Cybersecurity Enhancement Act of 2014

The Cybersecurity Enhancement Act of 2014 bill was passed by Congress this month and signed by the President at the end of last week. The bill provides for “an ongoing, voluntary public-private partnership to improve cybersecurity, and to strengthen cybersecurity research and development, workforce development and education, and public awareness and preparedness, and for other purposes.”

The bill formalizes the role of the National Institute for Standards and Technology in continuing to develop the voluntary Cybersecurity Framework. It includes provisions to promote cybersecurity research, private/public sector collaboration on cybersecurity, education and awareness and technical standards, which includes a federal cloud computing strategy. It also directs NSF to continue the Federal Cyber Scholarship-for-Service program under which recipients agree to work in the cybersecurity mission of a federal, state, local, or tribal agency for a period equal to the length of their scholarship.

New computing faculty positions at UMBC

usnews_badge_100

UMBC has a total of nine open full-time positions for computing faculty including five tenure track professors, a professor of the practice and three lecturers.

UMBC’s Computer Science and Electrical Engineering department is seeking to fill five positions for the coming year. They include two tenure track positions in Computer Science, up to three full-time lecturers. See the CSEE jobs page for more information.

The College of Engineering and Information Technology has a position for a full-time lecturer or Professor of Practice to focus on the needs of incoming computing majors through teaching, advising, and helping develop programs in computing. This person will work closely with faculty in the Computer Science and Electrical Engineering Department and Information Systems Department.

UMBC’s Information Systems department is accepting applications for three tenure track faculty positions in data science, software engineering and human-centered computing.

CSEE Faculty Involved With NSF's CS10K Teacher Training Project

desJardins-group-photo700

CSEE’s Marie desJardins is currently collaborating with Maryland educators and researchers for the NSF-funded CS10K Teacher Training Project. The project seeks to change how computer science is taught by high school teachers. Researchers work together with high school teachers to craft new curricula for high school computer science programs. This project is unique in that actual high school teachers are creating the new curricula, rather than professional curriculum writers. The CS10K Maryland Project team includes faculty from UMCP, as well as high school teachers from Charles County and Baltimore County.

The CS10K team has facilitated the creation of “a complete curriculum package for a new College Board Advanced Placement (AP) course called CS Principles.” Originally, the goal of the CS10K team was to train 10,000 teachers to teach computer science in 10,000 schools nationwide. The project has been revised to reflect its new goal of training teachers in all U.S. schools.

In academia there is a growing concern that females–as well as minorities and those with disabilities–are being repeatedly discouraged from pursuing programming in high school. Professor desJardins is trying to change this by directing the CS Matters in MD Project. (CS Matters in MD is part of the larger, NSF-supported initiative known as CS 10K.)

“I believe that CS should be included throughout the K-12 curriculum as a set of basic skills and knowledge for today’s world,” desJardins said. “All citizens of the 21st century, especially the next generation of knowledge workers, will benefit greatly from learning about computational thinking and the problem-solving skills that are a core part of computer science.”

In addition, desJardins explains that, “We need to expand the pool of available workers to fill the many computing-related jobs that our economy demands, and in order to be sure that the technology we develop is robust and useful, we need to increase the diversity of the computer scientists who take those jobs.  To meet these goals, we must broaden our notion of what it means to teach computer science (beyond just teaching coding skills), and we must reach a broader audience at an earlier age.  Our ‘CS Matters in Maryland’ project is particularly focused on creating appealing and engaging curriculum materials for the newly announced AP CS Principles course, and on training teachers to deliver this material effectively to a diverse population of learners.”

More information about CS Matters in Maryland and the CS10K Project can be found here.

A drone's eye view of Baltimore


Filmmaker Matthew Coakley of Blue Mantle Media created this amazing drone-assisted video of Baltimore.

Coakley comments on the video:

“It features Baltimore’s Inner Harbor, the Raven’s M&T Bank Stadium, Oriole Park at Camden Yards, National Aquarium, the Baltimore Convention Center, Federal Hill, Fells Points, The Pride of Baltimore memorial, The Pride of Baltimore II, Patterson Park, Penn Station, Power Plant, and more.
..
To film this I used a DJI Phantom 2 quadcopter, with a GoPro Hero4 mounted on a Zenmuse H3-3D gimbal. I hope to eventually upgrade to a higher-end system, but you work with what you’ve got…and it’s still incredible the types of shots achievable with such a small piece of equipment!”

