Seminars & Workshops


Dr. Rose Shumba

Spring 2024

Facinating Realm of Quantum Computing 

April 12th, 2024 : 1:30 - 5:15 PM

Dr. Weiwen Jiang joined Mason in 2021. Prior to this, he was a post-doctoral research associate at the University of Notre Dame. He received his PhD from Chongqing University in 2019. From 2017 to 2019, he conducted research at the University of Pittsburgh and was co-advised by the professor there for his PhD thesis. He works on hardware and software co-design; in particular, the co-design of neural networks and different hardware accelerators, including mobile devices, FPGA, and ASIC. His recent work brings the co-design philosophy to quantum computing and demonstrates that quantum advantage can be achieved for the neural network for the first time.

Jiang’s research works have been published in prestigious journals and conferences, including Nature Electronics, Nature Communications, IEEE/ACM Transactions, DAC, ICCAD, and ESWEEK. He is the recipient of the Best Paper Award in ICCD’17 and Best Paper Nominations in DAC'19, CODES+ISSS'19, ASP-DAC'16, and ASP-DAC'20. In addition, he works closely not only with academic societies (such as Notre Dame, UPITT, Northeastern, Rice, and UConn) but also with industries (such as IBM, Xilinx, Facebook, and Edgecortix). 

This workshop will be held in person. In the CS building conference room [room #210].

See Yourself in Federal Cyber: Unlocking the Federal Hiring Process to Get you Hired! 

Febuaray 23rd, 2024 : 10am

Ms. Nikkia Henderson is a 14 year tenured federal government employee. I In her current role she is a Senior Advisor at the Cybersecurity Infrastructure Security Agency (CISA). She serves a Cyber Supply Chain Risk Management (C-SCRM) Strategy and Governance Program lead, within CISA’s Cybersecurity Division. Previously, Ms. Henderson was a National Account Manager and Supply Chain Risk Manager Champion at the General Services Administration where she advised Federal, State, Local, Tribal and Territorial stakeholders increased the awareness of cybersecurity within procurement and acquisitions.

Nikkia is a charismatic, energetic, public speaker and DEIA advocate. She is always volunteering to help and excels in art of connecting humans to humans. She holds a Bachelor’s Degree in Business Administration/Finance from Strayer University, and a Master’s Degree in Cyber Policy from University of Maryland Global College. Nikkia Henderson is also the President of the Women in Cybersecurity Mid Atlantic Affiliate, where she serves as a "cybHERprenuer" who is passionate about helping cybersecurity professionals define their vision, mission, and federal career path.

She welcomes connections via LinkedIn:

Zoom details: Meeting ID: 873 5660 1175     Passcode: 354065

Join Meeting

Exploring Vulnerabilities and Consequences of Apple's Find My Protocol

Febuaray 23rd, 2024 : 2pm - 4pm

In 2020, Apple rolled out its Find My system, a decentralized protocol that allows devices without an internet connection to crowdsource their location and report it back to their owner. Initially piloted on iPhones, it now allows any Apple device (Airtags, iPads, Macbooks, Airpods, etc.) to be located quickly and efficiently using only Bluetooth messaging. Building on previous technology from competitors like Tile, the Find My protocol has a lost device broadcast a Bluetooth Low-Energy (BLE) advertisement message that can be picked up by nearby internet-connected Apple devices and relayed back to the owner via Apple's servers, all without any interaction from these devices' owners. Unlike Tile, Apple's Find My protocol includes novel end-to-end encryption of location data which guarantees that Apple themselves does not know where the lost devices are or who they belong to. By reverse engineering this protocol, we have identified several vulnerabilities in the Find My protocol. Primarily, we are able to create our own devices that can participate in the Find My network and be freely tracked using the hundreds of millions of internet-connected Apple devices around the world. Unlike Apple's Airtags, which only report their most recent location in the app, with our custom devices we can retrieve each individual location report giving us access to fine-grained location data over days or weeks. Our devices are also immune to Apple's "product safety alerts," a feature that was added to iOS to warn users when an Airtag is being used to surreptitiously track them. This leads to a low-cost, extremely effective stealth tracking device around the size of a quarter, that provides detailed location data in nearly any environment for up to a year on a single battery. In addition, we have been able to use our devices to explore the capabilities and weaknesses of the Find My network. We have identified several additional flaws in the implementation of the Find My software that can allow an attacker to clone a device, block a device from reporting its location, or even inject false location data to mislead the owner.

