A Novel and Inexpensive Solution to Build Autonomous Surface Vehicles Capable of Negotiating Highly Disturbed Environments

Friday, May 3, 2019 - 09:00 am
Meeting Room 2267, Innovation Center
DISSERTATION DEFENSE Department of Computer Science and Engineering University of South Carolina Author : Jason Moulton Advisor : Dr. Ioannis Rekleitis Date : May 3rd, 2019 Time : 9:00 am Place : Meeting Room 2267, Innovation Center Abstract This dissertation has four main contributions. The first contribution is the design and build of a fleet of long\hyp range, medium\hyp duration deployable autonomous surface vehicles (ASV). The second is the development, implementation and testing of inexpensive sensors to accurately measure wind, current, and depth environmental variables. The third leverages the first two contributions, and is modeling the effects of environmental variables on an ASV, finally leading to the development of a dynamic controller enabling deployment in more uncertain conditions. The motivation for designing and building a new ASV comes from the lack of availability of a flexible and modular platform capable of long\hyp range deployment in current state of the art. We present a design of an autonomous surface vehicle (ASV) with the power to cover large areas, the payload capacity to carry sufficient power and sensor equipment, and enough fuel to remain on task for extended periods. An analysis of the design, lessons learned during build and deployments, as well as a comprehensive build tutorial is provided in this thesis. The contributions from developing an inexpensive environmental sensor suite are multi-faceted. The ability to monitor, collect and build models of depth, wind and current in environmental applications proves to be valuable and challenging, where we illustrate our capability to provide an efficient, accurate, and inexpensive data collection platform for the communities use. More selfishly, in order to enable our end\hyp state goal of deploying our ASV in adverse environments, we realize the requirement to measure the same environmental characteristics in real\hyp time and provide them as inputs to our effects model and dynamic controller. We present our methods for calibrating the sensors and the experimental results of measurement maps and prediction maps from a total of 70 field trials. Finally, we seek to inculcate our measured environmental variables along with previously available odometry information to increase the viability of the ASV to maneuver in highly dynamic wind and current environments. We present experimental results in differing conditions, augmenting the trajectory tracking performance of the original way\hyp point navigation controller with our external forces feed\hyp forward algorithm.

Follow the Information: Illuminating Emerging Security Attacks and Applications

Monday, April 29, 2019 - 10:15 am
Storey Innovation Center (Room 2277)
Dr. Xuetao Weifrom the School of Information Technology at the University of Cincinnati will give a talk on Monday April 29 at 10:15 - 11:15, in Storey Innovation Center (Room 2277). Abstract: Cyberspace is a constantly changing landscape. Not only security attacks have become more and more stealthy, but also a myriad of opaque security applications have emerged. Navigating the increasingly complex cyber threat landscape has become overwhelming. Thus, it is essential to profile and understand emerging security attacks and applications. In this talk, I will first present a novel approach and tool, which illuminates in-memory injection attacks via provenance-based whole-system dynamic information flow tracking. Then, I will present a framework to enable behavior-based profiling for smart contracts, which could enhance users' understanding and control of contract behavior and assess performance and security implications. Finally, I will briefly discuss current ongoing research and future directions. Bio: Xuetao Wei is a tenure-track assistant professor in the School of Information Technology at the University of Cincinnati. He received his Ph.D. in Computer Science from the University of California, Riverside. His research interests span the areas of cybersecurity, blockchain, and measurements. His current research is supported by federal and state agencies, including NSF, DARPA, and Ohio Cyber Range. He particularly enjoys solving problems and developing innovative solutions based on interdisciplinary perspectives.