Marie desJardins Collaborates with Howard County Parents and Teachers for HowGirlsCode

girlswhocode

CSEE’s Marie desJardins recently collaborated with a group of Howard County parents and teachers to create HowGirlsCode, an educational program that “educates and inspires young girls to pursue computer related activities, courses, and careers.”

The program–originally called Computer Mania Club–is based out of Fulton Elementary School. Over the course of ten weeks, students meet for weekly two-hour sessions, working on projects such as Lego Mindstorm robots and 3D printing. Students also work with programming tools such as MIT’s Scratch program. The curriculum for the program is largely based off of materials from the Code.org website.

UMBC alumna Katie Egan and her husband Kent Malwitz have been instrumental in getting the club off the ground. Malwitz, who is the President and Chief Learning Officer for UMBC Training Centers, originally recruited Marie desJardins to participate in a brainstorming session for the club back in 2013. Professor desJardins now serves as a member of the Advisory Board for HowGirlsCode.

Bethany Meyer, Senior Web Developer at MGH, Inc., was a recent guest speaker for HowGirlsCode. During her presentation, Meyer explained how she got into coding, citing as an example a website that she created when she was 13 years old. Meyer went on to present more recent projects, such as OldBay75.com and OCOcean.com. “I think a lot of people have negative stereotypes in mind when they think of programmers,” Meyer says. “My goal was to break down some of those stereotypes by showing…[students] that the work can be really exciting and that it involves creativity and interacting with others. I hope that I inspired some of them to teach themselves to make websites. ”

A recent Baltimore Sun article notes that there has been a marked increase in student signups for HowGirlsCode since last year. More courses will be offered in the spring, due to increasing demand. At some point, the coding club could possibly expand to other schools. Currently, Egan is trying to turn HowGirlsCode into a 501(c)(3) tax-exempt, charitable organization. This would allow the club to have better access to resources such as facilities, grants and funding. Ideally, she hopes to turn the club into a nonprofit by September 2015.

The Johns Hopkins University’s Applied Physics Lab has a similar program, called Girls Who Code. The Hopkins APL program, which is intended for middle and high school students, is based on a national nonprofit of the same name.

PhD defense: Huguens Jean, Paper Form Classification for Information Systems Strengthening in Developing Countries

In developing countries, people are now more likely to have access to a mobile phone than clean water, making cellular based technology the only viable medium for collecting, aggregating, and communicating local data so that it can be turned into useful information.

Ph.D. thesis defense

Paper Form Classification for Information
Systems Strengthening in Developing Countries

Huguens Jean

1:00pm Friday, 19 December 2015, ITE 325b

In developing countries, people are now more likely to have access to a mobile phone than clean water, making cellular based technology the only viable medium for collecting, aggregating, and communicating local data so that it can be turned into useful information. While mobile phones have found broad application in reporting health, financial and environmental data, many data collection methods still suffer from delays, inefficiency and difficulties maintaining quality. In environments with insufficient IT support and infrastructure, and among populations with limited education and experience with technology, paper forms rather than electronic methods remain the predominant means for data collection.

To meet the digitization needs of paper driven data collection practices in developing countries, SHREDDR proposes an end-to-end architecture that transforms paper form images into structured digital information on-demand. To facilitate the automatic extraction of input regions in form images, this thesis extends the SHREDDR architecture with the necessary capabilities to efficiently classify form images according to their template document. Specifically, it introduces a novel framework for visually identifying form templates by decomposing the template identification problem into three distinct tasks: retrieval, learning and matching (RLM).

Given a query form instance, the retrieval component finds and ranks the topmost h similar templates. If h>1, the matching component uses full image registration to conduct a more rigorous assessment of the visual similarity between the query form instance and the candidate templates. After matching, the retrieval’s preliminary ranking is adjusted, if necessary. The topmost candidate template with the highest registration score satisfying a global alignment threshold denotes the input form’s template. Based on the answer obtained from matching, the learning component updates the retrieval so that it can provide a better ranking in future searches. If h=1, the RLM bypasses matching and uses the retrieved template as the final classification.

