banner
CS Colloquium (BMAC)
 

The Department of Computer Science of Colorado State University, in cooperation with ISTeC (Information Science and Technology Center), offers the CS Colloquium series as a service to all who are interested in computer science. When in-person meetings are possible, most seminars are scheduled for Monday 11:00AM -- 11:50AM in CSB 130 or Morgan Library Event Hall. For help finding the locations of our seminar meetings, consult the on-line CSU campus map.map

For questions about this page or to schedule talks, please contact Sudipto Ghosh (sudipto.ghosh AT colostate dot edu). Here is a list of past seminar schedules.

CS501 information for students is available directly on Canvas.

 

Upcoming Events





CS Colloquium Schedule, Spring 2025



January
27

cs Computer Science Department Colloquium
Introduction to the Graduate Program

Speaker: Sanjay Rajopadhye, Professor and Graduate Director, Computer Science Department

When: 11:00AM ~ 11:50AM, Monday January 27, 2025
Where: CSB 130 map

Abstract: Dr. Rajopadhye introduces the Computer Science graduate program at CSU.




February
3

cs Computer Science Department Colloquium
The PIT-Cerberus Framework: Preventing Device Tampering During Transit

Speaker: Rakesh Podder, PhD student, Computer Science, Colorado State University

When: 11:00AM ~ 11:50AM, Monday February 3, 2025
Where: CSB 130 map

Abstract: When a computing device, such as a server, workstation, laptop, tablet, etc. is shipped from one site to another (for example, from a vendor to a customer or from one branch location of an organization to another) it can potentially be subjected to unauthorized firmware modifications. The industry has sought to partially address this issue by focusing on securing the boot process. Secure boot provides attestation methods by a hardware root-of-trust to confirm the integrity of the device's BIOS ⁄ UEFI firmware. However, once a device boots up, it is relatively easy for a malicious adversary to tamper with the firmware. In this paper, we address this problem by preventing a secure boot unless done by an authorized user. We extend a hardware root of trust (HRoT) processor's ability to perform secure attestation by implementing a new functionality to securely lock and unlock the BIOS ⁄ UEFI or the BMC (Baseboard Management Controller) and implementing an authentication mechanism in the HRoT for determining authorized users. This ensures that the secure boot process won't commence unless authorized appropriately and provides a robust mechanism for securing the device's firmware during transit. The proposed PIT-Cerberus framework (PIT = Protection In Transit) leverages strong cryptographic techniques and has been implemented within a trusted microcontroller. We have contributed the PIT-Cerberus framework's libraries to Project Cerberus, an open-source project that offers a security platform for server hardware.

This paper won a best paper award at 24th International Conference on Software Quality, Reliability, and Security.

Bio: Rakesh Podder received his B.Tech. (Undergraduate) degree in Electrical Engineering from the Indian Institute of Technology (IIT), Patna, India, in 2017, and the M.E. (Masters) degree in Control System and Robotics from Jadavpur University (JU), Kolkata, India, in 2020. He is currently pursuing the Ph.D. degree in Computer Science at Colorado State University (CSU), Fort Collins, CO, USA. His research interests include cybersecurity, firmware security, AI planning, ML, and Security Analysis. He contributed to the development of secure frameworks like (PIT, S-RFUF) for Hardware Root of Trust (HRoT) and in projects such as Microsoft Project Cerberus CoRIM, googleDICE. He published papers in various international conferences and journals, and received the Best Paper Awards at the IEEE QRS 2024 and IEEE TPS 2024 Conference. He is also a student member of IEEE.




February
10

cs Computer Science Department Colloquium
Optimizing random functions: quantum algorithms or Hessian ascent?

Speaker: Juspreet Singh Sandhu, Post-doctoral Scholar at UC Santa Cruz

When: 11:00AM ~ 11:50AM, Monday February 10, 2025
Where: CSB 130 map

Abstract: Maximizing the number of satisfied constraints in a constraint satisfaction problem and finding ground-state configurations of certain magnetic alloys are central problems in computer science and statistical physics, respectively. We show that when problem instances are random, these seemingly distinct tasks become mathematically intertwined. Leveraging this connection, we establish fundamental limitations on a broad class of algorithms, including those that encompass near-term quantum algorithms. We then present the first spectral algorithm for optimizing spin glasses—disordered magnetic systems—on the hypercube, and introduce a new class of semidefinite programs that "detect" algorithmic phase transitions. These results resolve multiple conjectures at the intersection of quantum optimization, probability theory, and semidefinite programming.