Team meeting details: Meeting ID: 242 992 346 26  Passcode: : kr5hEy

Security Overview & Background Investigations

Febuaray 23rd, 2024 : 3pm

NSA’s Security Office will go over the NSA security process/timeline and the Top Secrete Security Clearance process. 

Team meeting details: Meeting ID: 242 992 346 26  Passcode: : kr5hEy

Academic Accountability:  Holding Yourself and Academia Accountable

Febuaray 16th, 2024 : 12pm - 2pm

Donnetta “Dee-Dee” Padmore is a current Doctoral Student at Bowie State University.  She also obtained her Bachelor of Science degree with a concentration in Bioinformatics at BSU.  Before her current career, she was a Hospital Corpsman 2nd Class in the United States Navy, with nine years of service.  She now has over 7 years in the access control industry, working with JSON, SQL, and RESTful APIs. She works for the private organization Datawatch Systems, Inc. as a Senior Business Development Analysis, where she helps launch internal organizational mobile apps, partners with 3rd party app vendors to help launch their access control/tenant experience apps, as well as review, test, and document APIs.  Currently she is working on an Apple Wallet integration in conjunction with Mindgrub, HID, and Apple, which will allow for a mobile credential to be pushed to the Wallet, and used on HID readers for access control.

Zoom details: Meeting ID: 819 6085 0151  Passcode: 692845

Building Your Business with the Business Model Canvas

Febuaray 9th, 2024 : 10am - 12pm

Tyrome ‘Ty’ Smith,  has over 25 years of consulting and leading executives and their teams by helping them understand human and organizational dynamics. Currently, he is the Director of Strategic Partnerships for the Common Mission Project, whose mission is to create an international network of entrepreneurs driven to solve the critical challenges of our time. Before that, he was a senior consultant to the Department of Defense (DoD).  As a trusted advisor and coach to senior leaders and teams, he has conducted many senior-level engagements with the expressed intention of eliciting a strategic focus on revolutionizing how value is both conceptualized and executed. As part of his work, He developed an innovative education program for the DoD; including coaching and mentoring product development teams engaged in an internal incubator. In addition, has been providing support to several organizations either as faculty or entrepreneur-in-residence. They include the University of Maryland Innovation Extension Program., StreetCode Academy, and Digital Undivided - the last two are dedicated to supporting founders of Color. He is a much sought-after workshop presenter for topics ranging from unconscious bias to business model innovation. 

Zoom details: Meeting ID: 860 6945 8581     Passcode: 901305

Fall 2023

Transformative Innovations in IBM HPC Design

Friday, December 15th, 2023 : 10am - 12pm

Dr. Appolo Tankeh will talk about  IBM HPC(High Performance Computing),  and reflect on some of the innovations in  the design and development. The IBM HPC team came out with  a radically new approach to problems of  optimizing the performance of HPC  systems. These  new features were implemented in the  Software[Linux] and hardware layers that improve the  system performance of IBM HPC drastically.

These methods were used in many generation of Super Computers, including  ASCI Purple  and Blue_Gene.  He will  give an overview of the Architecture, and the impact it has on: MPI performance, IBM Competitiveness in the server business, Open source movement, Cloud computing, AI, etc.

