Skip to main content

CIS News and Events

Former CIS Student (2014 grad from PCS-LC) Anthony Edwards Jr. was featured in a Thillist article: How This Restaurant Directory App Is Helping Black-Owned Restaurants Around the Country


Sofia Ongele, a (class of 2022) student at Fordham University and Swift Student Challenge winner, describes her inspiration for creating the ReDawn app for women who experience sexual assault. She speaks on "Bloomberg Technology."..


Combining Evidence for Cross-language Information Retrieval

By: Petra Galuscakova
Time: Tuesday, March 31, 10 - 11 a.m.. Eastern Time

Join the Zoom Meeting for Combining Evidence for Cross-Language Information Retrieval
Meeting ID: 763 328 364

Abstract: System combination has been extensively studied in monolingual information retrieval, but the problem is understudied in cross-language retrieval in which queries are expressed in one language, but documents are written in another. One notable characteristic of cross-language retrieval, however, is the potential for a greater diversity of system design, since translation and retrieval components both exhibit substantial design spaces. Due to the large diversity of the systems in cross-language retrieval, the potential range of combinations is orders of magnitude larger than in monolingual applications.

I show that evidence combination works well in cross-language retrieval, achieving improvements of 40% relative to the best single system. The best results are obtained using post-retrieval evidence combination, which is able to incorporate many diverse high-quality systems. Because hundreds of different systems can be built, the effectiveness of alternative approaches for managing the complexity is also explored. Both system clustering and expert judgment regarding diversity can help to limit the combinatorial growth of time complexity arising when selections among large numbers of systems need to be made.

Bio: Petra Galuscakova is a postdoctoral researcher at the University of Maryland, College Park working with Prof. Doug Oard. She is broadly interested in information and multimedia retrieval and she is presently working on cross-language information retrieval in low resource languages. She completed her Ph.D. in computational linguistics at Charles University in Prague. Her prior work has investigated methods for effective search and navigation in multimedia archives.


Interpretability by Design: New Interpretable Machine Learning Models and Methods

By: Chaofan Chen
When: Monday, March 30, 1 - 2 p.m., Eastern Time

Join the talk by Zoom Meeting for Interpretability by Design
Meeting ID: 524 901 664

Abstract: As machine-learning models are playing increasingly important roles in many real-life scenarios, interpretability has become a key issue for whether we can trust the predictions made by these models, especially when we are making high-stakes decisions. Lack of transparency has long been a concern for predictive models in criminal justice and in health care. There have been growing calls for building interpretable, human-understandable machine-learning models, and “opening the black box” has become a debated issue in the media. Chaofan Chen's research addresses precisely the demand for interpretability and transparency in machine-learning models. The key problem of Chen's research is: “Can we build machine learning models that are both accurate and interpretable?”

To address this problem, Chen will discuss the notion of interpretability as it relates to machine learning, and present several new interpretable machine-learning models and methods he developed in his research. In particular, he will first give an overview of his research by discussing two types of model interpretability—predicate-based and case-based interpretability, and highlighting the contributions he has made. Chen will then focus on the topic of case-based interpretability for computer vision, in the remaining part of my talk. More specifically, I will present my work in developing deep neural networks that are able to reason about images by saying “this looks like that,” just like how we humans would explain to others on how to solve challenging image classification tasks. These networks are able to learn a meaningful latent embedding space that captures the notion of visual similarities and a set of prototypical cases for comparison. Given a new image, they are able to identify similar prototypical cases using distances in the latent space and make predictions according to the known class labels of those prototypical cases. The experiments on MNIST (for handwritten digit recognition) and CUB-200-2011 (for bird species identification) show that the case-based interpretable networks can achieve comparable accuracy with its analogous non-interpretable counterpart and at the same time, provide a level of interpretability that is absent in attention-based interpretable deep models. Indeed, as Chen's work has demonstrated, we can build machine learning models that are both accurate and interpretable by designing novel model architectures or regularization techniques.

Bio: Chaofan Chen attended the University of Chicago and graduated with a Bachelor of Science in Mathematics (with honors). He began doctoral studies in computer science at Duke University in 2014. He was awarded the Outstanding Ph.D. Preliminary Exam Award in 2018 and the Outstanding Research Initiation Project Award in 2017 by the Department of Computer Science at Duke University. He pursued his research in the area of interpretable machine learning under the direction of Professor Cynthia Rudin.


Dr. Thaier Hayajneh is inviting faculty and students to the following scheduled Zoom presentation.

