Laurent Michel, Ph.D.
Associate Professor of Computer Science and Engineering
- Storrs CT UNITED STATES
- Computer Science and Engineering
Professor Laurent Michel is an expert in the areas of constraint programming, voting technology and cybersecurity
Contact More Open optionsBiography
Co-director of the Connecticut Cybersecurity Center, which conducts research on all aspects of cybersecurity, including the emerging fields of mobile technology security and web-based services and applications, in addition to longer-established concerns with hardware and software vulnerabilities, voting technology, and cyber industry partnerships
Areas of Expertise
Education
Brown University
Ph.D.
Computer Science
1999Brown University
M.Sc.
Computer Science
1997Universtaires Notre-Dame de la Paix
B.S.
Computer Science
Affiliations
- Connecticut Academy of Science and Engineering
- Director, Synchrony Financial Center of Excellence in Cybersecurity
- Past-president, International Association for Constraint Programming
- Founding Member, Connecticut Voting Technology Research Center
Accomplishments
Synchrony Financial Chair in Cybersecurity
2019-12-11
Established by a generous donation from Synchrony Financial in 2016, this position is aimed at supporting a leader focused on the advancement of education and research in cybersecurity. Michel’s appointment was approved by the UConn Board of Trustees during their meeting on December 11, 2019.
Links
Social
Media
Media Appearances
Health care industry hit hardest by data breaches, CT data shows
Hearst Connecticut print
2023-08-18
Laurent Michel, a cybersecurity researcher and computer science professor at the University of Connecticut, said organizations across many sectors don’t invest enough to secure their networks from hackers. For the health care industry, the problem is exacerbated since many organizations struggle to keep up with the expensive cost of providing medical care. "So adding to that, the cost of defending your cyber security or cyber infrastructure with cybersecurity products, will only up the cost and small offices typically don’t see that as something that’s critical," Michel said.
Black Hats, Cyber Bots, Zombies, and You
UConn Magazine
2016-05-31
Cybersecurity specialists, led by John Chandy, an electrical and computer engineering professor, and Laurent Michel, an associate professor of computer science and engineering, is working to protect our information. UConn’s Comcast Center of Excellence for Security Innovation is advancing research to strengthen the nation’s electronic information networks and training a new generation of hardware, software, and network security engineers to protect the integrity of everything from small consumer electronics to the complex computer systems running our major industrial, financial, and transportation systems. Secured behind passcode-protected entry doors, the Comcast lab is embedded deep inside one of UConn’s main academic buildings. Getting there can be an adventure.
Articles
An efficient approach to short-term load forecasting at the distribution level Authors
IEEE Transactions on Power Systems2015 Short-term load forecasting at the distribution level predicts the load of substations, feeders, transformers, and possibly customers from half an hour to one week ahead. Effective forecasting is important for the planning and operation of distribution systems. The problem, however, is difficult in view of complicated load features, the large number of distribution-level nodes, and possible switching operations.
Activity-Based Search for Black-Box Constraint Programming Solvers
International Conference on Integration of Artificial Intelligence (AI) and Operations Research (OR) Techniques in Constraint Programming2012 Robust search procedures are a central component in the design of black-box constraint-programming solvers. This paper proposes activity-based search which uses the activity of variables during propagation to guide the search. Activity-based search was compared experimentally to impact-based search and the wdeg heuristics but not to solution counting heuristics.
Corrective line switching with security constraints for the base and contingency cases
IEEE Transactions on Power Systems2011 Following a line outage, the fast corrective operations of transmission line switching might be used to regain N-1 security of the system without generation re-dispatch or load shedding. The problem to find feasible switching operations can be formulated as a constraint satisfaction problem (CSP). Feasibility checking, however, is difficult since changes in load flows caused by line switching operations are discontinuous, and many contingency cases need to be examined.
Short-Term Load Forecasting: Similar Day-Based Wavelet Neural Networks
IEEE Transaction on Power Systems2009 In deregulated electricity markets, short-term load forecasting is important for reliable power system operation, and also significantly affects markets and their participants. Effective forecasting, however, is difficult in view of the complicated effects on load by a variety of factors. This paper presents a similar day-based wavelet neural network method to forecast tomorrow's load.
Constraint-Based Local Search
The MIT Press2009 The ubiquity of combinatorial optimization problems in our society is illustrated by the novel application areas for optimization technology, which range from supply chain management to sports tournament scheduling. Over the last two decades, constraint programming has emerged as a fundamental methodology to solve a variety of combinatorial problems, and rich constraint programming languages have been developed for expressing and combining constraints and specifying search procedures at a high level of abstraction.