Information on Dr. Appolo Tankeh:

Dr. Appolo Tankeh is a Professor in the Computer Science department at the Bowie State University. He has previous experience as a university lecturer and adjunct professor at universities in London, State of New York and Martyland. He held a number of US patents in HPC (High Performance Computing).  His current research areas are blockchain, Web3 programming, Docker/Container based systems, Cloud computing, High Performance Computing, message passing, File systems, operating systems and networks. This also include topics in concurrency, databases, computer/processor architecture, distributed systems, programming languages, compilers, Browsers, algorithms, AI, Dynamical systems, Markov Chains, Quantum Computing, Statistics and Probability theory.

This workshop will be held via zoom.

Zoom Details:

Meeting ID: 845 7374 7237

Passcode: 321112

Machine Learning in business: building a recommendation engine

Friday, November 10th, 2023 : 10am - 12pm

Dr. Kashif is a physicist by training. He did his undergraduate studies in Yale University, his PhD in Harvard University, and was subsequently a postdoctoral fellow at the European Center for Nuclear Research (CERN). As a member of the ATLAS collaboration in CERN, he contributed to the search and discovery of the Higgs boson, which resulted in the Nobel Prize for Physics in 2013. Dr. Kashif currently heads the Machine Learning (ML) function in Cvent, innovating applications of ML and AI in the events space.

This workshop was held via zoom.

Web Security Threat

Friday, October 20th, 2023 : 10am - 12pm

Dr. Kun Sun is a Professor in the Department of Information Sciences and Technology at George Mason University. He is also the Associate Director of the Center for Secure Information Systems (CSIS) and the Director of Sun Security Laboratory. He received his Ph.D. in Computer Science from North Carolina State University. His research focuses on systems and network security. Dr. Sun has more than 15 years working experience in both industry and academia, publishing over 130 conference and journal papers, and two papers won the Best Paper Award. His current research focuses on software security, network security, trustworthy computing, moving target defense, AI security, and cloud security. He won the Presidential Award for Faculty Excellence in Research from George Mason University in 2022.

This workshop was held via zoom.

Cross-domain Sensing & Modeling for Smart Environments

Friday, October 6th, 2023 : 10am - 12pm

Avijoy Chakma is an incoming Assistant Professor in the Computer Science department at Bowie State University. He completed his Ph.D. in Information Systems from the University of Maryland, Baltimore County, in July 2023. He received a Bachelor of Science degree in Computer Science and Engineering from the Bangladesh University of Engineering and Technology in 2013 and a Master of Science degree in Computer Science from Lamar University, Texas, in 2018. Before his graduate study, he had 2.5 years of experience working in the software industry. He has published multiple peerreviewed journals and conference papers, and he is the recipient of the Best Paper Award at the IEEE/ACM CHASE Conference 2022. During his Ph.D., he actively supervised multiple Summer Research Experience for Undergraduates (REU) students. His research interests are cyber-physical systems, smart health, and machine learning

This workshop was held via zoom.

Preparing to be an Effective Computer Science Researcher

Friday, September 22nd, 2023 : 10am - 12pm

Josiah Dykstra is a seasoned cybersecurity practitioner, researcher, author, and speaker. He is a senior leader at the National Security Agency (NSA) and the owner of Designer Security, LLC. Dr. Dykstra holds a Ph.D. in computer science and previously served as a cyber operator and researcher. He is interested in cybersecurity science, especially where humans intersect with technology. He has studied stress in hacking, action bias in incident response, and the economics of knowing when sharing threat intelligence is more work than it is worth. Dr. Dykstra is a frequent author and speaker, including Black Hat and RSA Conference. He received the CyberCorps® Scholarship for Service (SFS) fellowship and is one of six people in the SFS Hall of Fame. In 2017, he received the Presidential Early Career Award for Scientists and Engineers (PECASE) from then President Barack Obama. Dr. Dykstra is a Fellow of the American Academy of Forensic Sciences and a Distinguished Member of the Association for Computing Machinery (ACM). He is the author of numerous research papers and an author on two books, Essential Cybersecurity Science (O’Reilly Media, 2016) and Cybersecurity Myths and Misconceptions (Pearson, 2023).