Studying Security Tasks Through the Lens of Brain-Computer Interface

By: Muhammad Lutfor Rahman
Time: Wednesday, March 25, 10 a.m. Eastern Time (US and Canada)

Join the Zoom Meeting for Studying Security Tasks Through the Lens of Brain-Computer Interface
Meeting ID: 528 464 356
Password: 010206

Abstract: Traditional security research focuses on securing the hardware and software stack of cyber systems, and less focus on how humans weaken the cybersystem. All kinds of preventive, mechanisms from traditional research might be in vain if a user falls for a phishing attack. Attackers usually target the weakest link of the security chain, and humans are considered as one of the weakest links. We have observed a surge of phishing and social engineering attacks in the past few years, and many large corporations were penetrated through targeted/spear-phishing attacks. Hence, I explore cybersecurity through an unconventional approach by studying human brains and unfolding some of its mysteries. In this talk, I will present my recent projects on utilizing Brain-Computer Interface to enhance the security of web browsing and the privacy of personal devices. For the phishing study, we explore the feasibility of utilizing neural activities for automated phishing detection. With improved data preprocessing techniques and feature extraction methods, we showed that it is possible to utilize differences at the neural activity level to detect phishing websites. For the access control study, we explore the feasibility of utilizing neural activities to infer the user’s high-level intents while using an app. The inferred intent can then be utilized to automate authorization access to privacy-sensitive sensors and files.

Bio: Muhammad Lutfor Rahman is a Ph.D. candidate and Associate Instructor in Computer Science and Engineering at the University of California, Riverside. He is working with Dr. Chengyu Song. His research interest lies in the intersection of cybersecurity, human factors in security, and Brain-Computer Interface (BCI). His work published at top tier conferences, including CCS, ECMLPKDD, and ACSAC, and received significant media coverage by more than 600 high-profile media outlets (e.g., Phys, MIT Technology Review, ZDNet) in more than twenty languages worldwide. He has experience of working as a visiting researcher with the US Army Research Laboratory team in the summer of 2018 and 2019. He worked for more than five years as a software engineer in multiple companies. He gained teaching experience by working four quarters as a primary instructor and four semesters as a teaching assistant. He received his MS from the University of Alabama at Birmingham in 2014 and BS from Bangladesh University of Engineering and Technology in 2009. As an outreach activity, he has been leading a non-profit, Education Foundation (efcharity.org) for promoting rural underprivileged students in Bangladesh since 2010. More than 20,000 students from 71 rural area schools impacted through this foundation.

2020

Intellectual Property Security: Challenges and New Frontiers

By: Sheikh Ariful Islam

Time: Tuesday, March. 24 at 10 a.m. Eastern Time (US and Canada)
Join the Zoom meeting for "Intellectual Property Security: Challenges and New Frontiers"

Abstract: The emergence of billions, smart, connected, and deeply embedded devices has led to Cyber-Physical System (CPS). The complexity of CPS has opened new opportunities for malicious attacks. The current globalized and decentralized Integrated Circuit (IC) business model faces several security challenges including overbuilding, counterfeiting, piracy, and hardware trojan. The existing protection mechanisms against Intellectual Property theft face several challenges in terms of performance overhead and are more vulnerable to side-channel attacks. In this talk, we will first discuss the major security issues of hardware protection. We will then describe the role of High-Level Synthesis (HLS) for hardware obfuscation early-on during the design cycle. Further, we will discuss DLockout, which locks out the design when finite, but incorrect trials are made from which recovery is only possible by legal authorities. We will then present camouflaging to increase the difficulty of reverse engineering followed by the resistance of proposed techniques against side-channel attacks. The novelty of proposed approaches is that we are free from storing the key bit in memory. The HLS-based Register Transfer Level (RTL) obfuscation technique which is application-agnostic results in the area, delay, and power overhead of 2.45%, 2.65%, and 2.61% respectively for a 32-bit key.

Bio: Sheikh Ariful Islam received his B.Sc. degree in Electronics and Communication Engineering from Khulna University of Engineering and Technology, Bangladesh, in 2011. From 2011 to 2013, he worked as a full-time faculty in Northern University Bangladesh. Currently, he is working towards Ph.D. degree in Computer Science and Engineering at the University of South Florida, Tampa, FL. His current research focuses on the development of security-driven hardware synthesis tools and cyber-physical systems. He completed an internship at ON Semiconductor, Idaho in Fall 2018. Arif received the best paper nomination at the 2018 AsianHOST Conference and is a recipient of the DAC Richard Newton Young Fellow award in 2016. He has served in the Technical Program Committee in IEEE Dependable and Secure Computing and as a reviewer for several IEEE and ACM publications. He has published nine (9) conference proceedings and journal articles and currently six (6) works are under review.


Large-Scale and Robust Software Authorship Identification with Deep Feature Learning

By: Mohammed Abuhamad
Time: Mon. Mar 23, 2020, 9:10 a.m. Eastern Time (US and Canada)

Join the Zoom Meeting for Large-Scale and Robust Software Authorship Identification with Deep Feature Learning
Meeting ID: 631 463 371

Abstract: Software authorship identification is the process of software developer identification by associating a programmer to a given code based on the programmer's distinctive stylometric features. The software can be presented with the original source code or the executable binaries, which can be decompiled to generate pseudo-code as higher-level construction of the binary instructions. Successful software authorship de-anonymization has both software forensics applications and privacy implications. However, the process requires an efficient extraction of authorship attributes. The extraction of such attributes is very challenging, due to various software code formats from executable binaries with different toolchain provenance to source code with different programming languages. Moreover, the quality of attributes is bounded by the availability of software samples to a certain number of samples per author and a specific size for software samples. To this end, this work proposes a deep Learning-based approach for software authorship attribution, that facilitates large-scale, format-independent, language oblivious, and obfuscation-resilient software authorship identification. The proposed approach incorporates the process of learning deep authorship attribution using a recurrent neural network, and ensemble random forest classifier to de-anonymize programmers. Comprehensive experiments are conducted to evaluate the proposed approach over the entire Google Code Jam (GCJ) dataset across all years (from 2008 to 2016) and over real-world code samples from 1987 public repositories on GitHub. The results of our work show high accuracy despite requiring a smaller number of samples per author.

