Ben-Ami Lipetz Conference: New Trends in Informatics Research
(NTIR)

Where Innovation Meets Information
 

NTIR Logo 2026

NTIR is an informative conference held by the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany. 

The event features keynote speeches, panel discussions, paper talks, poster presentations and workshops that bring together researchers, practitioners and students from various fields of information studies. 

In this conference, you will have the opportunity to share and discuss your exciting research with fellow scholars and practitioners, learn about trending topics, and inspire influential ideas that will shape the future of information science.
 

  • NASA Project Scientist Dr. Jennifer Wei in front of an audience

    NASA Project Scientist Dr. Jennifer Wei delivers a keynote speech.

  • Doctoral student presents in front of a large video screen.

    An information science doctoral student presents a paper on government open data.

  • Group of information science doctoral students answering audience questions.

    Information science doctoral students from the AI Lab answer questions after a paper presentation.

  • Student talking about her project in front of a poster.

    An information science doctoral student presents her poster.

  • Two information science doctoral student in discussion.

    Two information science doctoral students enthusiastically discuss their research during the poster session.

  • An information science doctoral student explains his research to his classmate in front of a project poster..

    An information science doctoral student explains his research to his classmate during the poster session.

  • CEHC Professor Brandon Behlendorf delivering a lecture.

    CEHC Professor Brandon Behlendorf delivers a lecture in the grant writing workshop.

  • A participant snaps a picture of the presentation slide during a keynote speech.

    A participant snaps a picture of the presentation slide during a keynote speech.

  • Conference participants from multiple universities engaging in discussion.

    Conference participants from multiple universities engage in a lively panel discussion.

  • Conference participants enjoy networking over lunch.

    Conference participants enjoy networking over lunch.

Call for Proposals
General Requirements
General Requirements

An abstract with 250 to 500 words (250 words is recommended). Include authors’ names, preferred pronouns, titles and affiliations to appear in the proceedings.

Poster Requirements
Poster Requirements

Proposal: An abstract and a draft poster (48-inches by 36-inches horizontal) outlining the research questions, methodology, findings and implications. The draft poster is optional but preferred.

Presentation: Illustrate research and findings of completed research, works in progress, or class projects in detail. Presenters will receive binder clips, an easel and a cardboard backing to affix the posters.

Topics: Data science & analytics, human-computer interaction, information policy & ethics, information retrieval & organization, and knowledge management, etc.

Panel Talk Requirements
Panel Talk Requirements

Proposal: An abstract outlining the research questions, methodology, findings and implications.

Presentation: Research and findings of completed research, works in progress or class projects in detail with a 15-minute talk and 10-minute group discussion at the end of each session.

Topics: Combating misinformation & AI regulation / AI governance, conflict over semiconductors, quantum computing and utilization of augmented data, etc.

Workshop Requirements
Workshop Requirements

Proposal: An abstract describing the theme and necessary accommodations for the proposed workshop (e.g., space, materials, and time for preparation).

Presentation: 75 minutes of presenter-led hands-on activities.

Topics: 

  • Scholarly Skill-Building (Career Development, Academic Development, Research Development)
  • Technology Skill-Building (i.e. software development, penetration testing, OSINT, etc.)
  • Topical Skill-Building (Cybersecurity, Emergency Preparedness, Homeland Security, Game Development, Information Science, Data Analytics, etc.)

     

Important Dates

  • December 15, 2025 – Submission due date via ConfTool
  • February 2, 2026 – Online registration opens
  • February 6, 2026 – Notification of presenters
  • March 9, 2026 – Due date for scholarship and free parking permit application
  • March 13, 2026 – Notification of scholarship recipients
  • April 23, 2026 – NTIR Conference - Day 1 - Walk-in registration available at the venue
  • April 24, 2026 – NTIR Conference - Day 2 - Walk-in registration available at the venue
     

Registration and Scholarships

Registration fee: Free

Scholarships

  • Participants can apply for a scholarship by selecting the corresponding option once registration opens. Scholarship recipients will receive a confirmation email from [email protected].
  • Scholarship recipients can apply for a hotel room for the night of April 23, 2026, and up to $750 reimbursement for travel expenses.
     

Program

Timetable
Timetable

Download the Program Timetable.

 

Thursday, April 23, 2026

TimeActivityLocation
8 a.m.Light Breakfast and RegistrationETEC Atrium
9 a.m.Keynote Speech: AI as the New Interface of Quantum Computing, Dr. Ismael Faro (Vice President of AI Foundations Engineering, IBM Research, USA)ETEC 149/151
10 a.m.