Based on the proposed framework, the present thesis investigates form classification under the conditions of known and unknown template classes. A pilot study integrating the RLM into the SHREDDR system demonstrates its classification accuracy and its impact on digitization efficiency.

Committee: Drs. Timothy Oates (Chair), Fow-Sen Choa, Janet Rutledge, Jesus Caban, Nilanjan Banerjee

Anupam Joshi named an IEEE Fellow

CSEE Professor Anupam Joshi has been named an IEEE Fellow, recognized for his for contributions to security, privacy and data management in mobile and pervasive systems. This designation is conferred by the IEEE Board of Directors on individuals with an outstanding record of accomplishments in any of the IEEE fields of interest and is recognized by the technical community as a prestigious honor and an important career achievement. No more than 0.1% of the total IEEE voting membership can be selected in a year.

Joshifinal

Dr. Joshi joined UMBC’s faculty in 1998 and currently is the Oros Family Professor of Technology and Director of the UMBC Center for Cybersecurity. He previously held faculty appointments at the University of Missouri, Columbia and Purdue University. He received a Ph.D. in Computer Science from Purdue University and a B. Tech in Electrical Engineering from the Indian Institute of Technology, Delhi. While at UMBC he has taught both undergraduate and graduate courses in operating systems, mobile computing and security. He developed and teaches an Honors College seminar on “Privacy and Security in a Mobile Social World”. He has mentored nine Ph.D. graduates and a large number of M.S. students.

Joshi has made many contributions to the design, analysis and development of intelligent systems for mobile, social and secure computing. Twenty years ago he was one of a handful of researchers who recognized that mobility introduced new challenges for data management, security and privacy over and above those brought about by wireless connectivity. His key insight was to model mobile and pervasive systems as distributed systems that are both open, in that they do not pre-identify a set of known participants, and dynamic, in that the participants change regularly.

He observe that applications on mobile devices require greater degrees of decision making and autonomy as they become increasingly sophisticated and intelligent and can’t always assume connectivity to central servers. Entities in these pervasive computing systems must exchange information about the data and services offered and sought and their associated security and privacy policies, negotiate for information and resource sharing, be aware of their context, and monitor for and report on suspicious or anomalous behavior. Dr. Joshi has addressed these challenges across the stack, from network protocols to data management to policy controlled interactions between autonomous entities.

Much of his research has been done in collaboration with colleagues in industry such as IBM, Microsoft, Northrop Grumman and Qualcomm. It has been funded by not just them, but also NSF, DARPA, AFOSR, ARL, NIST and other federal agencies. Joshi has published prolifically with more than 200 publications in refereed journals and conferences, many of which are highly cited. He has served as the General or Program Chair of many key conferences including the IEEE International Conference on Intelligence and Security Informatics which will be held in Baltimore in May 2015.

The IEEE is the world’s leading professional association for advancing technology for humanity. Through its 400,000 members in 160 countries, it is a leading authority on a wide variety of areas ranging from aerospace systems, computers and telecommunications to biomedical engineering, electric power and consumer electronics. Dedicated to the advancement of technology, the IEEE publishes 30 percent of the world’s literature in the electrical and electronics engineering and computer science fields, and has developed more than 900 active industry standards.

MS defense: Epileptic Seizure Detection using Symbolic Aggregate Approximation and Bag of Patterns

MS Thesis Defense

SAX-BOP: Epileptic Seizure Detection using
Symbolic Aggregate Approximation and Bag of Patterns

Sidharth Allani

1:00pm Friday, 12 December 2014, ITE 325b

Epilepsy is a chronic neurological disorder that makes patients susceptible to experiencing recurrent seizures. A seizure occurs when abnormal activity in the brain leads to involuntary body moment, lack of awareness or behavior, short-term loss of memory or attention, short-term unconsciousness, or body convulsions. Epilepsy affects three million people in the United States and accounts for $15.5 billion in direct and indirect costs.

Epilepsy has many different causes, and often no definite cause can be found. Patients who suffer from intractable seizures experience unpredictable and frequent seizures that cannot be controlled using anti-seizure drugs. Such seizures leave the patient traumatized and, due to their uncertainty, the patient’s mobility and independence are restricted, resulting in social isolation and economic hardship.