Bio: Mohammed Abuhamad is a Ph.D. candidate in the Department of Computer Science at the University of Central Florida (UCF), and a Ph.D. candidate in the Department of Computer Engineering at INHA University. He received his Master's degree in Information Technology (Artificial Intelligence) from the Faculty of Information Science and Technology, National University of Malaysia. Mohammed Abuhamad is a member of the Security Analytics Research Lab at UCF, and the Information Security Research Lab at INHA. His research interests include software security, authentication, privacy, and deep learning-based applications to information security.


Spring 2020 CIS Seminar Series

The Future of Narrative

Speaker: Justus Robertson
Postdoctoral Research Associate, University of York
Date: Thursday, March 5th
Location: JHM 302
Abstract: What do computer games, storytelling, artificial intelligence, and Star Trek: The Next Generation have in common? The answer is: the holodeck, an immersive virtual reality facility capable of shaping dynamic stories around the live actions of human participants. This talk presents the history and future of automated interactive narrative with a focus on the scientific and engineering challenges that stand between us and a narrative controller fit for the holodeck.

Bio: Dr. Justus Robertson received a Ph.D. in Computer Science from North Carolina State University where he studied video games, symbolic planning, cognitive psychology, and their applications to interactive storytelling. He is currently a postdoctoral research associate in the Department of Theatre, Film, Television and Interactive Media at the University of York where he is researching data-driven storytelling in applied real-world domains, like eSports.


Neuroimaging for Mental Disorders Research

Speaker: Xiaofu He Assistant Professor, Columbia University Medical Center
Date: Wednesday, March 4
Location: JMH 302

Abstract: ​Mental disorders are common throughout the United States, affecting an estimated nearly one in five U.S. adults. Mental disorders are the leading cause of disability in the U.S. which greatly influences Americans lives. Although the latest neuroimaging techniques can be used to study brain structure and function, mental disorders are still not yet objectively diagnosed by neuroimaging. Moreover, the mechanism of cause-and-effect relationships between the human brain and behavior for mental disorders is still unknown. In this talk, I will discuss how we can use neuroimaging techniques (focus on Diffusion Tensor Imaging and fMRI) to identify brain biomarkers for mental disorders and how we can use real-time fMRI neurofeedback to investigate the cause-and-effect relationships between brain and behavior which can be applied to psychiatric disorders.

Bio: Dr. Xiaofu He, Assistant Professor of Clinical Neurobiology at Columbia University Medical Center and a Research Scientist at New York State Psychiatric Institute. He is also a Faculty member at the Data Science Institute, Columbia University. Dr. He has a broad background in computer science, machine learning, neuroscience, and brain imaging. His research interests include developing brain imaging data analysis tools, exploring new diagnosis and prediction methods using machine learning including deep learning, and investigating potential treatments using real-time fMRI/fNIRS/EEG neurofeedback, which he is currently applying to psychiatric disorders.


Invited Talk in Cybersecurity 
By: Mohamed Rahouti

Tuesday, March 3 at JMH 302   

Title:  A Dynamic Threshold-Based Modular Framework for SYN Flood Attack Detection and Mitigation Using SDN

Abstract: Denial of Service (DoS) attacks and in particular, SYN flood attacks (half-open attacks) have been proven a serious threat to Software-Defined Networking (SDN)-enabled environments. A variety of Intrusion Detection and Prevention Systems (IDPS) have been introduced for identifying and preventing such security threats, but they often result in significant performance overhead and response time. In addition to this shortcoming, previously proposed solutions are based on a static detection threshold that needs to be manually set prior to deployment. Therefore, those existing solutions are inflexible for at-scale networks as the malicious traffic rate may continuously change over time.

As the centralized control capability of SDN presents a unique opportunity for enhancing Quality of Service (QoS) and security in networks, in this talk, I will present a novel and dynamic threshold-based kernel-level intrusion detection and prevention system to address these challenges through leveraging SDN capabilities and filtering mechanisms. The proposed solution is based on a self-adjusted detection threshold that aligns with the legitimate and malicious traffic rates in order to guarantee an efficient response to threats with optimal delay.  

Bio: Mohamed Rahouti received an M.S. degree in Statistics in 2016 at the University of South Florida and is currently pursuing a Ph.D. degree in Electrical Engineering at the University of South Florida. Mohamed holds numerous academic achievements in the area of computer science and engineering. His current research focuses on computer networking, Software-Defined Networking (SDN), and network security with applications to smart cities.


