talk: Human mental models and robots: Grasping and tele-presence, 11am 5/9

apple picker

Human mental models and robots:
Grasping and tele-presence

Dr. Cindy Grimm, Oregon State University

11:00-12:00 Monday 9 May 2016, ITE 325b

In this talk I will cover two separate research efforts in robotics, both of which use human mental models to improve robotic functionality. Robots struggle to pick up and manipulate physical objects, yet humans do this with ease – but can’t tell you how they do it. In this research we focus on how to capture human data in such a way as to gain insight into how people structure the grasping task. Specifically, we look at the role of perceptual cues in evaluating grasps and mental classification models of grasps (i.e., all these grasps are the “same”). In the second half of the talk I will switch to discussing how human mental models of privacy, trust, and presence come in to play in remote tele-presence applications (“Skype-on-a-movable-stick”).

Dr. Cindy Grimm is currently an associate professor at Oregon State University (since 2013) in the School of Mechanical, Industrial, and Manufacturing Engineering (application area robotics). Prior to that she was tenured faculty at Washington University in St. Louis in Computer Science (12 years). Her research areas range from 3D sketching to biological modeling to human-robot interaction. She approaches these problems with a combination of mathematical models and empirically-verified human-centered design (HCD). Mathematical models provide a sound, quantitative, rigorous, elegant basis for representing shape and function, and are a core part of the “language” of computation. Including a human in the loop is a key component of the application areas she works in; HCD provides the mechanism for addressing the fundamental problem of how to make mathematical computation “useful” for humans. She has worked with collaborators in fields ranging from psychology, mechanical and biological engineering, statistics, to art.

talk: Statistical Testing of Hash Bit Sequences, 11:15am Fri May 6, UMBC

The UMBC Cyber Defense Lab presents

Statistical Testing of Hash Bit Sequences

Enis Golaszewski

11:15am-12:30pm Friday, 6 May 2016, ITE 237

We tested bit sequences generated from the MD5 hash function using multinomial distribution and close-point spatial statistical tests for randomness. We found that bit sequences generated from truncated-round MD5 hash fail these tests for high- and low-density input choices.

In 2000, the National Institute of Standards and Technology concluded a competition to select the Advanced Encryption Standard. One of the requirements for candidates was randomness of output bits. The techniques used to evaluate symmetric block cipher randomness have not been extensively applied to hash functions.

In this study, we adapt a subset of the techniques used to analyze the randomness of AES candidate algorithms to study the randomness of the well-known MD5 hash function. Our approach uses high-density, lo- density, and chained-input methods to generate MD5 hashes. We concatenate these hash outputs and subjected them to multinomial distribution and close-point spatial tests. We iterated this approach over reduced-round versions of MD5. Our presentation includes specifications for the input methods, details on the statistical tests, and analysis of the statistical results.

Through statistical testing of concatenated MD5 hashes, we derive results that demonstrate a link between the performance of the concatenated hash bit sequences in our statistical testing and the number of hash rounds applied to the high-density and low-density input methods. Randomness is a desirable property for cryptographic hash functions. We present a new approach that facilitates the analysis and interpretation of hash functions for statistical randomness.

About the Speaker. Enis Golaszewski is a prospective PhD student in CS at UMBC, working with Dr. Alan T. Sherman. His research interests include the security of software-defined networks. He graduated from UMBC in CS in December 2015 and was a student in the fall 2015 INSuRE class. Email: <>

Host: Alan T. Sherman,

UMBC students demonstrate smartphone applications, 12:30-2:30 Tue 5/10


7919_New Faculty 2009 Nilanjan Banerjee Computer Science and Computer Engineering

Student groups drawn from two UMBC classes will demonstrate twelve mobile applications they developed as projects from 12:30 to 2:30 on Tuesday, 10 May 2016 in the UC Ballroom. Pizza will be provided.

The projects are a result of an innovative collaboration between a computer science class lead by Professor Nilanjan Banerjee (CMSC 678 Mobile Computing) and a visual arts class lead by Professor Viviana Chacon (ART 434 Advanced Interface Design).