Paper Presentations:

ETEC 203 — Talk Session 1: Emergency Preparedness

  • UAS‑Delivered versus Human‑Placed Training Aids: Impacts on Detection K9 Training and Performance
    Katherine Anne Baronowski (University at Albany, State University of New York, USA)
  • Climate Adjusted Social Vulnerability Index: A Hybrid Framework for Risk Assessment in NY, USA
    Prabin Sharma, DeeDee Bennett Gayle (University at Albany, State University of New York, USA)
  • Beyond the Alert - Analyzing University After-Care Communication in Swatting Incident Response
    Suzanne Sonpon (University at Albany, State University of New York, USA)
  • From Black Box to Insight: Explainable AI for Extreme Event Preparedness
    Kiana Vu, Ismet Selcuk Ozer, Phung Lai, Zheng Wu (University at Albany, State University of New York, USA), Thilanka Munashinghe (Rensselaer Polytechnic Institute, USA), Jennifer Wei (NASA, USA)

ETEC 303 — Talk Session 2: AI in Education and Careers

  • Let ChatGPT Help You Find a Job: Examining the Motivation Behind Job-Seekers’ Use of AI
    Siling Long (University at Albany, State University of New York, USA)
  • CourseForge: The Interactive Learning Management System to Detect and Visualize Course Bottlenecks
    Nabila Ayman, Md Nour Hossain (University at Albany, State University of New York, USA)
  • Design and Implementation of a Cyber Range for student training
    Benjamin Brandt, Ryan Clark, Nathaniel Pena, Erick Perez, Dominick Foti (Marist University, USA)
  • Organizational and Behavioral Dimensions of AI Adoption in the US Public Libraries
    Kaity Hsiu (University at Albany, State University of New York, USA)

ETEC 340 — Talk Session 3: Human-AI Interaction and Media

  • The Information World of Actual-Play TRPG: An Exploratory Thematic Analysis
    Angela Hackstadt (University at Albany, State University of New York, USA)
  • Make AI Make Sense: Military Organizational Sense-Making and Decision Support with Human Artificial Intelligence Teaming
    Olivia R. BenAoumeur, Kimberly A. Cornell (University at Albany, State University of New York, USA)
  • Does TikTok Usage Influence Users’ Attitudes toward China?
    Derick Chungcheh Ma (University at Albany, State University of New York, USA)
  • Do We Have Your Attention? Tracking Eye Movements and Assessing Viewer Preferences During Television Weather Warnings
    Caroline Rafizadeh, Michael Michaud, Heather Sheridan, Jeannette Sutton, Gregory Cox (University at Albany, State University of New York, USA)
ETEC 203, 303 & 340
11:15 a.m.BreakETEC Atrium
11:30 a.m.

Panel Discussions:

ETEC 203 — Hallucination in Generative AI

  • Panelists:
    • Dr. Nour Alhussien (Department ofCybersecurity, University at Albany, State University of New York, USA)
    • Dr. Alessandra Buccella (Department ofPhilosophy, University at Albany, State University of New York, USA)
    • Dr. M. Abdullah Canbaz (Department of Information Sciences and Technology, University at Albany, State University of New York, USA)
  • Moderator: Dr. Kimberly A. Cornell (Department of Information Sciences and Technology, University at Albany, State University of New York, USA)

ETEC 303 — Stakeholder Engagement in Emergency Management

  • Panelists: 
    • Dr. Jeannette Sutton (Department ofEmergency Management and Homeland Security, University at Albany, State University of New York, USA)
    • Dr. Matthew Crayne (Department ofManagement, University at Albany, State University of New York, USA)
    • Dr. Tricia Wachtendorf (Department of Sociology, University of Delaware. USA)
    • Dr. Elyse Zavar (Department of Emergency Management and Disaster Science, University of North Texas, USA)
  • Moderator: Dr. Samantha Penta (Department of Emergency Management and Homeland Security, University at Albany, State University of New York, USA)

ETEC 340 — Academic and Industrial Success Post-PhD

  • Panelists: 
    • Brett Orzechowski (Research & Innovators Startup Exchange, University at Albany, State University of New York, USA)
    • Kelly Reardon (Innovation and Entrepreneurship, University at Albany, State University of New York, USA)
    • Dr. Catherine Dumas (Department of Cybersecurity, University at Albany, State University of New York, USA)
  • Moderator: Dr. Dakota Murray (Department of Information Sciences and Technology, University at Albany, State University of New York, USA) 
ETEC 203, 303 & 340
12:45 p.m.LunchETEC Atrium
1:45 p.m.

Panel Discussion:

Retrospective of Ben-Ami Lipetz

  • Panelist: Dr. Brian Nussbaum (Department of Emergency Management and Homeland Security, University at Albany, State University of New York, USA)
ETEC 149/151
2:15 p.m.Poster PitchesETEC 149/151
3 p.m.

