Khaled Khasawneh (CS PhD) has been invited to give a talk at the 2018 IBM Workshop on Architectures for Secure, Cognitive, and Datacenter Computing, held at IBM Research in Yorktown, NY. This workshop is an invitation-only workshop organized by IBM Research to bring top PhD students as well as leading researchers to interact wi
The fake news detection work by the Multi-aspect Data Lab was featured in a Science News article. In this work, Prof.
Ph.D. students Esmaeil Mohammadian Koruyeh (pictured) and Khaled Khasawneh, working with Prof.'s Chengyu Song and Nael Abu-Ghazaleh, discovered a new variant of the specter class vulnerability which targets speculative execution in modern CPUs.
Runtime changes, like screen rotation/resizing, or keyboard attachment, commonly occur during the user interaction with mobile apps. However, as shown by Umar Farooq and Prof. Zhao, such simple changes can cause inappropriate behaviors, or even crashes, for mobile apps.
Congratulations to our UCR Computer Science students Saheli Ghosh, Shirin Haji Amin Shirazi, Wendy Li, Elise Lin and Fatemah Alharbi on receiving a GHC Scholarship Grant to attend this year’s Grace Hopper Celebration for Women in Computing!
The chapter activities this year focused on preparing members with the technical and professional skills. The chapter hosted over 30 technical workshops with participation from members, alumni, and invited industry professionals.
Congratulations to Prof. Zhao for winning a CAREER award, the most prestigeous National Science Foundation grant for young faculty!
Vipin Kumar, University of Minnesota - ABSTRACT: The climate and earth sciences have recently undergone a rapid transformation from a data-poor to a data-rich environment.
Dongyoon Lee, Virginia Technical University
Francesco Regazzoni --- The security of cryptographic algorithms is based on hardness assumptions. They aim to ensure that an adversary cannot solve the underlying hard problem even with a vast amount of resources. Until recently, these assumptions mainly concentrated on the intractability of solution with respect to a classical computing paradigm.