<?xml version="1.0"?>
<News hasArchived="false" page="87" pageCount="221" pageSize="10" timestamp="Sun, 03 May 2026 21:55:26 -0400" url="https://my3.my.umbc.edu/groups/ieee/posts.xml?page=87">
<NewsItem contentIssues="true" id="57868" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/57868">
<Title>PhD defense: Infrastructure-less Group Data Sharing using Smart Devices</Title>
<Body>
<![CDATA[
    <div class="html-content"><h4><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/12/p2p.jpeg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h4>
    <h4>Ph.D. Dissertation Defense</h4>
    <h1>Infrastructure-less Group Data<br>
    Sharing using Smart Devices</h1>
    <h2>Ahmed Shahin</h2>
    <h3>2:30 Tuesday, 8 December 2015, ITE-346</h3>
    <p>Advances in pervasive communication technology have enabled many unconventional applications that facilitate and improve the safety and quality of life in modern society. Among emerging applications is situational awareness where individuals and first-responders receive timely alerts about serious events that could have caused the interruption of the services provided by the communication infrastructure such as cellular networks, Wi-Fi hotspots, etc. Another example is when exchanging road conditions between peer-to-peer networked vehicles without the involvement of roadside units. The popularity of smart portable devices such as iPhone and Android powered phones and tablets has made them an attractive choice that can play a role in the realization of these emerging applications. These devices support multiple communication standards and thus enable Device-to-Device (D2D) data exchange at an increased level of convenience. By using technologies such as Bluetooth, Wi-Fi ad-hoc mode and Wi-Fi Direct, these devices are able to communicate without the need for any communication infrastructures. In addition, many of these devices are equipped with sensors that can provide a wealth of information about the surroundings once their readings are aggregated.</p>
    <p>However, most existing protocols for data sharing among devices either require an internet connection, which may not be available and may incur extra costs in some cases, or suffer from the device’s operating system limitations. Actually there is no existing solution that allows a set of devices to start sharing data dynamically without forcing the users to apply an elaborate procedure for setting up a group. These shortcomings render existing solutions unsuitable for emergency cases. In this dissertation proposal, we tackle such a problem by developing a framework for enabling data exchange in a cost-effective and timely manner through the establishment of peer-to-peer links among smart devices. In addition, our framework opts to minimize the user required interaction for setting up a connection and overcome the limitations of the operating system.</p>
    <p>Our framework consists of a set of protocols for group data exchange using Wi-Fi Direct on Android devices. First we present an Efficient and Lightweight protocol for peer-to-peer Networking of Android smart devices over Wi-Fi Direct (ELN). ELN main goal is to overcome the Wi-Fi Direct support limitations in Android, thus allowing the devices in one Wi-Fi Direct group to communicate together. The ELN protocol is validated by implementing a group chatting application. In addition, we present a protocol for Alert Dissemination using Service discovery (ADS) in Wi-Fi Direct. ADS uses the service discovery feature of Wi-Fi Direct for distributing alerts to nearby devices without requiring any prior connections and thus avoids the setup delay in creating Wi-Fi Direct groups and the limitations of multi-group connectivity in Android. ADS is validated by implementing a hazard propagation application for Android. Finally, we present an Efficient Multi-group formation and Communication (EMC) protocol for Wi-Fi Direct. EMC exploits the battery specifications of the devices to qualify potential group owners and enable dynamic formation of efficient groups. Moreover, EMC allows data exchange between different Wi-Fi direct groups. Part of our implementation of EMC in Android involves the modification of the Android source code to allow multi-group support. A chat application is developed to validate EMC.</p>
    <p>To complete the dissertation, we plan to extend EMC by replacing the static assignment of devices’ addresses in our current implementation with an IP address negotiation protocol that runs before creating groups. Such an extension would give greater flexibility in adapting EMC. In addition, we plan to define some criteria for selecting proxy members in order to allow maximum coverage and allow the D2D communication to span a larger geographical area. In addition, we will develop a simulator to do large scale testing for the proposed framework. Finally, we would like to explore the use of dual transceivers in order to increase the robustness of D2D connections when the wireless channels are subject to varying level of interference; particularly we like to investigate the integration of Bluetooth Low Energy within our framework to enable group membership of nodes that do not have Wi-Fi Direct or suffer interference that makes the Wi-Fi Direct links unstable.</p>