Paper Presentations:

ETEC 203 — Talk Session 4: Cybersecurity: Frameworks

  • A Quantitative, ATT&CK-Driven Framework for Cybersecurity Risk Assessment in Power Generation Operational Technology
    Mubarak Hussein, Philip Akekudaga (University at Albany, State University of New York, USA)
  • Federated Learning in Cybersecurity: Integrating FDNA and Time-Series Analytics with Federated Learning to Understand and Prevent Attacks
    Mizanur Rahman, Arka Prabha Das (University at Albany, State University of New York, USA)
  • Advancing Automated CTF Solving: Optimizing Infrastructure and Model Architecture in the D CIPHER Multi-Agent Framework
    Tyler Merves, Joseph Escobar, Michael Conaway, Hakan Otal, Unal Tatar (University at Albany, State University of New York, USA)
  • Relevancy Scoring Determined through Automated Vulnerability Prioritization
    Cameron Achorn, Caitlin Bartman, Max Debin, Marcus Regan, Dominick Foti (Marist University)

ETEC 303 — Talk Session 5: AI in Healthcare and Medicine

  • Multi-Agent AI for Chest Radiography: A Sequential Segmentation and LLM-Driven Consultative Tool for Medical Training
    Furkan Kurt, Abdulhamit Subasi (University at Albany, State University of New York, USA)
  • Responsible Artificial Intelligence Adoption in Healthcare: A Comprehensive Review of Clinical, Ethical and Governance Implications
    Melany Rumman (University at Albany, State University of New York, USA)
  • Applications of Artificial Intelligence (AI) in Disaster Management: Preferred Reporting Items for Systematic Reviews and MetaAnalyses (PRISMA)
    Oyeronke Toyin Ogunbayo (University at Albany, State University of New York, USA)
  • Neurodiversity-Aware Personalized Curriculum Adaptation Using Large Language Models
    Yujung Hwang, Sanjay Goel (University at Albany, State University of New York, USA)

ETEC 340 — Talk Session 6: Privacy, Law, and Ethics

  • Unequal Scientific Recognition in the Age of LLMs
    Yixuan Liu, Ábel Elekes, Jianglin Lu, Rodrigo Dorantes-Gilardi, Albert-László Barabási (Northeastern University, USA)
  • LegalGuardian: A Privacy-Preserving Framework for Secure Integration of Large Language Models in Legal Practice
    M. Mikail Demir (University at Albany, State University of New York, USA)
  • Securing Second Sales: An Analysis of the Content of Manufacturers and Platforms on Privacy in the Secondary Market for Smart Home IoT Devices
    Mildred Adwubi Bonsu (University at Albany, State University of New York, USA)
  • Cyberpoaching Prevention through Secure and Ethical Wildlife Trail Camera Data Management
    Samuel Berkovich, Evan Brown, Awais Razaque, Abel Scholl, Hamid Tipu, Dominick Foti (Marist University, USA)
ETEC 203, 303 & 340
4:15 p.m.

Poster Presentations

  • Anomaly Detection with Biomimicry Algorithms
    R. B. (University at Albany, State University of New York, USA)
  • Art as a Medium for Developing Children’s Digital Safety Awareness: An Interdisciplinary Study on Cybersecurity and OSINT within the Kids Biennale Indonesia
    Anggira Putri, Indrawan Mulia (Kids Biennale Indonesia Foundation, Indonesia)
  • Bayesian Modeling for Cybersecurity Risk Assessment
    Courtney Knight (University at Albany, State University of New York, USA)
  • Beyond Accurate Predictions: Certifying Robust Explanations in PiLiD Models
    Rubyat Tasnuva Hasan (University at Albany, State University of New York, USA)
  • Building Trust in Explainable AI based Automated Road Safety Systems
    Monjurul Prodhan (University at Albany, State University of New York, USA)
  • Can Fuzzy Labels of Social Media Bots Influence Trust Perceptions of Social Media Content?
    Thomas Waters (University at Albany, State University of New York, USA)
  • Canine Noseprinting via Local Feature Matching
    Adam Kaplan (University at Albany, State University of New York, USA)
  • Data-Driven Analysis of Network Intrusion Datasets to Strengthen Cybersecurity
    Hector Castillo (University at Albany, State University of New York, USA)
  • Design of an Immersive Virtual Reality Application for Public Speaking Education among Senior High School Adolescents in Jakarta
    Malik Abdul Aziz Amri (Jejak Warisan Nuswantara, Indonesia)
  • Enhancing Telecom Governance through Predictive Analytics: An Analysis of FCC Consumer Complaint Data
    Nisha Gautam (University at Albany, State University of New York, USA)
  • Hidden Bias: Consequences of Word Choice in Survey Design
    Benjamin Earl (University at Albany, State University of New York, USA)
  • In the Era of AI and Information Technology: Data Analytics Unveils Corruption’s Impact on Poverty in Africa
    Ogochukwu Gloria Nwachukwu (Rensselaer Polytechnic Institute, USA)
  • Intrusion Detection and Safety Implications of DoS and Spoofing Attacks in Self-Driving IoV Ecosystems
    Megawati Wood (University at Albany, State University of New York, USA)
  • Life, Machine Learning, and the Search for Habitability: Predicting Biosignature Fluxes for the Habitable Worlds Observatory
    Vasuda Trehan (University at Albany, State University of New York, USA)
  • Proactive Mitigation of Cognitive Security Risks Using Multimodal Physiological and Environmental Data
    Nazia Tabassum Natasha, Sheikh Rabiul Islam (University at Albany, State University of New York, USA)
  • Smart Shield: Detecting Phishing with Machine Learning
    Amna Saleem (University at Albany, State University of New York, USA)
  • Social Media's Impact on Adolescent Girls' Mental Health
    Rebecca Bondzie (University at Albany, State University of New York, USA)
  • SPECTRA: A Bayesian Machine Learning Framework for Modeling and Predicting Exoplanetary Atmospheric Absorption Spectra
    Vasuda Trehan (University at Albany, State University of New York, USA)
  • Tension between Neoliberal Education and Traditional Knowledge in Indonesia
    Sarah Tamimi (University of Georgia, USA)
  • The Evolution of ADHD Diagnostics: From Traditional CPTs to Multimodal and VR-Based Assessments
    Ezgi Sevval Yakisan (Republic of Türkiye Ministry of Health, Türkiye)
  • Unifying Large Language Models (LLMs) and Knowledge Graphs (KGs) for Explainable Security Compliance Automation
    Tugce Unlu (University at Albany, State University of New York, USA)
  • Unveiling Shadow AI: Exploring Employee Behavior under Ambiguous AI Policies
    Samiratu Shaibu (Southern Illinois University, USA)
ETEC Atrium