The Geometry of Functional Spaces of Neural Networks

Speaker: Matthew Trager Post-doc Researcher, New York University
Date: Wednesday, Feb. 26
Location: LL 601

Abstract: The reasons behind the empirical success of neural networks are not well understood. One important characteristic of modern deep learning architectures compared to other large-scale parametric learning models is that they identify a class of functions that is non-linear, but rather has a complex hierarchical structure. Furthermore, neural networks are non-identifiable models, in the sense that different parameters may yield the same function. Both of these aspects come into play significantly when optimizing an empirical risk in classification or regression tasks.

In this talk, I will present some of my recent work that studies the functional space associated with neural networks with linear, polynomial, and ReLU activations, using ideas from algebraic and differential geometry. In particular, I will emphasize the distinction between the intrinsic function space and its parameterization, in order to shed light on the impact of the architecture on the expressivity of a model and the corresponding optimization landscapes.

Bio: Matthew Trager is a post-doc at the Center for Data Science at New York University. He has a Master’s degree in mathematics from the University of Pisa and Scuola Normale Superiore, and a "Master 2" degree in Mathematics, Machine Learning and Computer Vision from École Normale Supérieure de Cachan. He completed his PhD in computer science at École Normale Supérieure of Paris, under the supervision of Jean Ponce and Martial Hebert. During his PhD, he worked on the geometry of vision. He is now interested in mathematical aspects of deep learning.


Understanding security threats with data-driven and human-centered approaches

By Doowon Kim

Tuesday, February 25 at JMH 302

Abstract: Recent cyberattacks involve various actors including diverse adversaries, where each actor plays subtle but prominent roles. It is essential to understand the real-world actors from various aspects to mitigate security threats and protect end-users from the threats. In this talk, I will present fundamental findings from several measurements and user studies exploring and understanding the unique behaviors of adversaries as well as benign software developers that cause various security incidents. First, I will discuss the malicious actor, adversaries: particularly, how they abuse the Code-Signing Public Key Infrastructure (PKI) by exploiting the weaknesses in other actors (i.e., certificate authorities, publishers, and end-users). Second, I will describe why benign software developers often fail in secure development and present blueprints for improvement. Finally, I will conclude by discussing my future research directions in understanding new security threats and actors from emerging technologies (e.g., IoT).

Bio: Doowon Kim is a Ph.D. candidate in the Department of Computer Science at the University of Maryland, College Park. His research focuses on data-driven security and usable security. Specifically, he investigates the root causes of security threats by better understanding actors (e.g., adversary and end-users) involved, with data-driven and human-centered perspectives. Moreover, his work covers the Code-Signing PKI, the Web PKI, and the security behaviors of benign software developers. His research has resulted in a real-world impact on the Code-Signing PKI and has generated interest from media such as Ars Technica, The Register, Schneier on Security, and Threatpost. He is a recipient of the NSA Best Scientific Cybersecurity Paper Award and Ann G. Wylie Dissertation Fellowship.


Built-in Security and Resilience for Assured Autonomy: A Unified Game, Decision, and AI Approach

By Juntao Chen
Thursday, Feb. 20 at JMH 342

Abstract: Mobile autonomous systems (MAS) are increasingly important due to their wide application in mission-critical tasks, such as surveillance, search, and rescue. Enabled by the Internet of Things (IoT) devices, multiple heterogeneous MAS can also be integrated together as a multi-layer MAS network to offer holistic services. On one hand, the networked MAS can improve the interoperability between different systems. On the other hand, it creates new challenges for enhancing the real-time security and resiliency of autonomy at different scales against cyber-physical attacks. To achieve assured autonomy, I will first establish universal metanetwork modeling which offers a gestalt view of heterogeneous autonomous components, and by leveraging which we can analyze the performance of the global MAS. Then, I will discuss metagame-theoretic approaches to enable decentralized and interdependent decision making between different operators under adversarial attacks. I will also provide AI-enabled algorithms for the online implementation of policies that yield a high level of autonomy in a dynamic environment. In the second part of the talk, I will also briefly discuss how to design strategic trust mechanisms for achieving assured cloud-enabled autonomy. Finally, a number of future research directions on AI and learning for human-centered cyber-physical security will be elaborated.

Bio: Juntao Chen is currently a final-year Ph.D. candidate at the Department of Electrical and Computer Engineering of Tandon School of Engineering, New York University (NYU). He received the B.Eng. degree in Electrical Engineering and Automation from Central South University, China, in 2014. He has published more than 25 research papers and a book. He is a recipient of the Ernst Weber Ph.D. Fellowship and Dante Youla Award for Graduate Research Excellence from NYU. He
is a research associate of the Laboratory for Agile and Resilient Complex Systems (LARX) and a member of Center for Cybersecurity (CCS) at NYU. His research interests include cyber-physical systems, security and resilience, game and control theory, and artificial intelligence. 


Program Analysis and Testing for Reliable Android and Wear Apps

Feb 18
JMH 330
Hailong Zhang, Ph.D. candidate, Ohio State Univ.

Abstract: Due to the widespread use of Android devices and apps, it is important to develop tools and techniques to improve app quality and performance. However, traditional program analyses cannot be used directly for Android apps because of their unique characteristics.

In this talk, I will discuss program analysis specific for control-flow modeling and testing of software for regular Android and Android Wear. I will introduce effective hybrid techniques with static control/data-flow analysis, automated test generation and runtime monitoring for detection of resource leaks in apps.