    <p>Committee: Drs. Mohamed Younis (Chair), Charles Nicholas, Chintan Patel, Tinoosh Mohsenin</p></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense   Infrastructure-less Group Data  Sharing using Smart Devices   Ahmed Shahin   2:30 Tuesday, 8 December 2015, ITE-346   Advances in pervasive communication technology...</Summary>
<Website>https://www.csee.umbc.edu/2015/12/phd-defense-infrastructure-less-group-data-sharing-using-smart-devices/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/57868/guest@my.umbc.edu/d3e316b253b8390de7af4c058b8c428d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 03 Dec 2015 09:07:09 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="56383" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56383">
<Title>MS defense, Budhraja: Neuroevolution-Based Inverse Reinforcement Learning</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/12/kanran.png" alt="kanran" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>M.S. Thesis Defense</h3>
    <h1>Neuroevolution-Based Inverse Reinforcement Learning</h1>
    <h2>Karan K. Budhraja</h2>
    <h3>9:00am Wednesday, 2 December 2015, ITE 346</h3>
    <p>Motivated by such learning in nature, the problem of Learning from Demonstration is targeted at learning to perform tasks based on observed examples. One of the approaches to Learning from Demonstration is Inverse Reinforcement Learning, in which actions are observed to infer rewards. This work combines a feature based state evaluation approach to Inverse Reinforcement Learning with neuroevolution, a paradigm for modifying neural networks based on their performance on a given task. Neural networks are used to learn from a demonstrated expert policy and are evolved to generate a policy similar to the demonstration. The algorithm is discussed and evaluated against competitive feature-based Inverse Reinforcement Learning approaches. At the cost of execution time, neural networks allow for non-linear combinations of features in state evaluations. These valuations may correspond to state value or state reward. This results in better correspondence to observed examples as opposed to using linear combinations.</p>
    <p>This work also extends existing work on Bayesian Non-Parametric Feature construction for Inverse Reinforcement Learning by using non-linear combinations of intermediate data to improve performance. The algorithm is observed to be specifically suitable for a linearly solvable non-deterministic Markov Decision Processes in which multiple rewards are sparsely scattered in state space. Performance of the algorithm is shown to be limited by parameters used, implying adjustable capability. A conclusive performance hierarchy between evaluated algorithms is constructed.</p>
    <p>Committee: Drs. Tim Oates, Cynthia Matuszek and Tim Finin</p></div>
]]>
</Body>
<Summary>M.S. Thesis Defense   Neuroevolution-Based Inverse Reinforcement Learning   Karan K. Budhraja   9:00am Wednesday, 2 December 2015, ITE 346   Motivated by such learning in nature, the problem of...</Summary>
<Website>http://www.csee.umbc.edu/2015/12/ms-defense-budhraja-neuroevolution-based-inverse-reinforcement-learning/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56383/guest@my.umbc.edu/a3baac40117364cc0e0836a7d8a741c6/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 01 Dec 2015 23:06:25 -0500</PostedAt>
<EditAt>Tue, 01 Dec 2015 23:06:25 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="57869" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/57869">
<Title>MS defense, Budhraja: Neuroevolution-Based Inverse Reinforcement Learning</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/12/kanran.png" alt="kanran" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>M.S. Thesis Defense</h3>
    <h1>Neuroevolution-Based Inverse Reinforcement Learning</h1>
    <h2>Karan K. Budhraja</h2>
    <h3>9:00am Wednesday, 2 December 2015, ITE 346</h3>