 

Friday, April 24, 2026

TimeActivityLocation
8 a.m.Light Breakfast and RegistrationETEC Atrium
9 a.m.

Paper Presentations:

ETEC 203 — Talk Session 7: Interdisciplinary Talks

  • From Landlines to LLMs: Advancements in Technology and Methodology in Survey Research
    Travis Montana Brodbeck (University at Albany, State University of New York, USA)
  • δ-STEAL: LLM Stealing Attack with Local Differential Privacy
    Kieu Dang, Phung Lai (university at Albany), NhatHai Phan, Abdallah Khreishah (New Jersey Institute of Technology), Yelong Shen (Microsoft), Ruoming Jin (Kent State University, USA)
  • Can AI Ever Forget Us? The Data Privacy Dilemma of Large Language Models
    Brianna Bace, Mikail Demir, Unal Tatar (University at Albany, State University of New York, USA)
  • LLM Sycophancy: Causes, Implications, Mitigation +C2:C10
    Zico Abhi Dey (University at Albany, State University of New York, USA)

ETEC 303 — Talk Session 8: Government and Policy

  • SPECTRA: A Bayesian Machine Learning Framework for Modeling and Predicting Exoplanetary Atmospheric Absorption Spectra
    Vasuda Trehan (University at Albany, State University of New York, USA)
  • Toward a Data-Driven Understanding of Disagreement within Science
    Dakota Murray (University at Albany, State University of New York, USA)
  • Automated Vendor Evaluation
    Jovin Percoco, Bryson Fritz, Charlie Samuel, Christian Tartaglia (Marist University, USA)
  • How Does Quality of Life (QoL) Affect Attractiveness of Cities and Internal Migration in Turkey?
    Ismet Selcuk Ozer (University at Albany, State University of New York, USA), Umut Turk (Abdullah Gul University, Türkiye)

ETEC 340 — Talk Session 9: AI and Human Collaboration

  • Technology Adoption in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC)
    Ragini Rani (University at Albany, State University of New York, USA)
  • Mac Malware Detection
    Wael Shahadeh, Alexander Cianfoni, Zachary Outman, Ralph Wakim, Dominick Foti (Marist University, USA)
  • Dark Web Digger: Modular Scraping for Dark Web Intel
    Samantha Stortz, Owen Stanley, Tyler Richards, Marissa Ratschki, Matt Ingoglia, Dominick Foti (Marist University, USA)
ETEC 203, 303 & 340
10:15 a.m.BreakETEC Atrium
10:30 a.m.

Workshops 
(Reminder: Please bring your own laptop.)

  • ETEC 203 — Building a Chatbot with RAG from Scratch: A Hands-On Guide to Retrieval-Augmented Generation, Evaluation, and Hallucination Prevention with LLMs
    Hakan Otal (Department of Information Sciences and Technology, University at Albany, State University of New York, USA)
  • ETEC 303 — Intro to Cloud Pen Testing
    Zachary Keenan (Ocelot Security, USA)
  • ETEC 340 — Machine Learning at the Edge
    R.B. (Department of Information Sciences and Technology, University at Albany, State University of New York, USA)
ETEC 203, 303 & 340
12 p.m.

Keynote Speech:

The Future Is Now: Emerging Challenges and Making Sense of Disaster
Dr. Tricia Wachtendorf (School of Sociology, University of Delaware, USA)

ETEC 140/151
1 p.m.LunchETEC Atrium
Keynote Speeches
Keynote Speeches

AI as the New Interface of Quantum Computing​

AI is emerging as the natural interface that bridges human intent and the growing complexity of quantum computing. As quantum hardware and software stacks advance, AI systems, powered by foundation models, natural‑language programming and autonomous code generation, can translate high‑level problems and algorithms into optimized circuits and guide us in orchestrating hybrid quantum–classical workflows. 

By lifting the abstraction layer, AI makes quantum development more accessible, accelerates research, and enables new forms of algorithmic discovery. In this talk, the keynote speaker will show how AI transforms quantum computing from a domain accessible only to specialists into a platform that anyone can meaningfully interact with.​

Dr. Ismael Faro is Vice President of AI Foundation Engineering and AI for Quantum at IBM Research and a Distinguished Engineer. He was the principal architect of the first public quantum cloud platform, IBM Quantum Experience, and a key contributor to the open-source framework, Qiskit. 

