Guest Seminar Series
Watch our most recent SeminarS:
2019/20 Guest Seminar Series:
Title: Interactions between Group Theory, Cyber Security, Artificial Intelligence, and Quantum Computation
Abstract: In this talk, Professor Kahrobaei will explore how group theory is playing a crucial role in cyber security and quantum computation. At the same time, how computer science (for example, machine learning algorithms and computational complexity) could help group theorists so tackle their open problems, as such this could help with cryptanalysis of the proposed primitives.
Symmetry is present in all forms in the natural and biological structures as well as man-made environments. Computational symmetry applies group-theory to create algorithms that model and analyze symmetry in real data set. The use of symmetry groups in optimizing the formulation of signal processing and machine learning algorithms can greatly enhance the impact of these algorithms in many fields of science and engineering where highly complex symmetries exist.
At the same time, Machine Learning techniques could help with solving long standing group theoretic problems. For example, in the paper [J. Gryak, R. Haralick ), D. Kahrobaei, Solving the Conjugacy Decision Problem via Machine Learning, Experimental Mathematics, Taylor & Francis (2019)] the authors use machine learning techniques to solve the conjugacy decision problem in a variety of groups. Beyond their utilitarian worth, the developed methods provide the computational group theorist a new digital “sketchpad” with which one can explore the structure of groups and other algebraic objects, and perhaps yielding heretofore unknown mathematical relationships.
Title: Reducing the Attack Surface with Records Management
Abstract: Looking into the depths of how information security incidents can potential be prevented or reduced using records management techniques. Addressing the incidents and considering the privacy, trust and data protection impacts of those incidents and whether or not if good records management was considered to be more than just filing, it would have helped.
Title: Responses to Cyber-Enabled Scams and Fears of Cybercrime: Rethinking the Standard Models
Abstract: Government strategies have involved adapting counter-terrorism models to all serious and organised crime, including cyber-enabled crimes. Based on research over the last decade, the aim is to re-examine public policing and public-private partnership policing to consider what may be required to ‘satisfice’ victimisation, repeat victimisation, and fear of cyber scams.