Bio: Hailong Zhang is a Ph.D. candidate in the Departments of Computer Science and Engineering at the Ohio State University, where he works with Prof. Atanas Rountev. Before that, he graduated from the Beijing University of Posts and Telecommunications with a Master and a Bachelor degree. His research interests revolve around problems that are related to software reliability, security, and privacy. His current focus is on foundational program analysis and testing of apps for mobile and wearable devices and privacy-preserving software analysis and analytics. Refreshment and coffee provided.

2019

CAE Certificate Ceremony, Tuesday May 7, 2019, 5:30 PM
Fordham University School of Law, Constantino Room
Hosted by Professor Thaier Hayajneh
View the evite.


Google @ LC
RSVP for Event
Tuesday, March 12th 2019, 5:30 pm - 7:00 pm EDT
McMahon Hall 109, Lincoln Center 

Join us for a talk by Google Engineer James Apfel (FCRH '17) as he gives us a peek behind the curtain at some of the Math and Computer Science that makes Google tick! All years, majors, and degree levels welcome! 


GSAS Futures / Office of Career Services
Presents a Conversation on Careers in Data Science and Cybersecurity
Wednesday, November 13, 2019 | 2:30 – 4:00 p.m. | Lincoln Center Campus |
Lowenstein South Lounge

Data analysis and information security analysis are two of the most in-demand skill sets of the twenty-first century. In today’s information economy, a growing number of organizations and corporations are relying on team members with the capacity for data visualization and analysis to drive strategic decision-making and actions. In addition, organizations and companies in a range of industries are calling for cybersecurity specialists to plan and implement security measures to protect their information systems and networks from vulnerabilities.

GSAS Futures and the Office of Career Services invite all students in the GSAS community to join a panel of data scientists and cybersecurity specialists for a special conversation on career opportunities in these fields. The panel event is pertinent to both students actively enrolled in computer science-based disciplines and those in outside fields with an interest in data analysis and information security. Panelists will reflect on their professional journeys, their day-to-day routines as data professionals, and strategies for interviewing effectively and landing jobs in data science and cybersecurity.

Panel participants include Fordham alumni and influential professionals in the New York City metropolitan region. They include:

  • Rocco Grillo, Managing Director, FCRH ‘89, Global Cyber Risk Services, Alvarez and Marsal
  • Krystin Vitale, GSAS ’16, Data Scientist at Consolidated Edison
  • Matias Berretta Magarinos, GSAS ‘19, Data Scientist at Health First

Note: A limited number of internship opportunities are available at Alvarez and Marsal in the summer of 2020. This event is an excellent opportunity for interested students to become acquainted with current employees from the well-regarded cybersecurity firm.

The panel will be moderated by Yijun Zhao, Ph.D., Assistant Professor and Program Director, M.S. Data Analytics. Lunch will be served.

RSVP here.

2018

Added November 9, 2018

Data Incubator Fellowship

The Data Incubator is an intensive 8 week fellowship that prepares masters students, PhDs, and postdocs in STEM and social science fields seeking industry careers as data scientists. The program is free for Fellows and supported by sponsorships from hundreds of employers across multiple industries.

Anyone who has already obtained a masters or PhD degree or who is within one year of graduating with a masters or PhD is welcome to apply. Applications from international students are welcome.

Apply for the fellowship for next session which will run from 2019-04-01 to 2019-05-24.


Added October 2, 2018

IT Seminar/Cyber Security
From Victim to Victor: Best Practices to Protect Your Business and Yourself Personally
Wednesday October 10, 2018 | 3 - 5 p.m.
Fordham University
113 W 60th St, New York, NY 10023
Location: LL South Lounge

Ileana Van Der Linde, Executive Director for J.P. Morgan Asset & Wealth Management (AWM) Cybersecurity Awareness Global Program Lead

Ileana leads AWM’s Cybersecurity Awareness Program – educating clients and employees globally on how to better protect themselves and those they work with from increasing cybersecurity threats. Ileana’s team develops timely cybersecurity education materials on various topics  to help address the needs of wealthy individuals, family offices, businesses and others, so they are better prepared to deal with the reality of cyber threats. Ileana has a Bachelors degree from Georgetown University, and MBA from Columbia Business School.

Thaier Hayajneh
Director, Fordham Center of Cybersecurity
University Professor, Computer Science
Program Director, M.S. in Cybersecurity
Thaier Hayajneh, Ph.D. is the founder and director of Fordham Center for Cybersecurity, University Professor of Computer Science, program director of MS in Cybersecurity at Fordham University, New York. He served on several NSF Cybersecurity review panels and serves as a CAE reviewer and mentor for NSA. His research focuses on cybersecurity and networking, including wireless security, applied cryptography, blockchain and cryptocurrency. He published over 70 conference and journal papers and serves as editor, associate editor, guest editor and reviewer for several prestigious journals.