Bio: Juspreet Singh Sandhu is a postdoctoral scholar at UC Santa Cruz hosted by Prof. Alexandra Kolla. He completed his doctoral studies from Harvard University under the guidance of Prof. Peter Love and Prof. Boaz Barak. His work investigates the capabilities of various algorithmic models to optimize random functions, and the consequences of this endeavor on quantum information, the sum-of-squares hierarchy, and quantum advantage in optimization. More generally, his work lies at the confluence of theoretical computer science and mathematical physics, and frequently combines tools from random matrix theory, free probability theory, stochastic analysis and harmonic analysis.




February
11

cs Computer Science Department Colloquium
Formal Methods or Usable Security: Why Not Both?

Speaker: McKenna McCall, Post-doctoral Researcher, Software and Societal Systems Department, Carnegie Mellon University

When: 9:00AM ~ 9:50AM, Tuesday February 11, 2025
Where: Clark C146 map

Abstract: Formal methods research involves using mathematical techniques to specify and verify properties of software and hardware systems. In security and privacy research, formal methods can lead to strong, provable security guarantees—and typically leave questions about how humans might interact with these systems unanswered. Indeed, formal methods and usable security are traditionally distinct areas of research. In this talk, I will demonstrate how techniques from both research areas can be applied—or even combined—to create solutions that are simultaneously mathematically rigorous and usable. In one project, we revisit static analysis tools for home IoT users from a usable security lens and investigate the usability and utility of the workflow involved in using the tools. Later in the talk, I will describe a project with a formal methods focus where we propose a new technique for preventing undesirable information flows on the web. We argue that this approach is usable in more realistic scenarios than what is proposed by prior work—without sacrificing security.

Bio: McKenna McCall is a postdoctoral researcher in the Software and Societal Systems Department at Carnegie Mellon University supervised by Lorrie Cranor and Lujo Bauer. She received her PhD from Carnegie Mellon University in 2023, advised by Limin Jia. McKenna’s research spans fields from information flow control and programming languages to security and privacy for home IoT and confidential computing. She is particularly interested in research where formal methods and usable security intersect, and combines techniques from both research areas to produce results that incorporate mathematical rigor as well as usability.




February
14

cs Computer Science Department Colloquium
Leveraging the Wisdom of Clouds for Internet Security

Speaker: Eric Pauley, Ph.D. Candidate, University Of Wisconsin-Madison

When: 11:00AM ~ 11:50AM, Friday February 14, 2025
Where: CSB 130 map

Abstract: Over the past decade, networked systems have consolidated under just a handful of hyperscale cloud providers (e.g., AWS, Azure). While this offers logistical and economic advantages, attackers specifically target providers and their customers, a shift that has left traditional network vantage points blind to the most sophisticated adversaries. In this talk, I’ll explore how we adapt Internet measurement to these new deployment models to regain situational awareness and defend modern service deployments. I’ll introduce DScope, a new Internet telescope that continuously relocates its vantage point across public cloud infrastructure. Unlike prior approaches that use a fixed vantage point, this allows us to observe the most sophisticated attackers that actively avoid existing measurement infrastructure. Our dynamic approach also achieves a statistically representative view of cloud-based attacks, a property that we prove for the first time.

Using data from DScope, I’ll also discuss how the shared networking environment of public clouds leads to new vulnerabilities. We’ll examine the problem of latent configuration, which occurs when cloud customers reference network resources that are then reused by other tenants. This new security risk is uniquely enabled by public clouds, but through rigorous analysis and systems design we can make cloud deployments more secure in practice. I’ll conclude by discussing open problems and future work in leveraging Internet vantage points for security, with a focus on intelligent interactivity and rapid response to emergent threats.