    <p>Motivated by such learning in nature, the problem of Learning from Demonstration is targeted at learning to perform tasks based on observed examples. One of the approaches to Learning from Demonstration is Inverse Reinforcement Learning, in which actions are observed to infer rewards. This work combines a feature based state evaluation approach to Inverse Reinforcement Learning with neuroevolution, a paradigm for modifying neural networks based on their performance on a given task. Neural networks are used to learn from a demonstrated expert policy and are evolved to generate a policy similar to the demonstration. The algorithm is discussed and evaluated against competitive feature-based Inverse Reinforcement Learning approaches. At the cost of execution time, neural networks allow for non-linear combinations of features in state evaluations. These valuations may correspond to state value or state reward. This results in better correspondence to observed examples as opposed to using linear combinations.</p>
    <p>This work also extends existing work on Bayesian Non-Parametric Feature construction for Inverse Reinforcement Learning by using non-linear combinations of intermediate data to improve performance. The algorithm is observed to be specifically suitable for a linearly solvable non-deterministic Markov Decision Processes in which multiple rewards are sparsely scattered in state space. Performance of the algorithm is shown to be limited by parameters used, implying adjustable capability. A conclusive performance hierarchy between evaluated algorithms is constructed.</p>
    <p>Committee: Drs. Tim Oates, Cynthia Matuszek and Tim Finin</p></div>
]]>
</Body>
<Summary>M.S. Thesis Defense   Neuroevolution-Based Inverse Reinforcement Learning   Karan K. Budhraja   9:00am Wednesday, 2 December 2015, ITE 346   Motivated by such learning in nature, the problem of...</Summary>
<Website>https://www.csee.umbc.edu/2015/12/ms-defense-budhraja-neuroevolution-based-inverse-reinforcement-learning/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/57869/guest@my.umbc.edu/269e31dee805d8a289f6c3baf616c114/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 01 Dec 2015 23:06:25 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="56339" important="true" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56339">
<Title>IS Security Research Opportunity - Earn $10 for 1 hour</Title>
<Tagline>Participate in IS security research and earn $10</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>The
    Human
     Centered Computing program of the Information Systems Department at 
    UMBC is running a study investigating the usability
    of traditional and non-traditional authentication mechanisms. We are 
    looking for participants for this study with IT security experience, especially 
    research or professional. Your
    participation will be a key contribution to the success of the research
    project.</span><p><span> </span></p><p><span>The
    study (</span><span>IRB Protocol: Y15RK12082) will take approximately one hour. You will be interviewed about your
    opinions and experiences with common authentication methods and mobile
    technology security issues. <br></span></p><p><span> </span></p><p><span>All
    participants must be aged over 18, and use a mobile device (e.g. smartphone).</span></p><p><span> </span></p><p><span>If
    you are interested and meet the requirements, please contact the researcher (<a href="mailto:flynn.wolf@umbc.edu" rel="nofollow external" class="bo">flynn.wolf@umbc.edu</a>).
    Your participation is very important for our research and will be highly
    appreciated.</span></p></div>
]]>
</Body>
<Summary>The Human  Centered Computing program of the Information Systems Department at  UMBC is running a study investigating the usability of traditional and non-traditional authentication mechanisms. We...</Summary>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56339/guest@my.umbc.edu/3e3bf03a370a88d555244e37c3d32bc0/api/pixel</TrackingUrl>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>Information Systems Security Association, UMBC Chapter</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/xxlarge.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/xlarge.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/large.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/medium.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/small.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/xsmall.jpg?1448918250</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-my.umbc.edu/system/shared/thumbnails/news/000/056/339/e5ee16ec09671af24141c35df4fb9991/xxsmall.jpg?1448918250</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 30 Nov 2015 16:18:09 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="56277" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56277">
<Title>PhD defense: R. Holder, Plan Adaptation Through Offline Analysis of Potential Plan Disruptors</Title>
<Body>
<![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/traffic-data-for-route-planning-1-624x320.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Rapid Plan Adaptation Through Offline<br>
    Analysis of Potential Plan Disruptors</h1>
    <h2>Robert H. Holder, III</h2>
    <h3>9:00am Wednesday, 9 December 2015, ITE 325b</h3>