He leads the development of Quantum + AI software and services that integrate novel research as well as open-source initiatives for AI and quantum computing. His recent work focuses on leveraging AI to optimize the quantum software stack and agentic computing. He has also co-founded startups in AI, edge computing and distributed computing, with a priority in enhancing user experience through technological innovation.

 

The Future Is Now: Emerging Challenges and Making Sense of Disaster​

This year marks the 25th Anniversary of the September 11th attacks. That tragic event brought to light many lessons, including how we, as citizens and responders, make sense of disasters as they are unfolding and base our responses on that sense-making. 

In 2026, however, making sense of disaster brings new challenges not previously accounted for. AI is a tremendous tool that brings the promise of disaster management improvements. But what challenges face those responding to disasters as AI develops faster than we can develop policies and cultural practices around it? What’s more, these challenges are not matters that are on the horizon. That future is now, as these are issues communities face today.​

Dr. Tricia Wachtendorf is a Professor of Sociology at the University of Delaware and Director of the world- renowned Disaster Research Center – the oldest center in the world focused on the social science aspects of disaster. Over the past two decades, her research has focused on multi-organizational coordination before, during, and after disasters, transnational crises, and social vulnerability to disaster events. Dr. Wachtendorf has engaged in quick response field work after such events as the 2001 World Trade Center attacks, the tsunamis affecting India, Sri Lanka (2004) and Japan (2011), Hurricanes Katrina (2005), Sandy (2012), as well as the earthquakes in China (2008) and Haiti (2010).​

Papers
Papers
TitleAuthor(s), Affiliation & Country
A Geospatial Analysis of Cyberattacks on Refugee PopulationsOlivia R. BenAoumeur, Kimberly A. Cornell (University at Albany, State University of New York, USA)
A Local Differential Privacy Watermark with Guaranteed Utility for Large Language ModelsVan Kieu Dang (University at Albany, State University of New York, USA)
A Novel Application of Conservation Dogs: Round Goby DetectionKatherine Anne Baronowski (University at Albany, State University of New York, USA)
A Quantitative, ATT&CK-Driven Framework for Cybersecurity Risk Assessment in Power Generation Operational TechnologyMubarak Hussein, Philip Akekudaga (University at Albany, State University of New York, USA)
Advancing Automated CTF Solving: Optimizing Infrastructure and Model Architecture in the D-CIPHER Multi-Agent FrameworkTyler Merves, Joseph Escobar, Michael Conaway, Hakan Otal, Unal Tatar (University at Albany, State University of New York, USA)
Applications of Artificial Intelligence (AI) in Disaster Management: Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA)Oyeronke Toyin Ogunbayo (University at Albany, State University of New York, USA)
Automated Vendor EvaluationJovin Percoco, Bryson Fritz, Charlie Samuel, Christian Tartaglia (Marist University, USA)
Beyond the Alert - Analyzing University After-Care Communication in Swatting Incident Response

Suzanne Sonpon (University at Albany, State University of New York, USA)