The research in this thesis aims to detect epileptic seizures and to analyze the performance of Symbolic Aggregate approXimation and the Bag of Patterns representation for seizure event detection. We use Electroencephalogram (EEG) recordings as the data source for seizure detection, which is the recording of electrical activity along the scalp that measures ionic current flows within the neurons of the brain. These signals are a good source of information about abnormal activity in the brain and are helpful in the process of epileptic seizure detection. This problem becomes challenging because of the enormous size of the EEG data, making it difficult to effectively and efficiently analyze these signals and detect a seizure. We use Symbolic Aggregate approXimation (SAX) and the Bag of Patterns Representation (BOP) and analyze their performance with EEG time series data to detect seizures.

Committee: Drs. Tim Oates (chair), Tim Finin and Tinoosh Mohsenin

Dr. Rick Forno discusses infrastructure security with SIGNAL magazine

cyber attacks

In the December 2014 issue of AFCEA’s SIGNAL Magazine, CSEE’s Dr. Rick Forno comments on the likelihood of a destructive cyberattack on critical American infrastructure. He was one of several experts discussing US Cyber Command’s worry about such potential incidents and how it might respond.

He believes a major cyber attack against critical infrastructure is more likely from a rogue terrorist or criminal group than a nation-state. However, he says that although the possibility for a nation-state to launch attacks remains a valid concern, the probability of such an event remains fairly low. Moreover, Forno points out that a destructive attack could hinder an adversary’s own operations. “You can’t collect intelligence on an enemy or communicate if the Internet is down,” he says. “That may play into a nation-state’s calculus about what type of attack they might employ in a given situation.”

PhD Proposal: Learning Representation and Modeling Time Series

Ph.D. Dissertation Proposal

Learning Representation and Modeling Time Series

 Zhiguang Wang

10:00-12:00 Friday, 12 December 2015, ITE 325B

Most real-world data has a temporal component, whether it is measurements of natural (weather, sound) or man-made (stock market, robotics) phenomena. Analysis of time-series data has been the subject of active research for decades and is still considered to be a challenge in machine learning and data mining due to the properties of temporal data.

Traditional approaches for modeling and representing time-series data fall into three categories. Non-data adaptive models, such as Discrete Fourier Transformation (DFT), Discrete Wavelet Transformation (DWT), and Discrete Cosine Transformation (DCT), compute the transformation with an algorithm that is invariant with respect to the data. Data adaptive approaches such as Symbolic Aggregation approXimation (SAX), Piecewise Linear Aggregation (PLA), and shapelets compute transforms that are highly dependent on the data. In model-based approaches such as AutoRegressive Moving Average models (ARMA), Linear Dynamical Systems (LDS), and Hidden Markov Models (HMMs), the underlying data is assumed to fit a specific type of model. The estimated parameters can then be used as features in, for example, a classifier.

However, more complex, high-dimensional, and noisy real-world time-series data are often difficult to model because the dynamics are either too complex or unknown. Traditional shallow methods, which contain a small number of non-linear operations, might not have the capacity to accurately model such complex systems.

We develop and verify three different approaches to represent and model time-series. Time-Warping SAX and Pooling SAX are two extensions of the vanilla SAX approach that is used as a symbolic representation of time series. Time-Warping SAX extracts linear temporal dependencies by building a time-delay embedding vector to construct more informative SAX words. Pooling SAX applies a non-parametric weighting scheme to extract significant variables. These are data adaptive models that achieve state-of-the-art accuacy on time-series classification problems.

We also propose the Gramian Angular Field (GAF) and Markov Transition Field (MTF) as two novel approaches to encode a time-series as an image. These representations not only demonstrate potential for visual inspection by humans, but when they are combined with deep learning approaches (Convolutional Network and Denoised Auto-encoders) they achieve excellent performance compared to other modern algorithms on classification and regression/imputation problems. GAF and MTF are non-data adaptive approaches that allow us to learn models and extract the abstract representations supported by model-based approaches.

Finally, we propose to model time-series by learning the representation directly from the raw data with model-based approaches. We will develop recurrent auto-encoders, in which the global optimum is ensured by a new Adaptive Risk-Averting/Seeking Criterion, to model the real/complex time series (dynamical systems) by learning the implicit data generating distribution over time. This model will be applied to tasks such as classification, regression/imputation, and anomaly detection.

Committee: Drs. Timothy Oates (Chair), James Lo (Math), Yun Peng and Matt Schmill

1 57 58 59 60 61 142