This workshop was held via zoom.

Artificial Intelligence explainability and applications.

Friday, Septemebr 8th, 2023 : 10am - 12pm

Dr. Md Kamruzzaman "Zaman" Sarker has previous experience as an assistant professor at the University of Hartford. Before joining the University of Hartford, he was a postdoctoral fellow at Kansas State University. He earned his M.Sc. in Computer Science from Wright State University and Ph.D. in Computer Science from Kansas State University. He also worked for several industries, including Intel, Accenture, and Samsung.  His research domain spans the broad field of artificial intelligence and its application. Some specific topics he is focusing on now include but are not limited to artificial intelligence, deep learning, trustworthy artificial intelligence, application of deep learning, cybersecurity enhancement using deep learning, and high-performance computing..

This workshop was held via zoom.


Spring 2023

The Science of Audio Deepfake Detection

Monday, April 3rd, 2023 1:00PM-2:00PM

Deepfakes are becoming a widely deployed technology for both fun and profit. Within this space, audio deepfakes are particularly interesting as they have the capacity to improve people’s lives, such as giving someone back their voice when they have lost the ability to speak.

What I Wish I Knew When I Started as a Data Scientist

Monday, April 3rd, 2023 9:00AM-12:00PM

Data Science has been billed "The Sexiest Job of the 21st Century" where the tools developed and used are leading to life changing technologies (both as a positive and in terms of some devastating unforeseen consequences). To learn more redirect here.

The Life Cycle of High-Performance Computing (HPC)

Thursday, March 2nd 2023 9:30am - 2:30pm

Dr. Marcel Fallet will introduce HPC from the standpoints of hardware, software, and architecture, and how all three topics intimately interact to form a definition of HPC consistent with NSA values. 

Multi-Media Manipulation (M3): Be Afraid...Be Very Afraid

Friday, February 17th, 2023 9:00AM - 12:00PM

This workshop will provide attendees introductory exposure to Multi-Media Manipulation (M3)—using media to exploit the difference between perception and reality. It will focus on M3 techniques and tradecraft, why these techniques are used, how they work and how to detect them.

Fall 2022

CAE Forum

The use of Steganography and Steganalysis Trends in Computer Forensics

Wednesday, November 2, 2022 1:00pm - 1:50pm

Presenter(s): Dinesh Reddy, Our Lady of the Lake University


Just log in as “Guest” and enter your name. No password required.


Vulnerabilities of Machine Learning Algorithms to Adversarial Attacks for Cyber-Physical Power

Wednesday, November 2, 2022 2:00pm - 2:50pm

Presenter(s): Tapadhir Das, University of Nevada, Reno


Just log in as “Guest” and enter your name. No password required.


The FBI's Role in the Cyber Threat Landscape

Friday, October 28th, 2022 9:00AM – 1:30PM

Join the Computer Science department as they bring FBI agent to Bowie State, DCPS, and Charles Flowers High Schoolers. Learn more about the FBI's role in the cyber threat landscape.


SOPSS Lab: Research Activities

October 14th, 2022 12:00PM – 1:00 PM

The lecture presents the preliminary introduction of the work at SOPSS Lab, directed by Dr. Vivek Shandilya.


Summer 2022

Bulldog 3C - Cyber, Code, and Create Summer Camp

June 27th - July 1st, 2022, 9am - 4pm

Learn the basics of cybersecurity, how to create Music, Videos, presentations using Apple's GarageBand, iMovie, and Video Editor, how to use Playground pre-coded blocks to create a program that animates a character on an object and gain the knowledge you need to create Apps for Mac, iPads, iPhones, Apple watch and other devices using Swift and Storyboard.


CompuGirls Summer Camp

June 27th - July 1st, 2022, 9am - 4pm

This program is designed to encourage and support individuals in becoming future leaders of cybersecurity and IT!! Click here to view event flier.