Can AI Ever Forget Us? The Data Privacy Dilemma of Large Language ModelsBrianna Bace, Mikail Demir, Unal Tatar (University at Albany, State University of New York, USA)
Climate Adjusted Social Vulnerability Index: A Hybrid Framework for Risk Assessment in NY, USAPrabin Sharma, DeeDee Bennett Gayle (University at Albany, State University of New York, USA)
CourseForge: The Interactive Learning Management System to Detect and Visualize Course BottlenecksNabila Ayman, Md Nour Hossain (University at Albany, State University of New York, USA)
Cyberpoaching Prevention through Secure and Ethical Wildlife Trail Camera Data ManagementSamuel Berkovich, Evan Brown, Awais Razaque, Abel Scholl, Hamid Tipu, Dominick Foti (Marist University, USA)
Dark Web Digger: Modular Scraping for Dark Web IntelSamantha Stortz, Owen Stanley, Tyler Richards, Marissa Ratschki, Matt Ingoglia, Dominick Foti (Marist University, USA)
Design and Implementation of a Cyber Range for Student TrainingBenjamin Brandt, Ryan Clark, Nathaniel Pena, Erick Perez, Dominick Foti (Marist University, USA)
Does TikTok Usage Influence Users’ Attitudes toward China?Derick Chungcheh Ma (University at Albany, State University of New York, USA)
Do We Have Your Attention? Tracking Eye Movements and Assessing Viewer Preferences During Television Weather WarningsCaroline Rafizadeh, Michael Michaud, Heather Sheridan, Jeannette Sutton, Gregory Cox (University at Albany, State University of New York, USA)
δ-STEAL: LLM Stealing Attack with Local Differential PrivacyKieu Dang, Phung Lai (University at Albany, State University of New York, USA), NhatHai Phan, Abdallah Khreishah (New Jersey Institute of Technology, USA), Yelong Shen (Microsoft, USA), Ruoming Jin (Kent State University, USA)
Federated Learning in Cybersecurity: Integrating FDNA and Time-Series Analytics with Federated Learning to Understand and Prevent AttacksMizanur Rahman, Arka Prabha Das (University at Albany, State University of New York, USA)
From Black Box to Insight: Explainable AI for Extreme Event PreparednessKiana Vu, Ismet Selcuk Ozer, Phung Lai, Zheng Wu (University at Albany, State University of New York, USA), Thilanka Munashinghe (Rensselaer Polytechnic Institute, USA), Jennifer Wei (NASA, USA)
From Landlines to LLMs: Advancements in Technology and Methodology in Survey ResearchTravis Montana Brodbeck (University at Albany, State University of New York, USA)
How Does Quality of Life (QoL) Affect Attractiveness of Cities and Internal Migration in Turkey?Ismet Selcuk Ozer (University at Albany, State University of New York, USA), Umut Turk (Abdullah Gul University, Türkiye)
LegalGuardian: A Privacy-Preserving Framework for Secure Integration of Large Language Models in Legal PracticeM. Mikail Demir (University at Albany, State University of New York, USA)
Let ChatGPT Help You Find a Job: Examining the Motivation Behind Job-Seekers’ Use of AISiling Long (University at Albany, State University of New York, USA)
LLM Sycophancy: Causes, Implications, MitigationZico Abhi Dey (University at Albany, State University of New York, USA)
Mac Malware DetectionWael Shahadeh, Alexander Cianfoni, Zachary Outman, Ralph Wakim, Dominick Foti (Marist University, USA)
Make AI Make Sense: Military Organizational Sense-Making and Decision Support with Human Artificial Intelligence TeamingOlivia R. BenAoumeur, Kimberly A. Cornell (University at Albany, State University of New York, USA)
Multi-Agent AI for Chest Radiography: A Sequential Segmentation and LLM-Driven Consultative Tool for Medical TrainingFurkan Kurt, Abdulhamit Subasi (University at Albany, State University of New York, USA)
Neurodiversity-Aware Personalized Curriculum Adaptation Using Large Language ModelsYujung Hwang, Sanjay Goel (University at Albany, State University of New York, USA)
Organizational and Behavioral Dimensions of AI Adoption in the US Public LibrariesKaity Hsiu (University at Albany, State University of New York, USA)
Relevancy Scoring Determined through Automated Vulnerability PrioritizationCameron Achorn, Caitlin Bartman, Max Debin, Marcus Regan, Dominick Foti (Marist University, USA)
Responsible Artificial Intelligence Adoption in Healthcare: A Comprehensive Review of Clinical, Ethical and Governance ImplicationsMelany Rumman (University at Albany, State University of New York, USA)
Securing Second Sales: An Analysis of the Content of Manufacturers and Platforms on Privacy in the Secondary Market for Smart Home IoT DevicesMildred Adwubi Bonsu (University at Albany, State University of New York, USA)
SPECTRA: A Bayesian Machine Learning Framework for Modeling and Predicting Exoplanetary Atmospheric Absorption SpectraVasuda Trehan (University at Albany, State University of New York, USA)
Technology Adoption in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC)Ragini Rani (University at Albany, State University of New York, USA)
The Information World of Actual-Play TRPG: An Exploratory Thematic AnalysisAngela Hackstadt (University at Albany, State University of New York, USA)
Toward a Data-Driven Understanding of Disagreement within ScienceDakota Murray (University at Albany, State University of New York, USA)
UAS-Delivered versus Human-Placed Training Aids: Impacts on Detection K9 Training and PerformanceKatherine Anne Baronowski (University at Albany, State University of New York, USA)
Unequal Scientific Recognition in the Age of LLMsYixuan Liu, Ábel Elekes, Jianglin Lu, Rodrigo Dorantes-Gilardi, Albert-László Barabási (Northeastern University, USA)
Panels
Panels

Hallucinations in Generative AI

Panelists: 

  • Dr. Nour Alhussien​, Department of Cybersecurity, University at Albany, State University of New York, USA​
  • Dr. Alessandra Buccella​, Department of Philosophy, University at Albany, State University of New York, USA
  • Dr. M. Abdullah Canbaz​​, Department of Information Sciences and Technology, University at Albany, State University of New York, USA

Moderator: 

  • Dr. Kimberly A. Cornell​, Department of Information Sciences and Technology, University at Albany, State University of New York, USA

 

Stakeholder Engagement in Emergency Management​

Panelists: 

  • Dr. Jeannette Sutton​​, Department of Emergency Management and Homeland Security, University at Albany, State University of New York, USA
  • Dr. Matthew Crayne​, Department of Management, University at Albany, State University of New York, USA
  • Dr. Tricia Wachtendorf​, Department of Sociology, University of Delaware
  • Dr. Elyse Zavar​, Department of Emergency Management and Disaster Science, University of North Texas

Moderator: 

  • Dr. Samantha Penta​​, Department of Emergency Management and Homeland Security, University at Albany, State University of New York, USA​

 

Academic and Industrial Success Post-PhD​

Panelists: 