Bio: Eric Pauley is a Ph.D. candidate at the University of Wisconsin–Madison, advised by Patrick McDaniel. His research interests encompass data-driven approaches to evaluating and improving the security of networked software systems, with a particular focus on cloud computing. His work has led to practical improvements in the security of cloud-based systems through both remediations by major providers and services offered by his company, DScope Security. His research in security measurement has earned best paper runner-up at the ACM Internet Measurement Conference, a finalist spot in the CSAW Applied Research Competition, and the UW–Madison Computer Sciences Outstanding Graduate Researcher Award. Eric is also an avid backpacker, instrument-rated private pilot, and birder.




February
17

cs Computer Science Department Colloquium
Presentations of two "Best Paper Award" winning papers

Speaker: Shadaab Kawnain Bashir, PhD Student, Department of Computer Science, Colorado State University

When: 11:00AM ~ 11:50AM, Monday February 17, 2025
Where: CSB 130 map

Abstract:

Title of first talk: Resiliency Graphs: Modelling the Interplay between Cyber Attacks and System Failures through AI Planning.

Abstract: Operation efficiency in cyber physical system (CPS) has been significantly improved by digitalization of industrial control systems (ICS). However, digitalization exposes ICS to cyber attacks. Of particular concern are cyber attacks that trigger ICS failure. To determine how cyber attacks can trigger failures and thereby improve the resiliency posture of CPS, this study presents the Resiliency Graph (RG) framework that integrates Attack Graphs (AG) and Fault Trees (FT). RG uses AI planning to establish associations between vulnerabilities and system failures thereby enabling operators to evaluate and manage system resiliency. Our deterministic approach represents both system failures and cyber attacks as a structured set of prerequisites and outcomes using a novel AI planning language. AI planning is then used to chain together the causes and the consequences. Empirical evaluations on various ICS network configurations validate the framework's effectiveness in capturing how cyber attacks trigger failures and the framework's scalability.

Authors: Shadaab Kawnain Bashir, Rakesh Podder, Sarath Sreedharan, Indrakshi Ray, and Indrajit Ray

Venue: The Sixth IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications. October 28 - 30, 2024, The Darcy Hotel, Washington D.C., USA

Award: The Best Paper Award IEEE TPS 2024

Title of 2nd talk: Investigating Influential COVID-19 Perspectives: A Multifaceted Analysis of Twitter Discourse

Abstract: Social media influencers, those with verified accounts or with more than 10,000 followers, played a crucial role in the propagation of narratives during the COVID-19 pandemic. We investigate their impact by characterizing and contrasting the differences in content patterns between influential individuals versus public organizations during the pandemic, analyzing emotions, sentiments, and scientific claims expressed in their Tweets. Advanced machine learning approaches, including customized transformer models, few-shot learning, and large language models such as GPT-3.5, were used. The findings reveal a stark contrast in sentiment usage across sub-domains like vaccines and lockdowns, with organizations predominantly employing neutral tones while individuals displaying a significant negative sentiment bias. Individuals often conveyed more negative emotions, whereas organizations exhibited greater optimism. However, many claims from both groups were not verified, highlighting the need to combat misinformation.

Authors: Shadaab Kawnain Bashir, Hossein Shirazi, Noushin Salek Faramarzi, Thomas Harris, Ashmita Shishodia, Hajar Homayouni, and Indrakshi Ray

Venue: SocialSec 2024: 10th International Symposium on Security and Privacy in Social Networks and Big Data. Zayed University, Abu Dhabi, UAE | November 20-22, 2024

Award: The Best Paper Award SocialSec 2024

Bio: Shadaab Kawnain Bashir earned her Bachelor's degree in Computer Science Engineering from BRAC University, Bangladesh, in 2016. She subsequently completed a Master's degree in Computer Science at Colorado State University, United States, in 2023. Currently, she is pursuing a Ph.D. in Computer Science at Colorado State University. Before joining Colorado State University, she worked as a Lecturer at Daffodil International University, Bangladesh for a couple of years. Her research interests encompass Cybersecurity, AI planning, Machine Learning (ML), and Natural Language Processing (NLP). She has presented her work at several international conferences, where her papers received Best Paper Awards at the IEEE TPS 2024 Conference and SocialSec 2024. Additionally, she is a student member of IEEE.