The two faculty were awarded a grant from the fall 2015 round of the Hrabowski Fund for Innovation competition to develop and evaluate the collaboration between the two courses. The classes held regular joint sessions and each project group comprised students from both Engineering and Visual Arts.

In ART 434 Prof. Cordova concentrated on the visual experience of the interface in mobile and desktop applications, while in CMSC 628 Prof.  Banerjee provided the tools necessary to design and implement mobile applications.  Specific mobile development topics such as user interface design and implementation, accessing and displaying sensor and location data, and mobile visual design were co-­‐taught by both instructors.  Teams comprising Engineering and Visual Arts students designed and built mobile applications for local clients in Baltimore and Washington DC area.

poster describing the event has brief descriptions of the twelve class projects.

NSF CyberCorps: Scholarship For Service, May 15 deadline

UMBC undergraduate and graduate students interested in cybersecurity can apply for an Federal CyberCorps: Scholarship For Service scholarship by 15 May 2016. This application deadline will be the last one under the current NSF grant, which ends August 2017.

The Federal CyberCorps: Scholarship For Service program is designed to increase and strengthen the cadre of federal information assurance professionals that protect the government’s critical information infrastructure. This program provides scholarships that may fully fund the typical costs incurred by full-time students while attending a participating institution, including tuition and education and related fees. Participants also receive stipends of $22,500 for undergraduate students and $34,000 for graduate students.

Applicants must be be full-time UMBC students within two years of graduation with a BS or MS degree; a student within three years of graduation with both the BS/MS degree; a student participating in a combined BS/MS degree program; or a research-based doctoral student within three years of graduation in an academic program focused on cybersecurity or information assurance. Recipients must also be US citizens or permanent residents; meet criteria for Federal employment; and be able to obtain a security clearance, if required.

For more information and instructions on how to apply see the UMBC CISA site (use old application form, and be sure to include the cover sheet).

tutorial: Design, Analysis and Security of Automotive Networks, 2pm 4/29

Design, Analysis and Security of Automotive Networks

Sekar Kulandaivel
University of Maryland, Baltimore County

2:00-3:30pm Friday, 29 April 2016, ITE 325b

As more electronic and wireless technologies permeate modern vehicles, understanding the design of an embedded automotive network becomes necessary to protect drivers from external agents with a malicious intent to disrupt onboard electronics. By analyzing the different types of automotive networks and current security issues that the industry faces, we will learn how intruders are able to access an automotive network, read data that streams from the connected nodes and inject potentially malicious messages. This presentation will cover the electrical design of automotive networks, the communication protocols between electronic control units, methods for analyzing network messages and a detailed overview of previous automotive attacks and current security issues.

Sekar Kulandaivel is a Meyerhoff Scholar and Computer Engineering undergraduate student at UMBC. He currently works on designing an intrusion detection system for automotive networks with Dr. Nilanjan Banerjee of the UMBC Eclipse Cluster. Sekar has had previous internships at MIT Lincoln Laboratory, Northrop Grumman Corporation and Johns Hopkins University. He will attend Carnegie Mellon University in Fall 2016 to pursue a PhD in Electrical and Computer Engineering with a focus in electric vehicle security.

3D Capturing the Future at UMBC

3D Capture Studio Cameras

Nestled in the back of room 109 of the Information Technology and Engineering building, Dan Bailey, head of the Image Researching Center (IRC) is being captured. He sits in the center of the room, in a open metal rig with cameras that are surrounding him. IRC staff walk around him, fine tuning each of the camera settings as they make their final preparations.

The lights turn off, and within a second a bright flash illuminates the room. The lights turn back on, and a staff member exclaims “got it” as another successful 3D capture has been performed at the IRC. In the next few hours a powerful computer will start to build a 3D scan of Dan Bailey.

“Being able to capture a 3D model is just a priceless ability,”

Outside of the room sits Dr. Marc Olano, a professor of Computer Science & Electrical Engineering, who helps run the studio. Olano and Bailey worked with Direct Dimensions Inc, a company based in Owings Mills, Maryland, and funded the space through a $180,000 grant from the National Science Foundation.

Olano told Stephen Babcock, a reporter at Technical.ly Baltimore that “Being able to capture a 3D model is just a priceless ability,” and “That flash is the first step.”