  • Brett Orzechowski​, Research & Innovators Startup Exchange, University at Albany, State University of New York, USA
  • Kelly Reardon, Innovation and Entrepreneurship, University at Albany, State University of New York, USA
  • Dr. Catherine Dumas, Department of Cybersecurity, University at Albany, State University of New York, USA

Moderator:

  • Dr. Dakota Murray​, Department of Information Sciences and Technology, University at Albany, State University of New York, USA

 

Retrospective of Ben-Ami Lipetz​

Panelist: 

  • Dr. Brian Nussbaum​​, Department of Emergency Management and Homeland Security, University at Albany, State University of New York, USA​
Posters
Posters
TitleAuthor, Affiliation & Country
Anomaly Detection with Biomimicry AlgorithmsR.B. (University at Albany, State University of New York, USA)
Art as a Medium for Developing Children’s Digital Safety Awareness: An Interdisciplinary Study on Cybersecurity and OSINT within the Kids Biennale IndonesiaAnggira Putri, Indrawan Mulia (Kids Biennale Indonesia Foundation, Indonesia)
Bayesian Modeling for Cybersecurity Risk AssessmentCourtney Knight (University at Albany, State University of New York, USA)
Beyond Accurate Predictions: Certifying Robust Explanations in PiLiD ModelsRubyat Tasnuva Hasan (University at Albany, State University of New York, USA)
Building Trust in Explainable AI based Automated Road Safety Systems

Monjurul Prodhan (University at Albany, State University of New York, USA)

Can Fuzzy Labels of Social Media Bots Influence Trust Perceptions of Social Media Content?Thomas Waters (University at Albany, State University of New York, USA)
Canine Noseprinting via Local Feature MatchingAdam Kaplan (University at Albany, State University of New York, USA)
Data-Driven Analysis of Network Intrusion Datasets to Strengthen CybersecurityHector Castillo (University at Albany, State University of New York, USA)
Design of an Immersive Virtual Reality Application for Public Speaking Education among Senior High School Adolescents in JakartaMalik Abdul Aziz Amri (Jejak Warisan Nuswantara, Indonesia)
Enhancing Telecom Governance through Predictive Analytics: An Analysis of FCC Consumer Complaint Data

Nisha Gautam (University at Albany, State University of New York, USA)

Hidden Bias: Consequences of Word Choice in Survey DesignBenjamin Earl (University at Albany, State University of New York, USA)
In the Era of AI and Information Technology: Data Analytics Unveils Corruption’s Impact on Poverty in AfricaOgochukwu Gloria Nwachukwu (Rensselaer Polytechnic Institute, USA)
Intrusion Detection and Safety Implications of DoS and Spoofing Attacks in Self-Driving IoV EcosystemsMegawati Wood (University at Albany, State University of New York, USA)
Life, Machine Learning, and the Search for Habitability: Predicting Biosignature Fluxes for the Habitable Worlds ObservatoryVasuda Trehan (University at Albany, State University of New York, USA)
Proactive Mitigation of Cognitive Security Risks Using Multimodal Physiological and Environmental DataNazia Tabassum Natasha, Sheikh Rabiul Islam (University at Albany, State University of New York, USA)
SPECTRA: A Bayesian Machine Learning Framework for Modeling and Predicting Exoplanetary Atmospheric Absorption SpectraVasuda Trehan (University at Albany, State University of New York, USA)
Smart Shield: Detecting Phishing with Machine LearningAmna Saleem (University at Albany, State University of New York, USA)
Social Media's Impact on Adolescent Girls' Mental HealthRebecca Bondzie (University at Albany, State University of New York, USA)
Tension Between Neoliberal Education and Traditional Knowledge in IndonesiaSarah Tamimi (University of Georgia, USA)
The Evolution of ADHD Diagnostics: From Traditional CPTs to Multimodal and VR-Based AssessmentsEzgi Sevval Yakisan (Republic of Türkiye Ministry of Health, Türkiye)
Unifying Large Language Models (LLMs) and Knowledge Graphs (KGs) for Explainable Security Compliance AutomationTugce Unlu (University at Albany, State University of New York, USA)
Unveiling Shadow AI: Exploring Employee Behavior Under Ambiguous AI PoliciesSamiratu Shaibu (Southern Illinois University Edwardsville, USA)
Workshops
Workshops

Building a Chatbot with RAG from Scratch: A Hands-On Guide to Retrieval-Augmented Generation, Evaluation, and Hallucination Prevention with LLMs​

This workshop is a hands-on demo showing how to build an Agentic RAG (Retrieval-Augmented Generation) pipeline. The session will start with how to set up a local large language model and build a simple chatbot. 

The main part of the workshop will focus on building agents that can ask questions to a given document. The workshop will show how this agent-based system works to pull information from the text. It will use tools like CrewAI, LangChain, and Gradio to build the application. 