    <p>Computing solutions to intractable planning problems is particularly problematic in dynamic, real-time domains. For example, visitation planning problems, such as a delivery truck that must deliver packages to various locations, can be mapped to a Traveling Salesman Problem (TSP). The TSP is an NP-complete problem, requiring planners to use heuristics to find solutions to any significantly large problem instance, and can require a lengthy amount of time. Planners that solve the dynamic variant, the Dynamic Traveling Salesman Problem (DTSP), calculate an efficient route to visit a set of potentially changing locations. When a new location becomes known, DTSP planners typically use heuristics to add the new locations to the previously computed route. Depending on the placement and quantity of these new locations, the efficiency of this adapted, approximated solution can vary significantly. Solving a DTSP in real time thus requires choosing between a TSP planner, which produces a relatively good but slowly generated solution, and a DTSP planner, which produces a less optimal solution relatively quickly.</p>
    <p>Instead of quickly generating approximate solutions or slowly generating better solutions at runtime, this dissertation introduces an alternate approach of precomputing a library of high-quality solutions prior to runtime. One could imagine a library containing a high-quality solution for every potential problem instance consisting of potential new locations, but this approach obviously does not scale with increasing problem complexity. Because complex domains preclude creating a comprehensive library, I instead choose a subset of all possible plans to include. Strategic plan selection will ensure that the library contains appropriate plans for future scenarios.</p>
    <p><em>Committee:</em> Drs. Marie desJardins (co-chair), Tim Finin (co-chair), Tim Oates, Donald Miner, R. Scott Cost</p></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Rapid Plan Adaptation Through Offline  Analysis of Potential Plan Disruptors...</Summary>
<Website>http://www.csee.umbc.edu/2015/11/plan-adaptation-offline-analysis-potential-disruptors/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56277/guest@my.umbc.edu/4fd4717b172771ae8e0d04aa620dc0d9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 28 Nov 2015 18:52:10 -0500</PostedAt>
<EditAt>Sat, 28 Nov 2015 18:52:10 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="57870" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/57870">
<Title>PhD defense: R. Holder, Plan Adaptation Through Offline Analysis of Potential Plan Disruptors</Title>
<Body>
<![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/traffic-data-for-route-planning-1-624x320.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h3>
    <h3>Ph.D. Dissertation Defense<br>
    Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Rapid Plan Adaptation Through Offline<br>
    Analysis of Potential Plan Disruptors</h1>
    <h2>Robert H. Holder, III</h2>
    <h3>9:00am Wednesday, 9 December 2015, ITE 325b</h3>
    <p>Computing solutions to intractable planning problems is particularly problematic in dynamic, real-time domains. For example, visitation planning problems, such as a delivery truck that must deliver packages to various locations, can be mapped to a Traveling Salesman Problem (TSP). The TSP is an NP-complete problem, requiring planners to use heuristics to find solutions to any significantly large problem instance, and can require a lengthy amount of time. Planners that solve the dynamic variant, the Dynamic Traveling Salesman Problem (DTSP), calculate an efficient route to visit a set of potentially changing locations. When a new location becomes known, DTSP planners typically use heuristics to add the new locations to the previously computed route. Depending on the placement and quantity of these new locations, the efficiency of this adapted, approximated solution can vary significantly. Solving a DTSP in real time thus requires choosing between a TSP planner, which produces a relatively good but slowly generated solution, and a DTSP planner, which produces a less optimal solution relatively quickly.</p>
    <p>Instead of quickly generating approximate solutions or slowly generating better solutions at runtime, this dissertation introduces an alternate approach of precomputing a library of high-quality solutions prior to runtime. One could imagine a library containing a high-quality solution for every potential problem instance consisting of potential new locations, but this approach obviously does not scale with increasing problem complexity. Because complex domains preclude creating a comprehensive library, I instead choose a subset of all possible plans to include. Strategic plan selection will ensure that the library contains appropriate plans for future scenarios.</p>