Innovative Machine Learning for Medical Data Analytics

Wednesday, April 24, 2019 - 10:15 am
SWEARINGEN FACULTY LOUNGE room 1A03
Dr. Shuo Li from the Department of Medical Imaging and Medical Biophysics at the University of Western Ontario will give a talk on Wednesday April 24 at 10:15 - 11:15, in Storey Innovation Center (Room 2277). Medical data analysis is going through great changes with tremendous new opportunities showing up. The rise of machine learning and the rise of big data analytics, have brought wonderful opportunities to invent the new generation of machine learning tools for medical data analytics, not only to solve new problems appearing, but also to solve many years challenges in conventional medical image analysis and computer vision with much more satisfactory solutions. This talk will share our experience in developing the next generation of image analytics tools with newly invented machine learning tools to help physicians, hospital administrative to analyze the growing medical data and help them to make the right decision and early decision at the right timing. Dr. Shuo Li is an associate professor in the department of medical imaging and medical biophysics at the University of Western Ontario and scientist at Lawson Health Research Institute. Before this position he was a research scientist and project manager in General Electric (GE) Healthcare for 9 years. He founded the Digital Imaging Group of London (http://digitalimaginggroup.ca/) in 2006, which is a very dynamic and highly multiple disciplinary collaboration group. He received his Ph.D. degree in computer science from Concordia University 2006, where his PhD thesis won the doctoral prize giving to the most deserving graduating student in the faculty of engineering and computer science. He has published over 100 publications; He is the recipient of several awards from GE, institutes and international organizations; He serves as guest editors and associate editor in several prestigious journals in the field; He serves as program committee members in highly influential conferences; He is the editors of six Springer books; He serves on the board of directors in prestigious MICCAI society. He will be the general chair for MICCAI 2022 conference. His current interest is development intelligent analytic tools to help physicians and hospital administrators to handle the big medical data, centred with medical images.

Backers and Hackers: App Development, Cash Prizes, Networking, and FREE FOOD!

Wednesday, April 17, 2019 - 05:00 pm
Sonoco Pavilion - Darla Moore School of Business
At Backers & Hackers, EclubSC is excited to share with you all the new apps that students from all majors have developed this semester. Join us for a night of networking, showcasing, and hearing from Laura Boccanfuso. Laura Boccanfuso is the CEO of Vän Robotics. A company that provides students K-8 a robot-assisted tutoring to help enhance the students' learning experience. Hear how she got involved in the world of technology and education, and her valuable insights of her journey to getting where she is today! More Info

Towards Adaptive Parallel Storage Systems

Friday, April 12, 2019 - 10:15 am
Storey Innovation Center (Room 2277)
Dr. Nihat Altiparmak from the Department of Computer Engineering and Computer Science at the University of Louisville, will give a talk on Friday, April 12, 2019, in the Storey Innovation Center (Room 2277) from 10:15 am - 11:15 am. Abstract Today’s most critical applications, including genome analysis, climate simulations, drug discovery, space observation, and numerical simulations in computational chemistry and high-energy physics, are all data intensive in nature. Storage performance bottlenecks are major threats limiting the performance and scalability of data intensive applications. A common way to address storage I/O bottlenecks is using parallel storage systems and utilizing concurrent operation of independent storage components; however, achieving a consistently high parallel I/O performance is challenging due to static configurations. Modern parallel storage systems, especially in the cloud, enterprise data centers, and scientific clusters are commonly shared by various applications generating dynamic and coexisting data access patterns. Nonetheless, these systems generally utilize one-layout-fits-all data placement strategy frequently resulting in suboptimal I/O parallelism. Guided by association rule mining, graph coloring, bin packing, and network flow techniques, this talk demonstrates a general framework for self-optimizing parallel storage systems that can adaptively alleviate storage performance bottlenecks and continuously provide a high-degree of I/O parallelism. The framework can be applied to a wide range of parallel storage architectures including storage arrays, key-value stores, parallel/distributed file systems, and internal parallelism of solid-state drives. In addition, this talk briefly covers efficient storage, retrieval, and processing strategies for Big Data, and recent advancements in non-volatile memory technology by identifying upcoming challenges in computer systems research to utilize new solid-state storage devices to their full potential. Bio: Dr. Nihat Altiparmak earned his B.S. degree in Computer Engineering from Bilkent University, Ankara, Turkey in May 2007, and his combined M.S. and Ph.D. degrees in Computer Science from the University of Texas at San Antonio in May 2013. He joined the Department of Computer Engineering and Computer Science at the University of Louisville as a tenure-track Assistant Professor in August 2013, and his tenure and promotion to Associate Professor is currently pending approval by the Board of Trustees of the University of Louisville. His research interests lie in the area of computer systems, specifically focusing on data storage systems, parallel and distributed systems, cloud computing, high performance computing, and computer networks. He is particularly interested in researching solid-state storage systems based on new generation non-volatile memory technologies, as well as investigating efficient storage, retrieval, and processing strategies for Big Data using high performance, distributed, and cloud architectures. His recent research findings have appeared in top-tier international journals, including IEEE Transactions on Computers, IEEE Transactions on Parallel and Distributed Systems, ACM Transactions on Storage, and ACM Transactions on Sensor Networks, as well as prestigious conferences with competitive acceptance rates. He received multiple grants from the National Science Foundation (NSF) in the PI role, including a prestigious young investigator award (NSF CRII) in 2017 and an NSF MRI award in 2018. He is a senior member of the IEEE and the founding director of the Computer Systems Laboratory at the University of Louisville.