Participants will see a full workflow from start to finish. The goal is for attendees to understand the basic steps of creating an agentic system for document analysis.​

  • Required: Laptop​
  • Presenter: Hakan Tugrul Otal (PhD Student, Department of Information Sciences and Technology, UAlbany, USA)​

 

Intro to Cloud Pen Testing​

This workshop simulates a reality in which a recently acquired company has forgotten infrastructure that still interacts with modern cloud identity systems. Through hands-on open source intelligence (OSINT) and reconnaissance activities, participants will uncover how overlooked assets persist and how easily attackers can exploit them. 

The exercise environment consists of two Microsoft Entra tenants representing a parent organization and its newly acquired subsidiary. The parent tenant exposes a public facing account creation portal where participants register and receive access to a SharePoint site seeded with credentials discoverable through OSINT. 

Participants will map the main tenant and the newly acquired tenant using standard OSINT and enumeration tools, discover the account registration page and the forgotten logon page using subdomain enumeration, and ultimately access the subsidiary’s neglected system using the discovered credentials. 

The point of the workshop is to highlight common mistakes and help participants develop their own reconnaissance process. The session will discuss why constantly taking notes and recursively performing the same tasks can help uncover hidden gems that commonly go unnoticed. 

By working through a realistic acquisition scenario, participants will gain firsthand experience identifying the kinds of misconfigurations and forgotten cloud assets that commonly evade organizational inventories. This 75-minute presenter-led session aligns with Technology and Topical skill-building tracks in penetration testing, OSINT, cybersecurity, and information science.​

  • Required: Laptop​
  • Presenter: Zachary Keenan (Ocelot Security, USA)​

 

Machine Learning at the Edge

Edge computing and artificial intelligence represent transformative technologies that enable intelligent decision-making directly on devices without constant cloud connectivity. However, the complexity of machine learning model development has traditionally created barriers for beginners seeking to implement edge AI solutions. 

This one-hour hands-on workshop addresses this challenge by introducing participants to Edge Impulse, a leading platform that democratizes edge AI development through its intuitive no-code and low-code interface.​

The workshop is designed specifically for beginners with basic programming knowledge but no prior machine learning or artificial intelligence experience. This accessibility focus makes edge AI development approachable for students, hobbyists, professionals transitioning into IoT, and anyone interested in creating intelligent embedded systems. 

The session requires only basic computer literacy, an internet connection, a web browser, and an email address for account creation, eliminating traditional barriers such as extensive ML expertise, expensive hardware or complex software installations.​

The workshop follows a structured, hands-on approach that guides participants through the complete edge AI development workflow. 50 Edge Impulse credentials available for interested researchers.​

  • Required: Laptop​
  • Presenter: R. B. (PhD Studen, Department of Information Sciences and Technology, UAlbany, USA)​
Presentation & Participation
Poster Presentation
Poster Presentation

Format

  • Poster elevator pitch: At the beginning of the poster session, explain your research and key findings in one to three minutes on stage.
  • Poster interaction: Stand by your poster and engage with conference participants.

Items to bring

  • Printed poster (48 inches wide by 36 inches tall)
  • Business cards and copies of your CV for networking opportunities
  • Handouts or takeaways associated with your research (if applicable)

Provided items

  • Poster easels and binder clips
     
Paper Presentation
Paper Presentation

Format

  • Each talk is 10 minutes, followed by a 20-minute combined Q&A at the end of the session.

Presentation slides

  • Please prepare your slides using clear and concise templates.
  • Please upload all slides by 11:59 p.m. on April 17, 2026 (Eastern Time). Your slides will be collated on the organizer’s computer before the session.

Provided items

  • Remote controls, projectors and necessary connection cables for presentations.
  • Microphones for all attendees to hear questions and responses during the Q&A session.

Arrival time 

  • Please arrive at least 20 minutes before your scheduled session for final technical checks and setup.
     
Participation
Participation

Dress code: Business formal or business casual attire is recommended to convey professionalism.

Audience etiquette: Please keep phones and other devices silent during talks. Practice active listening and avoid interrupting other speakers. Engage in respectful interactions, even in moments of disagreement.

Venue
Transportation
Transportation

Parking: Parking is available right next to the ETEC Building. Please check the “I will need a parking permit” box when registering for the conference, and a free parking permit will be provided if registered prior to March 15, 2025.

Buses

Trains

  • Take Amtrak to Albany-Rensselaer Station, then take a taxi or a ride-sharing service to the ETEC Building.

Flights

  • Option 1: Fly to JFK International Airport, transfer to Amtrak at Penn Station, then take a taxi or a ride-sharing service to the ETEC Building.
  • Option 2: Fly to Albany International Airport, then take a taxi or a ride-sharing service to the ETEC Building.
     
Hotel Accommodation
Hotel Accommodation
  • Participants are responsible for arranging their own accommodation unless receiving a scholarship that includes the hotel. View the map of nearby hotels.
Food
Food
  • Light breakfast and lunch will be provided on both days. Please share any food allergies or dietary restrictions during registration by March 15, 2025, and we will do our best to accommodate your needs.
  • Review additional dining options.

Contact Us

If you have any questions about the New Trends in Informatics Research Conference, please contact [email protected] or refer to the FAQs.

College of Emergency Preparedness, Homeland Security and Cybersecurity, University at Albany, State University of New York logo