Added September 17, 2018

Clavius Distinguished Lecture Comets, Craters, and Calendars: Christopher Clavius, S.J. (1538 - 1612)
Monday, October 1, 2018 | 1 p.m.
Bepler Commons | Faber Hall
Rose Hill Campus

In this year marking the 480th anniversary of the birth of Christopher Clavius, S.J., it seems appropriate for this lecture series, named in his honor, to focus on his life and legacy. That legacy ranges from the Gregorian calendar, which is the calendar that we all use today, to the Stanley Kubrick film 2001: A Space Odyssey. It ranges from popular textbooks to worldwide curricular reform. And it ranges from the history of science in China to the Vatican Observatory, which Pope Gregory XIII established in 1580 to help confirm and refine astronomical observations made in support of Clavius’ reform of the Gregorian calendar. Paul Mueller, S.J., who serves as vice director of the modern-day Vatican Observatory, will explore Clavius’ life and work in their early-modern context and illuminate his enduring legacy for modern science, religion, and culture.


Google @ Fordham
Join us for our Google at Fordham event, this talk will help students gain insights on the hiring process and how to pass technical interviews at Google and throughout the tech industry!

Wednesday, September 19, 2018
Keating 3rd Floor Auditorium
4 - 6 p.m.


Added August 28, 2018

2018 CAE Virtual Career Fair

Last year the Centers of Academic Excellence in Cybersecurity hosted the first Virtual Career Fair, sponsored by CyberWatch West and the National Science Foundation, for the students and alumni of CAE designated institutions. A total of 637 students/alumni and 69 employers participated in the career fair with initial survey data indicating the event was well perceived by students/alumni and employers.

This year the Centers of Academic Excellence in Cybersecurity is hosting the second CAE Virtual Career Fair, sponsored by Cyber Watch West and the National Science Foundation, on October 5, 2018, from 9 a.m. - 1 p.m. PT. The job fair will connect students from CAE designated schools with employers looking to fill internships, part-time positions, and full-time positions. Each student will be required to upload a resume before attending the CAE Virtual Career Fair. Students in Cyber Security degrees from schools designated as Centers of Academic Excellence in Cyber Security (CAE-C), Cyber Defense (CAE-CD), Cyber Operation (CAE-CO) are invited.


Added May 11, 2018

Central Jersey Technology Job Fair

May 15, 2018
11 a.m. - 1 p.m.
Bell Works
101 Crawfords Corner Rd

Join us for the 2018 Central Jersey Technology Job Fair coming to Bell Works on Tues., May 15 from 11 a.m. to 1 p.m. Employers will be accepting resumes and conducting on-site interviews for open technology positions, including project management, cybersecurity, IT, software development, help desk technicians and more. This event is free and registration is not required.


Distinguished Lecture Speaker: Prof. Yike Guo

Big Data for Better Science
Founding Director of the Data Science Institute (DSI), Imperial College London, UK
Date: April 26, 2018
Time: 6 p.m.
Venue: 12th Floor Lounge, Corrigan Conference Center, Lowenstein Center, Lincoln Center Campus


FinTech Conference

The Fordham FinTech Network's 2nd Annual FinTech Conference gathers college and graduate school students, faculty and professionals across New York City to celebrate and learn more about the innovation and evolution of the converging financial technology industry.

Join us as we explore the future of the fintech industry on Tuesday, April 24, 2018 from 5 - 9 p.m..

The event will take place at Fordham University – Lincoln Center (113 W 60th St. New York, NY 10024) in Pope Auditorium.

Topics to be discussed include emerging technologies, blockchain, cryptocurrencies, digital payments, capital markets, and regulation.

Welcome Remarks by Donna Rapaccioli, Dean of the Gabelli School of Business at Fordham University.


Applications of Behavior-based Authentication in the Business World

This talk will look at the applications of behavior-based authentication in the business world and how it has been affected by research. We’ll look at the field as a whole, and also at the vision for us at TwoSense, and demonstrate that this is a problem that is insoluble without the application of machine learning. We will then take a deeper look at the machine learning challenges that must be overcome, and a few novel solutions from our labs. We will then look at some of the lessons learned from deploying behavioral biometrics in the wild in product settings. From there, we will look at some research methodology issues that we’ve come across and conclude by proposing a few best practices for the behavioral biometrics community.
Speaker: Dawud Gordon, Ph.D., CEO & Co-Founder at TwoSense, NYC
Date: April 23, 2018
Time: 5:30 p.m.
Venue: Leon Lowenstein (LL) 305
View a description of the talk.


Blockchain Disruptor Conference, Skadden Conference Center at Fordham Law School (April 28-29)

Do you want to learn the basics of blockchain? Do you want to meet Fordham alumni who are leaders in the space? Do you want to hear from CEOs, COOs and CTOs of top blockchain companies from around the world?

The Blockchain Disruptor Conference is purposely scheduled on the weekend (April 28-29) so attendees do not have to face the trade-off of fulfilling work/school responsibilities and trying to learn about a technology that is going to change the world. Day 1 of the conference is "Blockchain for Beginners" and will break down all the jargon to help beginners grasp the language of blockchain and cryptocurrencies. Topics includes: Why Bitcoin Matters (Beyond its Market Price) | Hashing 101 | What is Consensus and How Does It Work? | Cryptography & Security | Smart Contracts | Internet of Things (IoT) | Permissioned vs. Unpermissioned Blockchains | The Five Roles of Tokens/Cryptos in Blockchain | Investing in the Blockchain Space (Cryptos & Otherwise). There will be a reception on Saturday evening (the end of Day 1) that is open for any registered participant across Days 1 and 2.