Dr. Olano outside of capture studio

Dr. Marc Olano outside the capture room. Here, he can view the 3D models and manipulate them.

The system is smart enough to ignore all the cameras around the person or object and instead finds unique points of features to focus on. In addition, there are projectors that help capture something that doesn’t have enough detail to focus on by projecting more detail onto a person or object so the person can find it.

Between captures, there are a couple of tools that are used to help calibrate the space. One tool is a pole that is used to help position the cameras using tape on the pole that gives reference points for the center and edge of the frame for the cameras.

For capturing, there is a calibration dummy made out of cardboard construction tubes with a lot of different clothing patterns. This is essential in making it easier to build a 3D model of the dummy, as the reconstruction process can find the shape of the object and camera positions simultaneously, but if the part of the object or person you are scanning is too featureless, it can have trouble solving for both of those at once

After the image is captured, the computer starts building a 3D model out of 90 images. Zooming in on the image, you can actually see each individual polygon that makes up the image.

3D Scans

3D scans of Marc Olano and Dan Bailey done in the capture studio.

“This [studio] serves as not only the intersection of art and computer science, but other disciplines as well.”

Olano believes that this 3D capture studio can go beyond computer science. “This [studio] serves as not only the intersection of art and computer science, but other disciplines as well.” When scanning in a person, it is possible to make that person into an animation model for use in video games.

Museums could ask to scan in historical objects so that one could rotate and inspect the object at any angle they want. People who have had amputations could get scanned and have something custom built for them. The possibilities for this space are immense and will continue to grow over time.

The 3D capture studio is still limited to only a few projects at a time but Olano hopes to open it up to more departments soon. You can view some of the scans the studio has done online here.

11th UMBC Digital Entertainment Conference, 11-5 Sat. April 30

2016 UMBC DIgital Entertainment COnference

For the past ten years the UMBC Game Developers Club has organized a Digital Entertainment Conference with a day of games industry veterans speaking on a variety of topics.  The event is free, open to all, and includes lunch.

UMBC’s 11th annual Digital Entertainment Conference will be held from 11:00am to 5:00pm on Saturday, April 30, 2016 in Skylight Lounge on the 3rd floor of the Commons.



Note: Q&A with the presenter occurs between each hour

11:00am-11:45am    Tom Symonds :: Life in the Art Department
12:00pm-12:45pm   Marc Olano :: Graphics Research for Games
01:00pm-02:00pm  LUNCH! Pizza and Drinks
02:00pm-02:45pm  Eric Jordan :: Game Industry Careers
03:00pm-03:45pm  Nate Flynn :: Convention Booths
04:00pm-04:45pm  Ching Lau :: Of Teaching in the Classroom

talk: Medical Epistemology: A Gerontologist’s Perspective, 3pm Wed 4/27

CHMPR Seminar

Medical Epistemology: A Gerontologist’s Perspective

Dr. John D. Sorkin, M.D., Ph.D.
University of Maryland School of Medicine

3:00pm Wednesday, 27 April 2016, ITE 325b

The randomized clinical trial is the gold standard method by which we test a hypothesis positing an association between an exposure and outcome. Unfortunately many hypotheses are not grist for a clinical trial. It would, for example not be ethically permissible to randomize people to smoking vs. non-smoking if we wanted to study the hypothesis that smoking is associated with increased incidence of lung cancer. Similarly it would not be ethical to randomize pregnant women to being infected or not infected with Zika virus to determine if maternal Zika infection is associated with microcephaly. Clinical trials are also not helpful in determining the relation between a putative exposure and a rare disease such as Pick’s disease (a rare type of frontotemporal dementia) as the number of subjects who would need to be studied is prohibitively large.

The movement over the last decade away from paper-based charts to the electronic medical record (EMR) and advances in the speed of computers allow us to process large volumes of data in near real-time, and herald the advent of clinical studies based on “big data”. The availability of big data requires us to rethink how we can establish an association between cause and effect because the big data we obtain from the EMR are not collected from randomized clinical trials, and as noted above a clinical trial cannot be used to study many diseases. Further making inferences based on the EMR can be difficult because data gleamed from the electronic medical record can be confounded by changes brought about by the aging process which include primary aging (i.e., the aging process itself), secondary aging (i.e., changes brought about by changes in lifestyle as we get older) and tertiary aging (i.e., disease). Fortunately epidemiologists have designed and used study designs other than the clinical trials for years to gain insight into the relation between exposure and disease. The aim of my talk is to review five study designs, cross-sectional, time-series and longitudinal, case-control and cohort study designs, that can be used to identify change, quantify the rate at which changes occurs with aging, and to separate biological aging from the effects of life style and disease. In addition to presenting the five study designs, I will review the strengths and weaknesses of the five study designs. It is my hope that thinking about five study designs will help you design analyses that make use of big data to examine questions relevant to public health and treatment of disease.

Dr. John Sorkin is a professor at the University of Maryland School of Medicine. His research examines the changes that occur with aging in carbohydrate and lipid metabolism, obesity, and body fat distribution. He is interested in measuring the changes and determining the relation of the changes to the development of diabetes, cardiovascular disease, death, morbidity, and mortality. These interests have lead him to try to identify the phenotypes associated with longevity and the genetics of longevity in collaboration with Drs. Shuldiner and Mitchell. Dr. Sorkin is Chief of Biostatistics and Informatics for the Division of Gerontology and is PI of the Statistics Core for the University of Maryland Claude D. Pepper Older Americans Independence Center and Baltimore VA Geriatrics Research, Education and Clinical Center.

talk: Securing the Cloud: The Need for Quantum Network Security, 11:15am 4/22 UMBC


UMBC Cyber Defense Lab

Securing the Cloud: The Need for Quantum Network Security
Brian Kelley, Senior Member IEEE
Associate Professor of ECE
The University of Texas at San Antonio

11:15am-12:30pm Friday, 22 April 2016, UMBC, ITE 227

A significant trend in cloud data centers virtualization has been the migration away from virtual machines (VMs) with multiple guest operating systems (OS) to containers with a single Host OS. Whereas VMs incorporate a hypervisor manager layer enabling the Host OS to spawn multiple guest OSs, containers support all the code, run-time tools, and system libraries to run workload applications from a single Host OS.

While all cloud-based platforms posses security vulnerabilities, the additional security challenges with container systems stem from the sharing of the Host OS among independent container applications.

In this presentation we pose the question, “Can we use quantum information concepts to protect the cloud?” We introduce Quantum Key Distribution (QKD) protocols. We present schemes for cloud container security based upon concepts drawn from QKD and related concepts in quantum teleportation. We also propose a new framework for Quantum Container Security drawing upon concepts of quantum entanglement. We will also present information the Cloud Academic Research Center at the University of Texas at San Antonio.

Dr. Brian Kelley is Associate Professor of ECE at the University of Texas at San Antonio. He is a leading researcher on communication systems, 4G and 5G cellular, cloud communications, and smart grid communications. He is also a member of the Cloud Academic Center at the University of Texas. Dr. Kelley is currently on sabbatical leave as a consultant with the DoD in Washington D.C. His current research focus is on the intersection of software-defined networks, 5G communications, and cloud systems. He is Senior Member of the IEEE, was an Oak Ridge National Laboratory Summer Faculty Fellow in Quantum Information Science during the summer of 2015, was Globecom 2014 Chair for the High-Level Technical Program Committee, Associate Editor and Editorial Board of IEEE System Journal, 2011-2012, and Associate Editor of Computers & Electrical Engineering, Elsevier, 2008-2011; he founded the San Antonio IEEE Communications and Signal Processing Chapter, in 2008. From 2000-2006, he was Distinguished Member of the Technical Staff at Motorola and a senior lecturer at the University of Texas at Austin. Since 2007, he has been Associate Professor of ECE and Director of the Wireless Next Generation Systems (WiNGS) Lab at the University of Texas at San Antonio. Dr. Kelley received his BSEE from Cornell University and his MS/PhD in EE from the Georgia Institute of Technology in 1992, where he was an ONR Fellow. He is a member of Tau Beta Pi and Eta Kappa Nu. Contact: Dr. Brian Kelley, (210) 706-0854

Host: Alan T. Sherman,

The UMBC Cyber Defense Lab meets biweekly Fridays (May 6: Enis Golaszewski, Hash bit sequences)

talk: IoT Device Security Research at Morgan State University, 12pm Fri 4/15


IoT Device Security Research at Morgan State University

Dr. Kevin T. Kornegay

Professor and IoT Security Endowed Chair,
School of Electrical and Computer Engineering, Morgan State University

12:00-1:00pm Friday, 15 April 2016, ITE 239, UMBC

The Internet of Things (IoT) and its myriad of components are proliferating as they increasingly permeate all areas of life and work, with unprecedented economic effect. The IoT is the network of dedicated physical objects (things) whose embedded system technology senses or interacts with their internal state or external environment. Embedded systems use a combination of computer hardware and software to perform dedicated functions within a larger mechanical or electrical system. Examples of embedded systems include cell phones, personal digital assistants, gaming consoles, global positioning systems, etc. Over 98 percent of all microprocessors being manufactured are used in embedded system applications. In private industry and the public sector, IoT growth and possible uses are evolving rapidly. Critical infrastructures in transportation, smart grid, manufacturing and health care are highly dependent on embedded systems for distributed control, tracking, and electronic data collection. While it is paramount to protect these systems from hacking, intrusion or physical tampering, our current solutions are often based on a patchwork of legacy systems, and this is unsustainable as a long-term solution. Transformative solutions are required to protect these systems by engineering secure embedded systems. Secure embedded systems use cryptography and countermeasures to protect electronic data and commands to systematically achieve resiliency, stability, safety, integrity, and privacy. Engineering secure embedded implementations that are resistant to attacks is vital. Essential to achieving this goal is obtaining fundamental knowledge and understanding of the various types of vulnerabilities embedded systems present. Hence, in this talk, we will present our embedded systems security research activities including the IoT testbed, side-channel and fault injection analysis, and associated research projects.

Kevin T. Kornegay received the B.S. degree in electrical engineering from Pratt Institute, Brooklyn, NY, in 1985 and the M.S. and Ph.D. degrees in electrical engineering from the University of California at Berkeley in 1990 and 1992, respectively. He is presently Professor and IoT Security Endowed Chair in the School of Electrical and Computer Engineering at Morgan State University in Baltimore, MD. His research interests include hardware assurance, reverse engineering, secure embedded system design, side-channel analysis, differential fault analysis, radio frequency and millimeter wave integrated circuit design, high-speed circuits, and broadband wired and wireless system design. Dr. Kornegay serves or has served on the technical program committees of several international conferences including the IEEE Symposium on Hardware Oriented Security and Trust (HOST), EEE International Solid State Circuits Conference, the IEEE Custom Integrated Circuits Conference, and the Radio Frequency Integrated Circuits Symposium. He has also served a two-year term on the IEEE Solid-State Circuits AdCom committee, as well as, on the editorial board of the IEEE Transactions on Circuits and Systems II and as Editor of IEEE Electron Device Letters and Guest Editor of the IEEE Journal of Solid-State Circuits Special Issue on the 2004 Compound Semiconductor IC Symposium. He is the recipient of numerous awards, including the National Society of Black Engineers’ Dr. Janice A. Lumpkin Educator of the Year in 2005, the 2002 Black Engineer of the Year Award in Higher Education from U.S. Black Engineer and Information Technology magazine, the NSF CAREER Award, an IBM Faculty Partnership Award, the National Semiconductor Faculty Development Award, and the General Motors Faculty Fellowship Award. He was also selected as a participant in the National Academy of Engineering Frontiers of Engineering Symposium, and the German–American Frontiers of Engineering, where he later served on the organizing committee. He is a Distinguished Lecturer of the IEEE Electron Devices Society and a senior member of the IEEE, as well as a member of Eta Kappa Nu and Tau Beta Pi.

Hosts: Professors Fow-Sen Choa () and Alan T. Sherman ()

About the CSEE Seminar Series: The UMBC Department of Computer Science and Electrical Engineering presents technical talks on current significant research projects of broad interest to the Department and the research community. Each talk is free and open to the public. We welcome your feedback and suggestions for future talks.