An Instruction Embedding Model for Binary Code Analysis

Wednesday, April 10, 2019 - 11:00 am
Meeting room 2267, Bert Storey Innovation Center
THESIS DEFENSE Department of Computer Science and Engineering University of South Carolina Author : Kimberly Redmond Advisor : Dr. Lisa Luo Date : April 10th , 2019 Time : 11:00 am Place : Meeting room 2267, Bert Storey Innovation Center Abstract Binary code analysis is important for understanding programs without access to the original source code, which is common with proprietary software. Analyzing binaries can be challenging given their high variability: due to growth in tech manufacturers, source code is now frequently compiled for multiple instruction set architectures (ISAs); however, there is no formal dictionary that translates between their assembly languages. The difficulty of analysis is further compounded by different compiler optimizations and obfuscated malware signatures. Such minutiae means that some vulnerabilities may only be detectable on a fine-grained level. Recent strides in machine learning---particularly in Natural Language Processing (NLP)---may provide a solution: deep learning models can process large texts and encode the semantics of individual words into vectors called word embeddings, which are convenient for processing and analyzing text. By treating assembly as a language and instructions as words, we leverage NLP ideas in order to generate individual instruction embeddings. Specifically, we choose to improve upon current models that are only single-architecture, or that suffer from performance issues when handling multiple architectures. This research presents a cross-architecture instruction embedding model that jointly encodes instruction semantics from multiple ISAs, where similar instructions within and across architectures embed closely together. Results show that our model is accurate in extracting semantics from binaries alone, and our embeddings capture semantic equivalences across multiple architectures. When combined, these instruction embeddings can represent the meaning of functions or basic blocks; thus, this model may prove useful for cross-architecture bug, malware, and plagiarism detection.

Look-ahead Policy Approximations for Solving Sequential Stochastic Optimization Problems

Monday, April 8, 2019 - 10:15 am
Storey Innovation Center (Room 2277)
Monday, April 8, 2019, in the Storey Innovation Center (Room 2277) from 10:15 am - 11:15 am. Abstract: There are two fundamental strategies for finding effective policies to solve stochastic optimization problems and these are policy search and look-ahead policies. Look-ahead policies are mainly used in the context of sequential optimization problems in which the current decision impacts the future ones. There are several types of look-ahead policies depending on the type of the forecast, the problem structure and its dimensionality. In this talk, I will discuss two forms of look-ahead policies, direct look-aheads and value function approximations. In the context of direct look-aheads, we propose a new technique called Primal-Dual Monte Carlo Trees Search that utilizes sampled information relaxation upper bounds on potential actions, creating the possibility of “ignoring" parts of the tree that stem from highly suboptimal choices. This allows us to prove that despite converging to a partial decision tree in the limit, the recommended action from Primal-Dual MCTS is optimal. Then, I will discuss an approximate dynamic programming approach in the context of ride-sharing systems. We extract and prove important properties about the problem structure such as monotonicity and spatial correlation that provide efficient value function approximations. Biography: Lina Al-Kanj is an Associate Research Scholar at the Operations Research and Financial Engineering Department at Princeton University. She received her PhD in Electrical and Computer Engineering from the American University of Beirut. Her research interests include optimal resource allocation and scheduling, stochastic optimization, dynamic programming and optimal learning with applications to energy, communication and transportation systems.