Day 2 is "Blockchain for Disruptors" and will entail various industry-specific panel sessions:

  • How Blockchain is Juicing Energy Markets
  • Insurance & Reinsurance Efficiencies through Blockchain
  • How Blockchain is Changing Healthcare
  • Digital Marketing and Blockchain
  • Blockchain and the Financial System
  • Can Blockchain Save Content Creators (Publishing, Music, Film & Visual Arts)?
  • Value Creation and Appropriation in Identity and Privacy Markets
  • Blockchain for Humanitarian Efforts

Fordham CIS students may register for the conference at an 80% discount (only $40 per day):

Discount Code: CIS80
Expiry: April 29, 2018 (midnight)


The Fordham Computer Science Society Workshop

Join The Fordham Computer Science Society and Dennis Egan, a Fordham alum and data scientist at Alpha Vertex for an intro to machine learning workshop. Also an intern recruitment opportunity!
WHEN: Thursday, April 19
WHERE: JMH 404
TIME: 7 - 8 p.m.


Women in Cybersecurity: A CAREERS SUMMIT

Employers are looking to fill jobs in the rapidly growing field of cybersecurity. It offers high salaries, career security, and promotion opportunities, and yet has a talent gap and a diversity gap, with women and minority groups underrepresented. Join us as industry executives and members of the FBI’s Cyber Branch hold a panel discussion on the leading role women can play in the cybersecurity field, with an emphasis on cyber careers in the FBI. View the flyer.
Date: MONDAY | APRIL 16, 2018
Time: 1 – 2:30 P.M.
Room: FLOM AUDITORIUM, WALSH FAMILY LIBRARY, ROSE HILL CAMPUS


Office of Career Services is hosting a STEM Career Fair on April 10 at Rose Hill, 2 - 4 p.m.

To view the list of employers attending, students can log into their Handshake accounts -> Click Events tab. A few that are attending include: NYU Langone, FBI, and The Albert Einstein College of Medicine.

What: STEM Career Fair
When: Tuesday April 10, 2 - 4 p.m.
Where: McGinley Ballroom
View the 2018 STEM Career Fair flyer.


Adversarial-Resilience Assurance for Mobile Security Systems

Wei Yang, Ph.D. candidate University of Illinois at Urbana-Champaign
Date: Thursday March 15, 2018, Thursday, 1 -2 p.m.
Room: JMH 342
View a full description of the talk.


Exploring the Power of Source Reliability in Information Integration

Houping Xiao, Ph.D. candidate, SUNY Buffalo State
Date: Wednesday March 14, 2018, 1 -2 p.m.
Room: JMH342
View a full description of the talk.


Individual Differences in Deception and Deception Detection in Spoken Dialogue

Sarah Ita Levitan, Ph.D. candidate, Columbia University
Date: Tuesday March 13, 2018, 2 - 3 p.m.
Room: LL601
View a full description of the talk.


Spring 2018 CIS Faculty Research Talk Series

Download the Spring 2018 Schedule and Description of All of the Talks.

Option Implied Volatility Prediction by Integrative Learning with Dr. Henry Han.
Date: Wednesday February 28, 2018,
Time: 12 - 1 p.m.
Room: JMH342

Smartphone and Smartwatch-based Activity Recognition and Biometrics with Dr. Gary Weiss
Date: Wednesday April 25, 2018
Time: 12 - 1 p.m.
Room: JMH342


Spring 2018 CIS Distinguished Lecture Series

Download the Spring 2018 Schedule


Cyber Intelligence and Counterterrorism within the NYPD: A View from the Inside

Presented by Mitch D. Silber, Principal and Founder, The Guardian Group, Former Director of Intelligence Analysis, NYPD

Date: Thursday, March 1, 2018
Time: 6 p.m.
Venue: The University Club
1 West 54th Street, New York City
Cost: $25 for alumni, but free for students, faculty, and staff, who can email Annelice Morales

Please join the Gabelli School of Business and Sander Flaum, chair of the Fordham Leadership Forum, for this Flaum Leadership Lecture Series event featuring cyber intelligence expert Mitch D. Silber.

A reception will immediately follow the lecture.
Business attire is strictly enforced by the University Club.

2017

On the Design of an Industrial IoT Device 

(IEEE members are eligible to apply for 0.1 CEU/ 1.0 PDH credit)  
Time: 6:30pm - 7:45pm, Tuesday, December 12, 2017
Location: Fordham University - Leo Loweinstein, Room: LL 306
113 West 60th Street, New York, NY 10023
Directions: https://www.fordham.edu/maps_and_directions 

Abstract:
The session will provide introduction on the beginning of an Industrial Internet of Things (IIoT) solution that eventually could be deployable worldwide, and on how to realize a simple inexpensive IIoT method with large scalability. The speaker will explain the methodology from two aspects. The first part addresses the market and practical considerations required prior to product definition and development, including the reasons behind choice of a Boat Area Network (BAN) networking scheme, the final MCU chip selection, Internet access gateways and standards involved required to provide for retrofit with existing wired networks, or for new installations. The second part is a description of the architecture of the first IIoT product resulting from this development and lessons learned. 