Goal Setting for Success at all Levels

Friday, 17th June, 2022, 12pm-1pm

A 30-minute version loaded with practical, immediately applicable takeaways

  • Seizing the Moment & Capitalizing on the Opportunities
  • Identifying the Goal (Goals vs. Acquisitions) : GPS your Future
  • Start where you are
  • Identify where you are going: This can be passing finals, gaining an internship, or getting that dream job, the formula  and the tools are the same. A + B = C. Always!
  • Map-Making 101

View Speaker's Bio

Bowie State University and IBM Skills Summer Academy Workshops

June 6th - July 6th, 2022, 5:15pm - 7:15pm(twice a week)

The Bowie State University Departments of Computer Science (CS) and Mathematics partnered with the IBM Skills Academy to provide professional development programs to career professionals, STEM teachers, students, community college faculty necessary to compete and excel in the next generation of jobs.


Spring 2022

Project REACH Cyber Workshop

Friday, May 20th, 2022, 6:00pm - 7:30pm

For grades 9 - 12, Community College, and undergraduate students.


Preparing to be an effective Computer Science researcher

Friday, May 6th, 2022

This workshop will provide an overview of the fundamentals of research methods applicable to the broad field of computer science, with special emphasis on cyber security. Topics introduced will include the language of research, research design, quantitative and qualitative forms of analysis, ethical issues in research, and appropriate documentation of research processes and outcomes. Participants will become critical evaluators of research, with emphasis placed on engaging the students in analytical reading of research literature in computer science and the application of skills in conducting primary research.


Possibilities Beyond Graduate School

Friday, April 22, 2022, 10:00am - 12:30pm

This interactive workshop will introduce the best practices for preparing graduate students for life after graduate school,strategies for establishing oneself as a thought leader and expert, practical portfolio building, relationship economics, innovative careers use-cases, and contextualizing global real-world applications and problems with an emphasis on emerging technologies.


Bias by Us – How Cognitive Psychology can make you better Data Scientists

Friday, April 29th, 2022, 10am - 2pm

Data scientists are trained to be the experts in scrutinizing all aspects of data, sources, and results but it is still rare to see data scientists putting that same level of scrutiny on themselves as data scientists and the choices/decisions made.


Fall 2021

Artificial Intelligence (AI) and Machine Learning (ML) For ALL

AI and Machine Learning are hot topics of today and will be essential for solving almost every problem in the future. Therefore, the US Congress has characterized AI/ML as a top priority in education and research. 


Summer 2021

Introduction to Research Methods in Computer Science

Friday, May 21 2021 - 9 am to 12 pm

This workshop will provide an overview of the fundamentals of research methods applicable to the broad field of computer science, with special emphasis on cyber security.

Spring 2021

Detecting Deepfakes 101

March 26, 2021 - 9am to 12pm

This workshop provides attendees with lightweight hands-on experience with Deepfake detection tools, also known as Generative Adversarial Networks (GANs). In the hands of the wrong person, GANs can be used for fraud and/or malicious influence. For instance, recently, a deepfaked voice was used to scam the CEO of a UK firm $244,000. GANs can generate images of people doing something out of character.


Machine Learning, Graphics, Vision, HCI, & AR/VR at Adobe Research

March 12, 2021 - 11 am to 2 pm

Adobe Research conducts academic and industrial research in many areas such as computer vision, graphics, machine learning, human-computer interaction, and virtual and augmented reality that is published in top conferences and integrated into products used by millions of customers. 


Cloud (AWS/Azure) and Apache Spark™ Workshop

February 26, 2021 - 9am to 12pm

  • Just Enough Python/Scala for Apache Spark™
  • Apache Spark™ Overview & Programming
  • Apache Spark™ Tuning and Best Practices            
  • Delta Lake
  • Apache Spark™ for Machine Learning and Data Science 
  • Hands on Deep Learning with Keras, TensorFlow, and Apache Spark™