February
20

cs Computer Science Department Colloquium
Application-Level Benchmarking of Quantum Hardware using Nonlocal Games

Speaker: Carlos Ortiz, Data Scientist, Pacific Northwest National Laboratory (PNNL); Research Assistant Professor, North Carolina State University; Deputy lead of the software thrust, DOE Co-design Center for Quantum Advantage (C2QA)

When: 11:00AM ~ 11:50AM, Thursday February 20, 2025
Where: CSB 130 map

Abstract: In a nonlocal game, two noncommunicating players cooperate to convince a referee that they possess a strategy that does not violate the rules of the game. Quantum strategies allow players to optimally win some games by performing joint measurements on a shared entangled state, but finding these strategies can be challenging. In this talk, we will provide an overview of some interesting nonlocal games on graphs and discuss a variational algorithm for computing these quantum strategies. When applied to a specific graph, our algorithm was able to generate a novel short-depth circuit that implements a perfect quantum strategy, i.e. a strategy that utilizes entanglement as a resource to win the game with probability one. We will argue how these quantum strategies can act as high-level benchmarks of quantum devices since these strategies require the ability to generate an entangled resource state followed by precise control of a set of measurements for their successful execution. Finally, we will discuss recent results and challenges when running these quantum strategies on superconducting and ion-trap quantum devices, as well as outline some future research directions for scaling and improving the validation capabilities of such nonlocal games.

Bio: Dr. Carlos Ortiz Marrero is a data scientist at Pacific Northwest National Laboratory (PNNL), Research Assistant Professor at North Carolina State University, and deputy lead of the software thrust at the DOE Co-design Center for Quantum Advantage (C2QA). His current focus is on utility-scale and scientific quantum algorithms, particularly in quantum machine learning, that have applications to quantum chemistry, benchmarking, and quantum sensing. He received his PhD in Mathematics from the University of Houston for studying the mathematical foundations of graph nonlocal games and quantum channels. Website: https: ⁄ ⁄ cmortiz.github.io ⁄




February
21

cs Computer Science Department Colloquium
Dependable Quantum-Classical Systems Engineering - A holistic approach

Speaker: Edoardo Giusto, Assistant Professor, Department of Electrical Engineering and Information Technology, University of Naples Federico II, Italy

When: 11:00AM ~ 11:50AM, Friday February 21, 2025
Where: CSB 130 map

Abstract: Quantum computing is poised to revolutionize the landscape of computation. By leveraging the unique properties of quantum mechanics, qubits enable unprecedented levels of computational parallelism and speed. To fully realize the potential of this emerging technology in scientific computing, quantum devices must be seamlessly integrated into classical High-Performance Computing (HPC) infrastructures. This integration opens up exciting opportunities but also introduces significant challenges, particularly in maintaining the dependability of these hybrid HPC-Quantum Computing (HPC-QC) systems. To ensure their practical utility, such systems must be resilient, secure, and capable of delivering reproducible results. Addressing these demands calls for a collaborative effort within the scientific community to develop robust co-design strategies that align quantum and classical resources effectively. This presentation will explore the critical challenges in building dependable HPC-QC systems and identify synergistic approaches to streamline the co-design process. A particular focus will be placed on one of the key pillars of system dependability: fault management. Given the intrinsic sensitivity of quantum devices to various noise sources, effective noise modeling and the development of innovative fault-tolerance techniques are imperative. To address these issues, we introduce QUFI—the Quantum Fault Injector—a novel tool designed to model noise and evaluate fault-hardening techniques in quantum devices. The presentation will showcase QUFI's capabilities, offering real-world insights into its performance and highlighting its potential to enhance the reliability of quantum computing systems.

Bio: Dr. Edoardo Giusto is an Assistant Professor in the Department of Electrical Engineering and Information Technology at the University of Naples Federico II, Italy. He holds membership in both IEEE and ACM. Dr. Giusto earned his M.S. in Computer Engineering in 2017 and his Ph.D. in Computer and Systems Engineering in 2021, both from Politecnico di Torino, Italy. He previously served as a visiting postdoctoral researcher at the Superconducting Quantum Materials and Systems Center at Fermilab in Batavia, IL, USA. This role was part of the Next Generation Internet Transatlantic Fellowship Program, funded by the European Commission under Horizon Europe. Dr. Giusto plays an active role in the academic community, serving as a technical committee member for leading conferences such as IEEE Quantum Week (QCE), the Design, Automation, and Test in Europe Conference (DATE), and the Design Automation Conference (DAC). Additionally, he holds the position of Vice-Chair for IEEE Consumer Technology Society's Quantum in Consumer Technology initiative. His research focuses on quantum computing, with interests that include quantum applications, problem mapping, and the reliability and fault tolerance of quantum devices. He is also involved in exploring the integration of quantum computing into high-performance computing infrastructures.