Biography:
Warner SharkyManaging Principal, iOTA World Inc. http://www.iotaworld.net BSc EE, Electrical, Royal Military College, Kingston, ON Canada BSc EE, Communications-Electronics, Queen’s University, Kingston, ON, Canada Graduate work, Systems Engineering, University of Delaware, Newark, DE, USA Professional: Life Senior Member of IEEE  Senior past Chair- IEEE Communications Society NYC Chapter ;  Member , American Water Works Association (AWWA)  Warner has done engineering work for major entities, countries, cities, companies and regional– in the United States, Canada, India and China. Warner's experience includes technical consulting, embedded micro-controllers, LAN and WAN network design, wireless network design, complete 9-1-1 system design, QA/QC reviews, complex system design and budgeting, contract review, implementation and project management

Contact Information: 
Dr. Yun Ye, Email: yye@lagcc.cuny.edu
Dr. Frank Hsu, Email: hsu@cis.fordham.edu 


COMPUTER SCIENCE WEEK HOUR OF CODE, DEC. 4-10. 2017

The Hour of Code is here!  Volunteer here: https://hourofcode.com/us

Members of IEEE-NY Computer Society are supporting Computer Science Week's Hour of Code event that runs from Dec. 4-10 each year in honor of Admiral Grace Murray Hopper's birthday on Dec. 9th. The goal of this event is to teach children coding skills using material provided by Hour of Code. 


Humanitarian Blockchain Summit
November 10, 2017

The Humanitarian Blockchain Summit will bring technology experts, scholars, and humanitarian practitioners together for dynamic discussions about the future of blockchain technology in humanitarian operations and in pursuit of the UN Sustainable Development Goals.

The summit is designed for those interested in using blockchain for tangible humanitarian impact. Breakout sessions will focus on overcoming challenges to using blockchain, as well as identifying the best ways to develop humanitarian-friendly blockchain platforms, among other topics. The sessions will also include collaborative exercises and presentations about how some organizations are using blockchain.

The goal of the event is for participants to recommend policies for using blockchain in specific humanitarian interventions.


Integrative Neuroscience Poster


Thursday October 12, 2017
Concordia College New York
171 White Plains Road, Quad | Bronxville, NY, USA 10708

Dialogues on the Quad 2017: The Conversation Continues

Artificial Intelligence Panel Tech Fluency for the 21st Century

Panel Liaison/Moderator:

Mr. Charles Frank Director of Off-Site Programs, Concordia College New York

Panelists:

Rev. Dr. Joshua Hollmann, Assistant Professor of Theology, Chair of the Theology Department, Concordia College New York

Dr. Damian M. Lyons, Professor of Computer Science, Fordham University, Director of Fordham's Robotics and Computer Vision Laboratory

Lieutenant Colonel Alexander S. Mentis, Assistant Professor of Computer Science,The United States Military Academy at West Point

Dr. Rocio Ng, Senior Data Scientist, Kickwheel Co.

Maria Rachelle, CEO and Founding Member at Living Leadership Today, LLC

“The development of full artificial intelligence could spell the end of the human race.”

-Stephen Hawking

Amazing advances in technology known as “AI,” artificial intelligence, have generated a surge of interest, but what do these tech evolutions mean for us? The purpose of this panel is to facilitate a campus-wide conversation on the topic of artificial intelligence and its impact on what it means to be human.

These dialogues will include discussion of the following questions:

  • What is AI?
  • What are the benefits and dangers of AI?
  • Which industries will benefit the most from AI?
  • What does the future hold for humanity’s interface with AI?

Fall 2017

CIS Faculty Research Talk Series
Time: 12 – 1 p.m.
Venue: John Mulcahy Hall (JMH) 342

September 27, 2017
Investigating Connected k-Coverage in Two-Dimensional Wireless Sensor Networks: Are We Done Yet?
Habib M. Ammari

October 18, 2017
Ranking and Scoring for Big Data Analytics
D. Frank Hsu, Clavius Distinguished Professor of Science

November 1, 2017
Computational Robotics
Damian Lyons, Graduate Program Director

December 6, 2017
Research in Computational Neuroscience
Daniel Leeds, Associate Chair for Undergraduate Studies


1/26/17
Fordham IBM Blockchain Workshop

At this inaugural university workshop, IBM presented a blockchain demo, and speakers from Fordham and several government, finance, technology, and law firms offered their thoughts on how students and other members of academia can play a role in advancing this technology in a wide variety of professions and fields.

2016

1/26/2016: Seminar on "Visual object representations in the human cortex: Dissimilarity analysis for model comparison" by Assistant Professor Dr. Daniel D. Leeds at 12PM in JMH312(RH)

10/7/2016
2016 Fordham/IBM Symposium on Cyber Security, Data Analytics and Mobile Systems
1 - 10 p.m.
Lowenstein 12th Fl. Lounge,
E. Gerald Corrigan Conference Center, Lincoln Center

2015

2014

2013