    <p><em>Committee:</em> Drs. Marie desJardins (co-chair), Tim Finin (co-chair), Tim Oates, Donald Miner, R. Scott Cost</p></div>
]]>
</Body>
<Summary>Ph.D. Dissertation Defense  Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Rapid Plan Adaptation Through Offline  Analysis of Potential Plan Disruptors...</Summary>
<Website>https://www.csee.umbc.edu/2015/11/plan-adaptation-offline-analysis-potential-disruptors/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/57870/guest@my.umbc.edu/efea1aaee8e5fba664fa2e37f71296a9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>defense</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 28 Nov 2015 18:52:10 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="56230" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56230">
<Title>New spring course: Principles of Human-Robot Interaction</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/robotcourse700.jpg" alt="Principles of Human-Robot Interaction" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>CSEE professor <a href="http://www.csee.umbc.edu/~cmat/" rel="nofollow external" class="bo">Cynthia Matuszek</a> will teach a new special topics course this spring on Principles of Human-Robot Interaction. The graduate level course (CMSC 691-08) will meet on Tuesday and Thursdays from 4:00 to 5:30pm in 013 Sherman Hall.</p>
    <hr>
    <p>  </p>
    <h1>Principles of Human-Robot Interaction</h1>
    <h3>An introduction to robots in our daily lives</h3>
    <h4>CMSC691-08, 4:00-5:15pm Tue/Thr, starting 26 January 2016, UMBC</h4>
    <p>Robots are becoming ubiquitous. From Roombas in our homes, to surgical robots in hospitals, to giant manipulators that assemble cars, robots are everywhere. In the past, robots have only ever interacted with highly trained experts. Now, as they are being deployed more widely, we must address new questions about how our robots can interact day-to-day with end users — non-experts — safely, usefully, and pleasantly. This new area of research is called Human-Robot Interaction, or HRI.</p>
    <p>This 3-credit special topics course aims to introduce students to current research in HRI and provide hands-on experience with HRI research. Students will explore the diverse range of research topics in this area, learn to identify HRI problems in their own research, and carry out a collaborative project involving human-robot interactions. Topics to be covered include:</p>
    <ul>
    <li>Social robots: how can robots be social beings? When do we want them to?</li>
    <li>Human-robot collaboration: humans and robots working together on tasks</li>
    <li>Natural-language interactions with robots and human-robot dialog</li>
    <li>Telerobotics: the uses of remote presence and teleoperation</li>
    <li>Expressive robots: how can robots express emotion – and should they?</li>
    </ul>
    <p>Students may benefit from having some previous coursework or experience in AI, machine learning, or robotics, but none are necessary. Undergraduate students can enroll with the instructor’s permission. For more information, contact Dr. Matuszek at <em>cmat at umbc.edu</em>.</p></div>
]]>
</Body>
<Summary>CSEE professor Cynthia Matuszek will teach a new special topics course this spring on Principles of Human-Robot Interaction. The graduate level course (CMSC 691-08) will meet on Tuesday and...</Summary>
<Website>http://www.csee.umbc.edu/2015/11/new-spring-course-principles-of-human-robot-interaction/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56230/guest@my.umbc.edu/94b0578024b2d65cd8f50ca6b42c9f27/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>robotics</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 24 Nov 2015 14:23:17 -0500</PostedAt>
<EditAt>Tue, 24 Nov 2015 14:23:17 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="57871" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/57871">
<Title>New spring course: Principles of Human-Robot Interaction</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/robotcourse700.jpg" alt="Principles of Human-Robot Interaction" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>CSEE professor <a href="http://www.csee.umbc.edu/~cmat/" rel="nofollow external" class="bo">Cynthia Matuszek</a> will teach a new special topics course this spring on Principles of Human-Robot Interaction. The graduate level course (CMSC 691-08) will meet on Tuesday and Thursdays from 4:00 to 5:30pm in 013 Sherman Hall.</p>
    <hr>
    <p>  </p>
    <h1>Principles of Human-Robot Interaction</h1>
    <h3>An introduction to robots in our daily lives</h3>
    <h4>CMSC691-08, 4:00-5:15pm Tue/Thr, starting 26 January 2016, UMBC</h4>