February
24

cs Computer Science Department Colloquium
Many-body quantum games and computational phases of matter

Speaker: Oliver Hart, Postdoctoral Fellow, Center for Theory of Quantum Matter, University of Colorado, Boulder

When: 11:00AM ~ 11:50AM, Monday February 24, 2025
Where: CSB 130 map

Abstract: For which tasks do ideal quantum computers provably outperform their classical counterparts? And how does this advantage hold up when using today’s noisy quantum hardware? These questions are central to understanding the practical power of quantum computing. Nonlocal quantum games – computational tasks that leverage the exotic correlations of quantum mechanics – offer a compelling framework for demonstrating unconditional quantum advantage. Namely, advantage that does not rely on complexity-theoretic assumptions or comparisons to the dynamic landscape of classical algorithms.

In this talk, I will draw on insights from theoretical condensed matter physics and error-correcting codes to design computational tasks – formulated as multiplayer nonlocal quantum games – that exhibit quantum advantage over all classical strategies. I will also show how the concept of "topological order" can be used to construct quantum strategies that retain their advantage in the presence of noise. This advantage is demonstrated through experiments on Quantinuum’s trapped-ion quantum processor, H1-1. By extending multiplayer nonlocal games into the realm of many-body physics, this work establishes connections to areas such as cryptography, contextuality, and measurement-based quantum computation.

Bio: Oliver Hart is a postdoctoral fellow at the Center for Theory of Quantum Matter at the University of Colorado, Boulder and completed his PhD in theoretical physics at the University of Cambridge. His research combines ideas from computer science, quantum information, and condensed matter physics to tackle key theoretical and practical problems in quantum computing. He is particularly interested in quantum games, error correction, and state preparation, as well as topological phases of matter and nonequilibrium quantum dynamics.




February
25

cs Computer Science Department Colloquium
Bridging Software Engineering and Cybersecurity to Enhance Early-Stage Software Security

Speaker: Viktoria Koscinski, PhD Candidate, Computing and Sciences, Rochester Institute of Technology

When: 9:00AM ~ 9:50AM, Tuesday February 25, 2025
Where: Clark C146 map

Abstract: Software security is commonly overlooked during the early stages of the software engineering lifecycle, resulting in security vulnerabilities that are later difficult and costly to fix. Insecure software design is known as a critical risk that can arise from the early stages of requirements engineering, often due to missing or underspecified security requirements. This talk introduces my research, which uses automated machine learning (ML)-based requirements synthesis to assist software engineers in creating security requirements for systems they are designing, and formal modeling and analysis techniques in order to evaluate software security in the early requirements stage. By combining ML with formal modeling and analysis techniques, my research aims to bridge the gap between software engineering and cybersecurity by automatically suggesting domain-specific security requirements and detecting underspecified requirements. This talk will reflect upon the potentials of this research to improve the security of systems during the early design stage, introduce my preliminary research on vulnerability management for cases in which vulnerabilities are already present, as well highlight future directions and additional applications of using these techniques within software engineering.

Bio: Viktoria Koscinski is a Computing and Sciences PhD candidate at the Rochester Institute of Technology in Rochester, NY. She earned her bachelor’s and master’s degrees in Computer and Information Science from the State University of New York Polytechnic Institute in Utica, NY. Her research focuses on applying formal analysis and artificial intelligence ⁄ machine learning techniques to software engineering processes in order to improve software security at the early design stages. Her work has been published in top-tier software engineering (SE) conferences, such as ICSE and RE. Viktoria has been involved with various collaboration and outreach efforts, such as completing two research internships with the Griffiss Institute, a nonprofit talent and technology accelerator for the US DoD, as well being invited as a guest speaker for the Society of Hispanic Professional Engineers 2024 Cybersecurity Awareness Month edition of #SHPEReads: GRADS Edition research seminar. Her mentorship and teaching experiences include being a team lead for eight undergraduate researchers involved in a vulnerability management R&D project as well as teaching graduate-level SE courses since 2023.




