Tutorials
Tutorial Chairs: | |
---|---|
James Joshi University of Pittsburgh, USA |
|
Rinku Dewri University of Denver, USA |
|
Patrick Tague Carnegie Melon University, USA |
Tutorial Abstracts and Lecturer Resumes
Tutorial 1: Fraud Detection through Graph-Based User Behavior Modeling
Lecturers:- Alex Beutel (Carnegie Mellon University, USA)
- Leman Akoglu (Stony Brook University, USA)
- Christos Faloutsos (Carnegie Mellon University, USA)
Alex Beutel is a fifth year Ph.D. candidate at Carnegie Mellon University in the
Computer Science Department. He previously received his B.S. from Duke University.
His Ph.D. research focuses on large scale user behavior modeling, covering both
recommendation systems and fraud detection systems. He has interned at Facebook
on both the Site Integrity and News Feed Ranking teams, at Microsoft in the Cloud
and Information Services Laboratory, and at Google Research. Alex's research is
supported by the National Science Foundation Graduate Research Fellowship Program
and a Facebook Fellowship. More details can be found at http://alexbeutel.com.
Leman Akoglu is an Assistant Professor in the Department of Computer Science at
Stony Brook University. She received her Ph.D. from the Computer Science Department
at Carnegie Mellon University in 2012. She also worked at IBM T. J. Watson Research
Labs and Microsoft Research at Redmond during summers. Her research interests span a
wide range of data mining and machine learning topics with a focus on algorithmic
problems arising in graph mining, pattern discovery, social and information networks,
and especially anomaly mining; outlier, fraud, and event detection. Dr. Akoglu's
research has won 4 publication awards; Best Research Paper at SIAM SDM 2015, Best Paper
at ADC 2014, Best Paper at PAKDD 2010, and Best Knowledge Discovery Paper at ECML/PKDD 2009.
She also holds 3 U.S. patents filed by IBM T. J. Watson Research Labs. Dr. Akoglu is a
recipient of the NSF CAREER award (2015) and Army Research Office Young Investigator
award (2013). Her research is currently supported by the National Science Foundation,
the US Army Research Office, DARPA, and a gift from Northrop Grumman Aerospace Systems.
More details can be found at http://www.cs.stonybrook.edu/~leman.
Christos Faloutsos is a Professor at Carnegie Mellon University. He has received the
Presidential Young Investigator Award by the National Science Foundation (1989), the
Research Contributions Award in ICDM 2006, the Innovations award in KDD'10, 20 "best paper"
awards, and several teaching awards. He has served as a member of the executive committee of
SIGKDD; he has published over 200 refereed articles, 11 book chapters and one monograph. He holds
five patents and he has given over 30 tutorials and over 10 invited distinguished lectures. His
research interests include data mining for graphs and streams, fractals, database performance,
and indexing for multimedia and bio-informatics data. More details can be found at
http://www.cs.cmu.edu/~christos/.
Tutorial 2: Program Analysis for Mobile Application Integrity and Privacy Enforcement
Lecturer:- Marco Pistoia (IBM T. J. Watson Research Center, USA)
Marco Pistoia, Ph.D. is a Senior Manager and Principal Research Staff Member at the IBM Thomas J. Watson
Research Center in New York, where he manages the Mobile Enterprise Software research group. In January 2010,
he was one of 38 IBM researchers worldwide to be bestowed the title of IBM Master Inventor. He is the inventor
of 90 patents issued and 70 patent applications filed in the United States Patent and Trademark Office.
Dr. Pistoia has designed and implemented numerous analysis components and contributed large amounts of code to
IBM's main products for static quality analysis and mobile application management.
Dr. Pistoia received his Ph.D. degree in Mathematics from New York University, Polytechnic School of Engineering,
in May 2005. He has written ten books and published numerous papers and journal articles on various aspects of
Program Analysis, Language-Based Security and Mobile Computing. He has published and presented at numerous
conferences worldwide, including OOPSLA, ECOOP, PLDI, ICSE, ACSAC, ISSTA, CCS, VMCAI, PLAS and S&P. He has also
been invited to lecture at several research institutions worldwide. He has been the recipient of three
ACM SIGSOFT Distinguished Paper Awards, a Pat Goldberg Memorial Best Paper, and a European Community Erasmus
Fellowship Award.
Tutorial 3: Introduction to Cryptocurrencies
Lecturer:- Stefan Dziembowski (University of Warsaw, Poland)
Stefan Dziembowski is professor at the University of Warsaw. He is interested in theoretical and applied
cryptography. Dziembowski received a PhD degree in computer science from the University of Aarhus, Denmark.
He was a post-doc at the ETH Zurich, CNR Pisa and the Sapienza University of Rome, where he joined the faculty
in 2008. In 2010 he moved to the University of Warsaw where he leads the Cryptography and Data Security Group.
His papers appeared at leading computer science conferences (FOCS, STOC, CRYPTO, EUROCRYPT, ASIACRYPT, IEEE S&P,
and TCC), and journals (Journal of Cryptology, IEEE Transactions on Information Theory). He also served as a PC
member of several international conferences, including CRYPTO, EUROCRYPT, and ASIACRYPT. His paper on secure
computations on Bitcoin received the Best Paper Award on IEEE S&P 2014. He published two papers on the
Workshop on Bitcoin Research, and two other papers on topics related to Bitcoin on CRYPTO 2015. He also got the
Best Paper Award on EUROCRYPT 2014 for a paper concerning the leakage-resilient cryptography.
He served as the general chair of the Twelfth Theory of Cryptography Conference (TCC'15). He is a recipient of
an ERC Starting grant and an FNP Welcome grant.