    <p>Robots are becoming ubiquitous. From Roombas in our homes, to surgical robots in hospitals, to giant manipulators that assemble cars, robots are everywhere. In the past, robots have only ever interacted with highly trained experts. Now, as they are being deployed more widely, we must address new questions about how our robots can interact day-to-day with end users — non-experts — safely, usefully, and pleasantly. This new area of research is called Human-Robot Interaction, or HRI.</p>
    <p>This 3-credit special topics course aims to introduce students to current research in HRI and provide hands-on experience with HRI research. Students will explore the diverse range of research topics in this area, learn to identify HRI problems in their own research, and carry out a collaborative project involving human-robot interactions. Topics to be covered include:</p>
    <ul>
    <li>Social robots: how can robots be social beings? When do we want them to?</li>
    <li>Human-robot collaboration: humans and robots working together on tasks</li>
    <li>Natural-language interactions with robots and human-robot dialog</li>
    <li>Telerobotics: the uses of remote presence and teleoperation</li>
    <li>Expressive robots: how can robots express emotion – and should they?</li>
    </ul>
    <p>Students may benefit from having some previous coursework or experience in AI, machine learning, or robotics, but none are necessary. Undergraduate students can enroll with the instructor’s permission. For more information, contact Dr. Matuszek at <em>cmat at umbc.edu</em>.</p></div>
]]>
</Body>
<Summary>CSEE professor Cynthia Matuszek will teach a new special topics course this spring on Principles of Human-Robot Interaction. The graduate level course (CMSC 691-08) will meet on Tuesday and...</Summary>
<Website>https://www.csee.umbc.edu/2015/11/new-spring-course-principles-of-human-robot-interaction/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/57871/guest@my.umbc.edu/eba2288b016419603bb92820c069bacb/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>robotics</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 24 Nov 2015 14:23:17 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="56224" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56224">
<Title>User Generated Passwords 3&#215;3 vs 4&#215;4 Grid Sizes for Android</Title>
<Tagline>Is Bigger Better?</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h2>Is Bigger Better? Comparing User Generated Passwords on<br>3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock</h2><h2>Adam Aviv, USNA</h2><h3>1:00-2:00pm Tuesday, 1 December 2015, ITE 459</h3><p>Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3×3 grid. Prior studies have shown that human-generated patterns are far less complex than one would desire; large portions can be trivially guessed with sufficient training. Custom modifications to Android, such as CyanogenMod, offer ways to increase the grid size beyond 3×3, and in this paper we ask the question: Does increasing the grid size increase the security of human-generated patterns?</p><p>To answer this question, we conducted two large studies, one in-lab and one online, collecting 934 total 3×3 patterns and 504 4×4 patterns. Analysis shows that for both 3×3 and 4×4 patterns, there is a high incidence of repeated patterns and symmetric pairs (patterns that derive from others based on a sequence of flips and rotations). Further, many of the 4×4 patterns are similar versions of 3×3 patterns distributed over the larger grid space. Leveraging this information, we developed the most advanced guessing algorithm in this space, and we find that guessing the first 20% (0.2) of patterns for both 3×3 and 4×4 can be done as efficiently as guessing a random 2-digit PIN. Guessing larger portions of 4×4 patterns (0.5), however, requires 2-bits more entropy than guessing the same ratio of 3×3 patterns, but the entropy is still on the order of cracking random 3-digit PINs. These results suggest that while there may be some benefit to expanding the grid size to 4×4, the majority of patterns will remain trivially guessable and insecure against broad guessing attacks.</p><p><a href="http://www.usna.edu/Users/cs/aviv/" rel="nofollow external" class="bo">Adam J. Aviv</a><span> </span>is an Assistant Professor of Computer Science at the United States Naval Academy, receiving his Ph.D. from the University of Pennsylvania under the advisement of Jonathan Smith and Matt Blaze. He has varied research interests including in system and network security, applied cryptography, smartphone security, and more recently in the area of usable security with a focus on mobile devices.</p></div>
]]>
</Body>
<Summary>Is Bigger Better? Comparing User Generated Passwords on 3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock  Adam Aviv, USNA  1:00-2:00pm Tuesday, 1 December 2015, ITE 459  Android’s graphical...</Summary>
<Website>http://www.csee.umbc.edu/2015/11/talk-user-generated-passwords-on-3x3-vs-4x4-grid-sizes-for-android/?utm_campaign=19942&amp;utm_medium=twitter&amp;utm_source=twitter</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56224/guest@my.umbc.edu/98494a41dd216ba5de1761cf72be87d6/api/pixel</TrackingUrl>