Semantic-Based Access Control Mechanisms in Dynamic Distributed Networks

Friday, April 5, 2019 - 03:00 pm
Conference room 2201, Innovation Center
DISSERTATION DEFENSE Department of Computer Science and Engineering University of South Carolina Author : Mouiad Al Wahah Advisor : Dr. Csilla Farkas Date : April 5th , 2019 Time : 3:00 pm Place : Conference room 2201, Innovation Center Abstract The appearance of dynamic distributed networks in early eighties of the last century has evoked technologies like pervasive systems, ubiquitous computing, ambient intelligence, and more recently, Internet of Things (IoT) to be developed. Moreover, sensing capabilities embedded in computing devices offer users the ability to share, retrieve, and update resources on anytime and anywhere basis. These resources (or data) constitute what is widely known as contextual information. In these systems, there is an association between a system and its environment and the system should always adapt to its ever-changing environment. This situation makes the Context-Based Access Control (CBAC) the method of choice for such environments. However, most traditional policy models do not address the issue of dynamic nature of dynamic distributed systems and are limited in addressing issues like adaptability, extensibility, and reasoning over security policies. We propose a security framework for dynamic distributed network domain that is based on semantic technologies. This framework presents a flexible and adaptable context-based access control authorization model for protecting dynamic distributed networks' resources. We extend our security model to incorporate context delegation in context-based access control environments. We show that security mechanisms provided by the framework are sound and adhere to the least-privilege principle. We develop a prototype implementation of our framework and present the results to show that our framework correctly derives Context-Based authorization decision. Furthermore, we provide complexity analysis for the authorization framework in its response to the requests and contrast the complexity against possible optimization that can be applied on the framework. Finally, we incorporate semantic-based obligation into our security framework. In phase I of our research, we design two lightweight Web Ontology Language (OWL) ontologies CTX-Lite and CBAC. CTX-Lite ontology serves as a core ontology for context handling, while CBAC ontology is used for modeling access control policy requirements. Based on the two OWL ontologies, we develop access authorization approach in which access decision is solely made based on the context of the request. We separate context operations from access authorization operations to reduce processing time for distributed networks' devices. In phase II, we present two novel ontology-based context delegation approaches. Monotonic context delegation, which adopts GRANT version of delegation, and non-monotonic for TRANSFER version of delegation. Our goal is to present context delegation mechanisms that can be adopted by existing CBAC systems which do not provide delegation services. Phase III has two sub-phases, the first is to provide complexity analysis of the authorization framework. The second sub-phase is dedicated to incorporating semantic-based obligation.

CSE Town Hall Meeting

Friday, April 5, 2019 - 10:00 am
Storey Innovation Center, Room 2277
The CSE Industrial Advisory Board (IAB), the Department’s industry partners, will hold a Town Hall meeting for CSE undergraduate students: What: Town Hall Meeting (CSE Students and CSE-IAB) When: Friday, April 5 Time: 10 am – 12 pm Location: Storey Innovation Center, Room 2277 Light refreshments will be provided!! This will be an important discussion that requires your participation. Our industry partners need to hear from our students, and this is a great opportunity for an open discussion. We encourage all CSE undergraduate students to attend; note that you do not have to stay for the entire meeting. Discussion topics may include:
  • What resources are available to students in the local computing community?
  • What computing skills will be in demand over the next five to ten years?
  • How has previous student feedback generated positive change in the CSE programs?
  • How do we build on the current CSE programs to improve the student experience and foster a stronger sense of community among students, faculty, and alumni?
If you plan to attend the CSE Town Hall meeting at 10 am on April 5, then please email thatche1@cse.sc.edu I would like to have an estimate of how many students will attend. We look forward to seeing everyone at the CSE Town Hall meeting. Sincerely, Matt Matt E. Thatcher, Ph.D. Professor and Chair