Talks / Speaking

Talks on AI agents, trustworthy AI, speech systems, and serious deployment.

I am interested in speaking with research groups, conferences, technical teams, and interdisciplinary audiences working on AI agents and systems where reliability, evidence, and operational context matter. Current speaking activity includes an official CYBERSEC 2026 breakout session on cybersecurity design for AI software medical devices, alongside two English CISC 2025 conference papers on AI-era ransomware defense and threat pulse modeling for ZTAID-aligned zero-trust maturity assessment.

Review the featured session Best for organizers who need a concrete talk example fast. Browse topics and audience fit Useful when checking whether the content matches your event. Ready to invite Jason? Use the contact page for the fastest direct route.
English Research Sessions

Conference paper activity

Two English CISC 2025 paper sessions connecting technical analysis, operational threat models, continuous assessment, and practical defense strategy.

Conference paper CISC 2025

Evolution and Defense Challenges of Ransomware-as-a-Service in the AI Era: A Technical and Strategic Analysis Using Medusa and CrazyHunter as a Case Study

English conference paper examining how AI-era RaaS operations evolve through BYOVD, LOTL, covert C2, and adaptive tradecraft, then mapping those threats to a ZTAID-grounded zero-trust defense strategy.

Schedule

May 28-29, 2025

Track

Cryptology and Information Security Conference

Venue

Feng Chia University

Format

Conference Paper · English

The paper uses Medusa and CrazyHunter as concrete case studies to connect modern ransomware operations with practical defense design, including phased authorization, anomaly detection, automated containment, and security orchestration for high-risk environments.

Jason Chia-Sheng Lin · Department of Computer Science and Information Engineering, National Yang Ming Chiao Tung University

With Yu-Te Wu, Yong-Sheng Chen, and Isaac Yi-Yuan Lee · National Yang Ming Chiao Tung University

Ransomware-as-a-ServiceZero TrustZTAIDBYOVDSOAR
Conference paper CISC 2025

Integration of Threat Pulse Modeling into the ZTAID Zero Trust Maturity Assessment Model: An Analytical Framework

English conference paper proposing Threat Pulse Modeling (TPM) as a way to translate live cyber threat intelligence into ZTAID maturity signals for continuous zero-trust assessment.

Schedule

May 28-29, 2025

Track

Cryptology and Information Security Conference

Venue

Feng Chia University

Format

Conference Paper · English

The paper defines pulse events, impact-vector scoring across the five ZTAID pillars, severity triage, and time-series forecasting with ARIMA and Kalman filtering, alongside dynamic metrics such as Pulse Coverage Rate and Detection-Feedback Loop Time to shorten the intelligence-to-assessment-to-response cycle.

Jason Chia-Sheng Lin · Department of Computer Science and Information Engineering, National Yang Ming Chiao Tung University

With Yu-Te Wu, Yong-Sheng Chen, and Isaac Yi-Yuan Lee · National Yang Ming Chiao Tung University

Threat IntelligenceThreat Pulse ModelingZero TrustZTAIDForecasting

Trustworthy AI Beyond Benchmark Performance

How to think about reliability, evidence, human review, and system behavior when AI is used in environments where mistakes carry real cost.

Research groups, labs, interdisciplinary audiences

AI-Era Ransomware and Zero-Trust Defense

How modern RaaS campaigns combine automation, BYOVD, LOTL, and covert C2 techniques, and how ZTAID-aligned zero-trust strategy can structure practical detection, containment, and recovery.

Cybersecurity conferences, blue teams, graduate seminars

Threat Pulse Modeling and Continuous Assessment

How cyber threat intelligence can be translated into pulse events, ZTAID pillar scores, and measurable maturity signals to support faster defensive adaptation.

Cybersecurity researchers, zero-trust programs, graduate seminars

ASR + LLM + RAG for Operational Workflows

Design patterns for speech and language pipelines that move from raw transcripts to grounded, inspectable outputs in analyst-facing settings.

NLP teams, speech researchers, applied AI practitioners

AI Agents and IDE-Like Assistant Systems

How to design tool-using agents and coding-assistant workflows that stay inspectable, grounded, and useful for real work.

AI product teams, research labs, engineering groups

Security-Minded AI System Design

Why privacy, leakage risk, adversarial thinking, and deployment assumptions should be treated as core system questions rather than compliance afterthoughts.

Security teams, engineering groups, policy-adjacent stakeholders

Formats and audience fit

  • Research seminars and invited academic talks
  • Conference sessions and interdisciplinary panels
  • Technical talks for labs, applied AI teams, and research-driven companies

These talks are especially well suited to research groups, technical conferences, interdisciplinary programs, and teams working on AI in environments where reliability and governance matter.

Invitation-ready topics

Talks can be tailored for research, technical, or cross-functional audiences. If your event sits near AI agents, trustworthy AI, speech intelligence, ransomware defense, or deployment risk, I would be glad to discuss a fit.

If you are organizing a seminar, conference session, lab talk, or interdisciplinary event related to AI agents, trustworthy AI, speech intelligence, RAG systems, or high-stakes deployment, feel free to reach out with your format and audience in mind.