February
26

cs Computer Science Department Colloquium
Designing for Social Cybersecurity and Safety

Speaker: Matthias Fassl

When: 12:00PM ~ 12:50PM, Wednesday February 26, 2025
Where: CSB 130 map

Abstract: Since cryptography became more accessible in the 1960s, governments have tried to limit access to it in several crypto wars. These discussions pitch privacy and safety, both very valuable, against each other, saying that one undermines the other. However, safety comes not only from police investigations and increased surveillance but also from deploying hard-to-abuse tools and providing support when needed.

Careful design can help achieve these goals. Making technology harder to abuse and harm others and offering a technology-mediated version of the social support we know from our everyday lives. Based on my research on the role of social norms in security and privacy behavior and designing safety mechanisms against intimate-image-based abuse, I will present my vision of policy-oriented HCI research in cybersecurity that supports safety without surveillance.

Bio: Matthias Fassl, a postdoctoral researcher at the CISPA Helmholtz Center for Information Security, is an HCI researcher who focuses on security, privacy, and safety. He is interested in the social aspects of security behavior and safety from technology-mediated interpersonal harms. Since his traineeship in the European Commission's cybercrime policy unit, he wants his research to contribute to ongoing policy discussions. He has a PhD from Saarland University and a Master's in Computer Engineering from TU Wien.




March
3

cs Computer Science Department Colloquium
Advancing Security Red-Teaming through Probabilistic Binary Analysis

Speaker: Zhuo Zhang, Post-doctoral Researcher, Department of Computer Science, Purdue University

When: 11:00AM ~ 11:50AM, Monday March 3, 2025
Where: CSB 130 map

Abstract: Digital systems are the backbone of modern society, supporting everything from critical infrastructure to everyday communications. As these systems grow increasingly complex, securing them requires collective and broader community efforts beyond in-house teams. Third-party red-teaming plays a crucial role in this shared responsibility by conducting rigorous security assessments to uncover hidden vulnerabilities and inform proactive defense strategies. However, a major challenge for independent security teams is the frequent lack of access to the system of interest, particularly its source code, which hinders red-teaming efforts.

In this talk, I will introduce probabilistic binary analysis, a novel framework that leverages probabilistic modeling to analyze compiled binaries when source code is unavailable. By systematically examining binary behavior and rigorously modeling the uncertainties inherent in the analysis process, this approach uncovers security flaws and provides actionable insights for proactive defense. Our method has already demonstrated real-world impact by identifying critical vulnerabilities in widely used systems, earning substantial bug bounties, and receiving recognition through the SIGSAC Doctoral Dissertation Award.

Bio: Zhuo Zhang is a postdoctoral researcher at Purdue University specializing in software and system security. His research has been published in top-tier venues, including IEEE S&P, USENIX Security, ACM CCS, NDSS, ICSE, OOPSLA, and PLDI. Zhuo's projects have collectively garnered approximately 2,000 GitHub stars and have been adopted in real-world practice by DAPAR and ONR. His work has received several prestigious accolades, including Distinguished Paper Awards at OOPSLA 2019 and CCS 2024, as well as the 2024 ACM SIGSAC Doctoral Dissertation Award. He earned his Ph.D. in Computer Science from Purdue University in 2023 under the guidance of Prof. Xiangyu Zhang.




March
7

cs Computer Science Department Colloquium


Speaker: John Kallaugher

When: 11:00AM ~ 11:50AM, Friday March 7, 2025
Where: CSB 130 map

Abstract:

Bio:




March
10

cs Computer Science Department Colloquium
Monitoring Problem for Signal Temporal Logic with Value Freezing Operators (STL*) Best Paper Award winner at MEMOCODE 2024

Speaker: Bassem Ghorbel, PhD Student, Department of Computer Science, Colorado State University

When: 11:00AM ~ 11:50AM, Monday March 10, 2025
Where: CSB 130 map

Abstract: Temporal logic has been widely used in formal verification and runtime monitoring of complex systems. Signal Temporal Logic (STL), in particular, has been extended with the value freezing operator to express properties that depend on data values observed over time, leading to the logic known as STL*. While previous approaches to STL* monitoring faced scalability challenges, recent advances have enabled more efficient techniques. This talk will provide an overview of STL* and its role in monitoring temporal properties, along with background on various temporal logics, including Linear Temporal Logic (LTL), Metric Temporal Logic (MTL), and STL. The impact of these logics in both research and industry will be discussed, highlighting their applications in cyber-physical systems and formal verification.

