You are here


Title: The Emergence of Edge Computing with Live Video Analytics



Cameras are everywhere - cities worldwide have deployed millions of cameras for traffic planning and security; industries ranging from manufacturing to healthcare to IT depend on them for their day to day operations; police officers wear them; self-driving cars rely on them and scientist use them for monitoring, learning, and detecting anomalies.

These cameras record images 24x7x365, mostly storing them for analysis at a later time. The time lag between capturing and analysis is a limitation of the current technology and cost. I believe real-time video analytics of live and stored streams is compelling for many important reasons. Unfortunately, existing state-of-the-art video analytics systems are expensive, insufficient, and they often require manual intervention. Large-scale automated video analytics is a grand challenge for those of us who work on big-data cloud-scale systems. Privacy regulations, bandwidth constraints and latency naturally lead us to design and develop systems where video is analyzed across intelligent edge and cloud clusters.

In this talk, I will describe our hybrid edge-cloud video analytics system called Rocket. I will present a case study of a smart-city traffic system that we are deploying and discuss how we are moving forward aggressively towards the commoditization and democratization of video analytics.


Victor Bahl is a Distinguished Scientist and the Director of Mobility & Networking research in Microsoft. He serves on the senior leadership team that oversees Microsoft Research's world-wide operations and strategy. HE also serves on the Redmond lab leadership team managing over 200 researchers. He advises Microsoft's CEO and his leadership team on long-term vision and strategy related to networked systems, mobile computing, wireless systems, cloud computing, and datacenter networking. He heads a high-powered group that executes on this vision through research, technology transfers to product groups, industry partnerships, and associated policy engagement with governments and research institutes around the world. Dr. Bahl has published over 125 papers, has been granted over 140 patents, and delivered over 40 keynotes. He has received several technical and leadership awards including the IEEE Koji Kobayashi Computers and Communications Award, ACM SIGMOBILE Lifetime Outstanding Contributions Award, two United States FCC awards, a test-of-time award, three best paper awards, a distinguished service award, a distinguished alumni award (from University of Massachusetts), and a IEEE outstanding leadership award. Under his direction, his group has had game changing impact on Microsoft's cloud computing infrastructures both in the datacenter and in wide-area networking. Dr. Bahl is the founder of ACM SIGMOBILE, ACM MobiSys, ACM GetMobile and several other important conferences. With his wife, he co-founded Computing For All, a non-profit dedicated to increasing and enhancing computer science education for students of all ages and from all backgrounds. Dr. Bahl is a Fellow of the ACM, IEEE, and AAAS.



Title: Security and Privacy Challenges in the Internet of Things



Internet of Things (IoT) is an emerging technology that has drawn a lot of attention in recent years. Things in IoT can take a wide variety of forms, from simple RFIDs attached to merchandises, smart thermostats installed in the classrooms, implantable medical devices on the patients, to video cameras on top of light poles, and automobiles with built-in sensors. The explosive deployment of IoTs has pushed the boundary of the cyber-world to be tightly intertwined with our physical world. The IoT enables the exchange of information in a variety of application scenarios, each having unique characteristics and requiring unique performance guarantees, and together they bring potentially tremendous benefits to us- home automation, environmental monitoring, health and lifestyle, smart cities, just to name a few.

Some significant risks go along with the potential benefits of the IoT. As we add devices to our cloths, bodies, homes, and environments, more personal information will be collected. Some information is deeply sensitive. As devices are more closely connected with our physical world and some are capable of taking actions, data security and device security become critically important. Last year, IoT devices have also been exploited to launch the largest DDoS attack in history to disrupt the Internet services.

A secure and trustworthy IoT is not an easy task. It demands multiple lines of defense from different layers to thwart attacks from both the physical world and cyberspace. It also requires the integration of security and privacy mechanisms into computing and networking functions. In this talk, I will introduce the network architecture and unique characteristics of IoT systems. I will then focus on unique security and privacy challenges in the IoT. Many of the security and privacy problems are very challenging and call for interdisciplinary expertise from a number of technical domains.


Wenjing Lou is a Professor of Computer Science at Virginia Tech and a Fellow of the IEEE. She holds a Ph.D. in Electrical and Computer Engineering from the University of Florida. Her research interests cover many topics in the cybersecurity field, with her current research interest focusing on privacy protection techniques in networked information systems and cross-layer security enhancement in wireless networks.

Prof. Lou is currently on the editorial boards of ACM/IEEE Transactions on Networking, IEEE Transactions on Mobile Computing, and Journal of Computer Security. She is the Steering Committee Chair of IEEE Conference on Communications and Network Security (IEEE CNS), which is a conference series in IEEE Communications Society (ComSoc) core conference portfolio and the only ComSoc conference focusing solely on cybersecurity.

Prof. Lou served as a program director at the US National Science Foundation (NSF) from August 2014 to August 2017. At NSF, her responsibilities included the Networking Technology and Systems (NeTS) program, a core program of the Computer and Network Systems (CNS) division within the Directorate for Computer & Information Science & Engineering (CISE), and the Secure and Trustworthy Cyberspace (SaTC) program, a cross-cutting security program led by CISE/CNS.