<Tag>android</Tag>
<Tag>infosec</Tag>
<Tag>passwords</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="issa">Information Systems Security Association, UMBC Chapter</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/issa</GroupUrl>
<AvatarUrl>https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="original">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/original.jpg?1772925484</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xlarge.png?1772925484</AvatarUrl>
<AvatarUrl size="large">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/large.png?1772925484</AvatarUrl>
<AvatarUrl size="medium">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/medium.png?1772925484</AvatarUrl>
<AvatarUrl size="small">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/small.png?1772925484</AvatarUrl>
<AvatarUrl size="xsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xsmall.png?1772925484</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/514/0bdfb1231eca53e69ca24c2de2eb6912/xxsmall.png?1772925484</AvatarUrl>
<Sponsor>IS Dept</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 24 Nov 2015 11:40:53 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="56219" important="false" status="posted" url="https://my3.my.umbc.edu/groups/ieee/posts/56219">
<Title>talk: User Generated Passwords on 3&#215;3 vs. 4&#215;4 Grid Sizes for Android</Title>
<Body>
<![CDATA[
    <div class="html-content"><h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2015/11/wpid-android-unlock-pattern1.jpg" alt="wpid-android-unlock-pattern" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>UMBC Department of Information Systems</h3>
    <h2>Is Bigger Better? Comparing User Generated Passwords on<br>
    3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock</h2>
    <h2>Adam Aviv, USNA</h2>
    <h3>1:00-2:00pm Tuesday, 1 December 2015, ITE 459</h3>
    <p>Android’s graphical authentication mechanism requires users to unlock their devices by “drawing” a pattern that connects a sequence of contact points arranged in a 3×3 grid. Prior studies have shown that human-generated patterns are far less complex than one would desire; large portions can be trivially guessed with sufficient training. Custom modifications to Android, such as CyanogenMod, offer ways to increase the grid size beyond 3×3, and in this paper we ask the question: Does increasing the grid size increase the security of human-generated patterns?</p>
    <p>To answer this question, we conducted two large studies, one in-lab and one online, collecting 934 total 3×3 patterns and 504 4×4 patterns. Analysis shows that for both 3×3 and 4×4 patterns, there is a high incidence of repeated patterns and symmetric pairs (patterns that derive from others based on a sequence of flips and rotations). Further, many of the 4×4 patterns are similar versions of 3×3 patterns distributed over the larger grid space. Leveraging this information, we developed the most advanced guessing algorithm in this space, and we find that guessing the first 20% (0.2) of patterns for both 3×3 and 4×4 can be done as efficiently as guessing a random 2-digit PIN. Guessing larger portions of 4×4 patterns (0.5), however, requires 2-bits more entropy than guessing the same ratio of 3×3 patterns, but the entropy is still on the order of cracking random 3-digit PINs. These results suggest that while there may be some benefit to expanding the grid size to 4×4, the majority of patterns will remain trivially guessable and insecure against broad guessing attacks.</p>
    <p><a href="http://www.usna.edu/Users/cs/aviv/" rel="nofollow external" class="bo">Adam J. Aviv</a> is an Assistant Professor of Computer Science at the United States Naval Academy, receiving his Ph.D. from the University of Pennsylvania under the advisement of Jonathan Smith and Matt Blaze. He has varied research interests including in system and network security, applied cryptography, smartphone security, and more recently in the area of usable security with a focus on mobile devices.</p></div>
]]>
</Body>
<Summary>UMBC Department of Information Systems   Is Bigger Better? Comparing User Generated Passwords on  3×3 vs. 4×4 Grid Sizes for Android’s Pattern Unlock   Adam Aviv, USNA   1:00-2:00pm Tuesday, 1...</Summary>
<Website>http://www.csee.umbc.edu/2015/11/talk-user-generated-passwords-on-3x3-vs-4x4-grid-sizes-for-android/</Website>
<TrackingUrl>https://my3.my.umbc.edu/api/v0/pixel/news/56219/guest@my.umbc.edu/b4e0e6ef67f6dff8f8b0de8a148e98e2/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://my3.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 24 Nov 2015 09:10:40 -0500</PostedAt>
<EditAt>Tue, 24 Nov 2015 09:10:40 -0500</EditAt>
</NewsItem>

</News>