Bio: Bassem Ghorbel is a Ph.D. candidate in Computer Science at Colorado State University, Fort Collins, CO, USA. His research focuses on formal methods, model checking, and temporal logics, particularly in the area of monitoring for signal temporal logic and its extensions. He has published research in the International Conference on Hybrid Systems: Computation and Control (HSCC), IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, and ACM ⁄ IEEE international symposium on formal methods and models for system design (MEMOCODE), contributing to the development of scalable and efficient algorithms for runtime verification and monitoring of complex temporal properties in cyber-physical systems.




March
17

cs Computer Science Department Colloquium


Speaker: SPRING BREAK

When: 11:00AM ~ 11:50AM, Monday March 17, 2025
Where: CSB 130 map

Abstract:




March
24

cs Computer Science Department Colloquium


Speaker: Gowtham Kaki, Assistant Professor, Computer Science, University of Colorado

When: 11:00AM ~ 11:50AM, Monday March 24, 2025
Where: CSB 130 map

Abstract:




March
31

cs Computer Science Department Colloquium
Development of AI Automated Diagnosis Coding Tools at Colorado State University

Speaker: Adam Kiehl, Health Data Scientist, College of Veterinary Medicine and Biomedical Sciences, Colorado State University

When: 11:00AM ~ 11:50AM, Monday March 31, 2025
Where: CSB 130 map

Abstract: Veterinary medical records represent a large data resource for application to veterinary and One Health clinical research efforts. Use of the data is limited by interoperability challenges including inconsistent data formats and data siloing. Clinical coding using standardized medical terminologies enhances the quality of medical records and facilitates their interoperability with veterinary and human health records from other sites. Previous studies, such as DeepTag and VetTag, evaluated the application of Natural Language Processing (NLP) to automate veterinary diagnosis coding, employing long short-term memory (LSTM) and transformer models to infer a subset of Systemized Nomenclature of Medicine - Clinical Terms (SNOMED-CT) diagnosis codes from free-text clinical notes. This study expands on these efforts by incorporating all 7,739 distinct SNOMED-CT diagnosis codes recognized by the Colorado State University (CSU) Veterinary Teaching Hospital (VTH) and by leveraging the increasing availability of pre-trained large language models (LLMs). Ten freely-available pre-trained LLMs were fine-tuned on the free-text notes from 246,473 manually-coded veterinary patient visits included in the CSU VTH's electronic health records (EHRs), which resulted in superior performance relative to previous efforts. The most accurate results were obtained when expansive labeled data were used to fine-tune relatively large clinical LLMs, but the study also showed that comparable results can be obtained using more limited resources and non-clinical LLMs. The results of this study contribute to the improvement of the quality of veterinary EHRs by investigating accessible methods for automated coding and support both animal and human health research by paving the way for more integrated and comprehensive health databases that span species and institutions.

Preprint: https: ⁄ ⁄ arxiv.org ⁄ abs ⁄ 2410.15186

Bio: Adam Kiehl is a health data scientist at Colorado State University’s Veterinary Teaching Hospital. As a student at CSU, he studied data science and applied statistics and interned with the hospital in a data engineering role. His work focused on the conversion of veterinary medical records data into the OHDSI OMOP common data model format to increase its usability, accessibility, and interoperability. His work has since expanded to include the development of AI solutions to improve data utility and support ongoing clinical research projects at the university. He additionally serves on the research committee of CSU’s AI task force and is an affiliate of the CSU Data Science Research Institute.




