ai/" rel="nofollow external" class="bo"><strong>UMBC Training Centers AI Lunchbox series</strong></a> is on <strong>Ethical Hacking and Cybersecurity with HackerGPT</strong>.  It will be held online from 12-1:00pm ET on Thursday, February 22, 2024.</div><div><br></div><blockquote><div>Join us for this engaging demonstration of <strong><a href="https://github.com/Hacker-GPT/HackerGPT" rel="nofollow external" class="bo">HackerGPT</a></strong> an advanced artificial intelligence program designed for ethical hacking and cybersecurity tasks. Nick Anthis will show how HackerGPT can be used to identify vulnerabilities, simulate cyber attacks, and suggest defenses in digital systems.</div></blockquote><div><br></div><div><a href="https://c4a.ai/" rel="nofollow external" class="bo">Register here</a> to get a link to the free Zoom session.</div><div><br></div></div>
      ]]>
    </Body>
    <Summary>The next event in the UMBC Training Centers AI Lunchbox series is on Ethical Hacking and Cybersecurity with HackerGPT.  It will be held online from 12-1:00pm ET on Thursday, February 22, 2024....</Summary>
    <Website>https://c4a.ai/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/139080/guest@my.umbc.edu/8b060d1addc52a87eb3ad258160d0c7f/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>cybersecurity</Tag>
    <Group token="umbc-ai">UMBC AI</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
    <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
    <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
    <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
    <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
    <Sponsor>UMBC AI</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Sat, 17 Feb 2024 13:18:23 -0500</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="134470" important="false" status="posted" url="https://dev.my.umbc.edu/groups/umbc-ai/posts/134470">
  <Title>PhD defense: Knowledge Graphs &amp; Reinforcement Learning</Title>
  <Tagline>a Hybrid Approach for Cybersecurity Tasks</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><h5><strong>Ph.D. Dissertation Defense</strong></h5><h5><br></h5><h4><strong>Knowledge Graphs and Reinforcement Learning:<br></strong><strong>a Hybrid Approach for Cybersecurity Tasks</strong></h4><div><br></div><h4><strong><a href="https://sites.google.com/view/aritran-piplai/" rel="nofollow external" class="bo">Aritran Piplai</a></strong></h4><div><br></div><h5>10:00am -12:00pm ET, Monday July 10, 2023</h5><div><br></div><div>Dissertation Committee: Drs. Anupam Joshi (Chair/Advisor), Charles Nicholas, Chenchen Liu, Filip Perich, Joysula R. Rao, Sudip Mittal, Tim Finin</div><div><br></div><div>With the explosion of available data and computational power, machine learning and deep learning techniques are being increasingly used to solve problems. The domain of cybersecurity is no exception, as we have seen a significant amount of research in the recent past using data-driven machine learning approaches for different tasks.</div><div><br></div><div>Rule-based and supervised machine learning-based approaches are often brittle in detecting attacks, can be defeated by adversaries that adapt, and can't use the knowledge of experts. To address this problem, we propose a novel approach for cybersecurity tasks that leverages the supply of 'explicit' knowledge expressed as Knowledge Graphs, as well as the data-driven approaches of machine learning to ascertain the 'tacit' knowledge. The inspiration for this hybrid model is drawn from the manner in which security analysts work, combining their background knowledge with observed data from host and network-based sensors.</div><div><br></div><div>We focus on the tasks of malware detection and mitigation policy generation. We are specifically interested in the capability of synthesizing variants of a malware that can be further enhanced to detect unseen attacks. We combine the knowledge that is explicit with explorations in the 'action space' of detecting novel malware attacks as well as mitigating them. Analysts use past experiences and actions that they have taken when faced with attacks that manifest characteristics similar to the new one. The other component of their approach is exploring new `actions' that might be taken to respond to a novel malware, guided by their understanding of the domain. These steps can be considered as a 'trial and error' based approach. In this dissertation, we describe knowledge graph construction techniques from open-source text as well as several Reinforcement Learning based algorithms, guided by explicit background knowledge encoded in a knowledge graph, that best mimics the approach of security analysts. We observe that the efficiency of RL algorithms has increased by ~4% by incorporating prior knowledge. We also observe that in simulated environments RL policies are able to generate more precise mitigations with the help of prior knowledge.</div><div><br></div><div><img src="https://i.imgur.com/cqHjn4U.jpg" style="max-width: 100%; height: auto;"></div><div><br></div></div>
]]>
  </Body>
  <Summary>Ph.D. Dissertation Defense     Knowledge Graphs and Reinforcement Learning: a Hybrid Approach for Cybersecurity Tasks     Aritran Piplai     10:00am -12:00pm ET, Monday July 10, 2023...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/134470/guest@my.umbc.edu/cee301d50a58d745031b0d8304ccb796/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>graph</Tag>
  <Tag>knowledge</Tag>
  <Group token="umbc-ai">UMBC AI</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/umbc-ai</GroupUrl>
  <AvatarUrl>https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="original">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/original.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xlarge.png?1691095779</AvatarUrl>
  <AvatarUrl size="large">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/large.png?1691095779</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/medium.png?1691095779</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/small.png?1691095779</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xsmall.png?1691095779</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/002/081/cfb27ebe008c2636486089a759ea5c36/xxsmall.png?1691095779</AvatarUrl>
  <Sponsor>UMBC AI</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 31 Jul 2023 12:47:46 -0400</PostedAt>
</NewsItem>
</News>
