<node id="619810">
  <nid>619810</nid>
  <type>event</type>
  <uid>
    <user id="34659"><![CDATA[34659]]></user>
  </uid>
  <created>1553801565</created>
  <changed>1553802105</changed>
  <title><![CDATA[Cybersecurity Lecture Series with Shang-Tse Chen]]></title>
  <body><![CDATA[<p>The&nbsp;<a href="https://iisp.gatech.edu/cyber-lecture">Cybersecurity Lecture Series at Georgia&nbsp;Tech</a>&nbsp;is a free, one-hour lecture from a thought leader who is advancing the field of information security and privacy. Invited speakers include executives and researchers from Fortune 500 companies, federal intelligence agencies, start-ups, and incubators, as well as Georgia Tech faculty and students presenting their research. Lectures are open to all -- students, faculty, industry, government, or simply the curious.</p>

<p><a href="http://attend.com/cyberlecture-chen">RSVP</a></p>

<h3>Abstract:</h3>

<p>While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge, especially in adversarial environments. In this talk, I address two interrelated problems that are essential to the successful deployment of AI in security settings. (1) Discovering real-world vulnerabilities of deep neural networks and countermeasures to mitigate threats. I will present ShapeShifter, the first targeted physical adversarial attack that fools state-of-the-art object detectors, and SHIELD, a real-time defense that removes adversarial noise by stochastic data compression. (2) Developing theoretically-principled methods for choosing machine models to defend against unknown future attacks. I will introduce a novel game theory concept called &ldquo;diversified strategy&rdquo; to help make the optimal decision with limited risk. Finally, I will share my vision on making AI more robust under different threat models, and research directions on deploying AI in security-critical and high-stakes problems.&nbsp;</p>

<h3>Bio:&nbsp;</h3>

<p><a href="https://www.cc.gatech.edu/~schen351/">Shang-Tse Chen</a>&nbsp;is a Ph.D. Candidate in Computer Science at Georgia Tech. He works in the intersection of applied and theoretical machine learning. His research focuses on designing robust machine learning algorithms for security-critical applications. He has worked closely with industry and government partners. His research has led to patent-pending cyber threat detection technology with Symantec, open-sourced adversarial attack and defense tools with Intel, deployed fire risk prediction system with the Atlanta Fire Rescue Department. He is a recipient of the KDD Best Student Paper Runner-up Award (2016) and the IBM Ph.D. Fellowship (2018).</p>
]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Free, open-to-the public discussion about cybersecurity risks, trends, and techniques.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>On Friday, April 5th&nbsp;guest speaker, and Ph.D. Candidate at Georgia Tech College of Computing, <a href="https://www.cc.gatech.edu/~schen351/">Shang-Tse Chen</a>&nbsp;will discuss two interrelated problems that are essential to the successful deployment of AI in security settings.</p>
]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2019-04-05T13:00:00-04:00]]></value>
      <value2><![CDATA[2019-04-05T14:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
          <item>
        <value><![CDATA[free_food]]></value>
      </item>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Faculty/Staff]]></value>
      </item>
          <item>
        <value><![CDATA[Postdoc]]></value>
      </item>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
          <item>
        <value><![CDATA[Graduate students]]></value>
      </item>
          <item>
        <value><![CDATA[Undergraduate students]]></value>
      </item>
      </field_audience>
  <field_media>
          <item>
        <nid>
          <node id="619809">
            <nid>619809</nid>
            <type>image</type>
            <title><![CDATA[Shang-Tse Chen]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>235991</fid>
                  <filename><![CDATA[myphoto - Shang-Tse Chen.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/myphoto%20-%20Shang-Tse%20Chen.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/myphoto%20-%20Shang-Tse%20Chen.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="593723">
            <nid>593723</nid>
            <type>image</type>
            <title><![CDATA[Cybersecurity Lecture Series by IISP]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>226333</fid>
                  <filename><![CDATA[CLS_logo_FY18 w tag.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/CLS_logo_FY18%20w%20tag.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[<p><a href="mailto:lindsey.panetta@gtri.gatech.edu">lindsey.panetta@gtri.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[http://attend.com/cyberlecture-chen]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>494561</item>
          <item>430601</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[IISP Faculty Directory]]></item>
          <item><![CDATA[Institute for Information Security and Privacy]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1795</tid>
        <value><![CDATA[Seminar/Lecture/Colloquium]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>179178</tid>
        <value><![CDATA[Shang-Tse Chen]]></value>
      </item>
          <item>
        <tid>170586</tid>
        <value><![CDATA[cybersecurity lecture series]]></value>
      </item>
          <item>
        <tid>2835</tid>
        <value><![CDATA[ai]]></value>
      </item>
      </field_keywords>
  <userdata><![CDATA[]]></userdata>
</node>