April
7

cs ISTeC


Speaker: Hossam Hassanein

When: 11:00AM ~ 11:50AM, Monday April 7, 2025
Where: CSB 130 map

Abstract:




April
14

cs Computer Science Department Colloquium


Speaker: Fabio Abreu de Santos, Computer Science Scholar, Department of Computer Science, Colorado State University

When: 11:00AM ~ 11:50AM, Monday April 14, 2025
Where: CSB 130 map

Abstract:




April
21

cs Computer Science Department Colloquium


Speaker: Jordan Boyd-Graber

When: 11:00AM ~ 11:50AM, Monday April 21, 2025
Where: CSB 130 map

Abstract:




April
28

cs Computer Science Department Colloquium
Presentations of "Best Paper Award" winning paper

Speaker: Sheikh Mannan, PhD Student, and Trevor Chartier, Undergrad Student, Department of Computer Science

When: 11:00AM ~ 11:50AM, Monday April 28, 2025
Where: CSB 130 map

Abstract:




May
1

cs ISTeC Distinguished Lecture
Connecting Visual Framing with Computational Communication Science

Speaker: Daniela Dimitrova, University Professor, Iowa State University, LAS Dean’s Professor, Greenlee School of Journalism and Communication

When: 11:00AM ~ 11:50AM, Thursday May 1, 2025
Where: TBD map

Abstract: While framing is a well-established theoretical perspective in the social sciences, visual framing remains underexplored. Understanding framing through a journalistic lens, the talk will provide an overview of the main aspects of visual framing analysis, discussing both quantitative and qualitative approaches to studying visuals. A four-tiered model of visual framing will be summarized and new ways of connecting each level of visual framing with Computational Communication Science (CCS) approaches will be proposed.

Bio: Daniela V. Dimitrova (Ph.D., University of Florida) is a University Professor at Iowa State University and LAS Dean’s Professor in the Greenlee School of Journalism and Communication. She serves as the Editor-in-Chief of Journalism & Mass Communication Quarterly, the flagship journal of AEJMC. Her research interests include political communication, cross-cultural journalism studies, and refugee communications. Dimitrova’s research has been published widely in leading journals such as Communication Research, Journalism & Mass Communication Quarterly, New Media & Society, Press ⁄ Politics, International Communication Gazette, Journalism Studies, and the Journal of Computer-Mediated Communication and cited more than 7,000 times. Her edited volume titled Global Journalism: Understanding World Media Systems is now in its second edition. Dimitrova is the recipient of multiple grants and awards, including Fulbright-University of Vienna Professor of Social Sciences, AEJMC Senior Scholar, Arthur W. Page Center for Integrity in Public Communication Legacy Scholar, and LAS International Service and Excellence in Graduate Mentoring awards.




May
2

cs ISTeC
What Is Visual Framing?

Speaker: Daniela Dimitrova, University Professor, Iowa State University, LAS Dean’s Professor, Greenlee School of Journalism and Communication

When: 11:00AM ~ 11:50AM, Friday May 2, 2025
Where: TBD map

Abstract: Media framing is a well-established theoretical perspective, but visual framing remains underexplored. What are the main aspects of visual framing? How can images be studied in the field of journalism and mass communication? Dr. Dimitrova will provide an overview of the main aspects of visual framing analysis, discussing both quantitative and qualitative approaches to studying visuals. The speaker will also present a four-tiered model of visual framing and suggest different ways to capturing content and meaning in visual communication.

Bio: Daniela V. Dimitrova (Ph.D., University of Florida) is a University Professor at Iowa State University and LAS Dean’s Professor in the Greenlee School of Journalism and Communication. She serves as the Editor-in-Chief of Journalism & Mass Communication Quarterly, the flagship journal of AEJMC. Her research interests include political communication, cross-cultural journalism studies, and refugee communications. Dimitrova’s research has been published widely in leading journals such as Communication Research, Journalism & Mass Communication Quarterly, New Media & Society, Press ⁄ Politics, International Communication Gazette, Journalism Studies, and the Journal of Computer-Mediated Communication and cited more than 7,000 times. Her edited volume titled Global Journalism: Understanding World Media Systems is now in its second edition. Dimitrova is the recipient of multiple grants and awards, including Fulbright-University of Vienna Professor of Social Sciences, AEJMC Senior Scholar, Arthur W. Page Center for Integrity in Public Communication Legacy Scholar, and LAS International Service and Excellence in Graduate Mentoring awards.




May
5

cs Computer Science Department Colloquium


Speaker: Bianca Trinkenreich, Assistant Professor, Department of Computer Science, Colorado State University

When: 11:00AM ~ 11:50AM, Monday May 5, 2025
Where: CSB 130 map

Abstract: