Skip to main content

Munindar Singh

MS
A headshot of Munindar Singh standing in front of a gray background.

Computer Science

SAS Institute Distinguished Professor

Computer Science

Engineering Building II (EB2) 2252

919.515.5677 Website

Bio

Munindar P. Singh is a SAS Institute Distinguished Professor in the Department of Computer Science at NC State University. Singh’s research focuses on the science and engineering of trustworthy AI, with an emphasis on multiagent systems and sociotechnical systems. His work spans AI, software engineering, and computing ethics.

Singh has authored over 350 peer-reviewed publications, including highly cited papers on agents, workflows, and trust. He is a Fellow of the Association for the Advancement of Artificial Intelligence (AAAI), the Institute of Electrical and Electronics Engineers (IEEE), and the Association for Computing Machinery (ACM). He has served as editor-in-chief of ACM Transactions on Internet Technology and as general co-chair for conferences such as the International Conference on Autonomous Agents and Multiagent Systems (AAMAS).

He earned his Ph.D. in computer sciences from the University of Texas at Austin and a B.Tech. in computer science and engineering from the Indian Institute of Technology, Delhi. At NC State, Singh is a core faculty member of the Science of Security Lablet and contributes to initiatives in responsible computing and ethical AI.

Education

Ph.D. Computer Science University of Texas, Austin 1993

M.S. Computer Science University of Texas, Austin 1988

B.Tech Computer Science and Engineering Indian Institute of Technology 1986

Area(s) of Expertise

Singh's lifelong program of research can be summed up as discovering, modeling, studying, and applying high-level abstractions for computing.

Computing is in the midst of a paradigm shift from individual computations to interaction. Current techniques are woefully inadequate for network-based applications such as ubiquitous information access and e-commerce, which involve a number of heterogeneous (or independently designed) and autonomous (or independently operated) subsystems. The metaphor of interaction offers a natural, powerful conceptual basis for designing solutions for these applications. He takes inspiration from current developments in databases, artificial intelligence, and distributed computing.

Agents are a popular metaphor for autonomous, persistent computations that perceive, reason, act, and communicate. Agents interact to form multiagent systems, which promise a natural means for building complex computing systems in large, dynamically changing, networked environments.

The motivation for Singh's research program is practical, but there are major implications for problems and approaches studied within computer science. He was among the first researchers to study theories of agents and communication, apply agent techniques in workflow management, and use ontologies for heterogeneous database access. His current research falls into two major themes, emphasizing theory and applications, respectively.

Multiagent systems: To engineer multiagent systems presupposes a thorough understanding of interaction, which opens up important theoretical problems in formulating, formalizing, and engineering with the right interaction primitives. In one direction, Singh is studying new forms of protocols to engineer the coordination and collaboration of agents. These are based on formalizations of abstractions dealing with agent communication, temporal logic, commitments, and teams of agents. In another direction, he is studying systemic questions of trust, where ag

Grants

Date: 10/01/21 - 9/30/26
Amount: $2,018,000.00
Funding Agencies: National Science Foundation (NSF)

How can we create ����������������community food security���������������? This project aims to develop a community-based socially intelligent nonprofit food rescue and distribution infrastructure to fairly serve vulnerable communities experiencing food insecurity. This infrastructure will have a loop mechanism that continuously learns consumer preferences and provides feedback to upstream stages of the supply chain and also learns about the food availability at the local food sources and feeds that information to the downstream stages. The main objective of this research is to minimize food waste along different stages of the supply chain while maximizing equitable access to safe food given consumer preferences. Food banks are nonprofit organizations that provide a framework for the non-profit food supply chain by collecting donations from multiple sources such as local grocers, growers, and the community (e.g., food drives) and distributing the donations to food-insecure households through a network of community-based partner agencies (e.g., food pantries, homeless shelters, schools). The COVID-19 pandemic has significantly strained this network as demand has surged, the volunteer-based workforce has waned, and supply uncertainty has increased highlighting both the network������������������s strengths and limitations and the need to strengthen the community-based infrastructure and create solutions that are self-reliant and robust for communities that are affected by such events.

Date: 10/01/21 - 9/30/26
Amount: $500,000.00
Funding Agencies: National Science Foundation (NSF)

Recent advances in artificial intelligence have raised concerns of ethics in regards to intelligent, adaptive agents. This project begins from a model of a sociotechnical system (STS) comprising autonomous social entities (people and organizations -- principals) and technical entities (agents, who help principals). Its objective is to uncover principles of multiagent systems that enable developing sociotechnical systems that incorporate ethical concerns adaptively and from multiple perspectives, and with high confidence. This project will develop a formal computational representation of an STS in terms of social controls over its principals and technical controls over its agents.

Date: 10/01/19 - 9/30/24
Amount: $458,000.00
Funding Agencies: National Science Foundation (NSF)

This project will investigate theoretical models and programming techniques for decentralized applications. Emerging technologies show great potential in helping bring about a new era of automated contracts that enables flexible transactions among independent parties---with applications in finance, healthcare, pharmaceuticals, among other domains. This project will go beyond current approaches by providing a new declarative model that is able to handle the challenging computing-related aspects of real-life contracts. This model is accompanied with techniques that provide guidance on how to specify and enact contracts in a manner that is precise, flexible, and eliminates unnecessary information sharing.

Date: 09/01/17 - 8/31/24
Amount: $553,076.00
Funding Agencies: US Army - Army Research Office

Frequent security breaches have highlighted both the growing importance of cybersecurity and weaknesses of traditional methods such as firewalls, malware detection, intrusion detection, and prevention technologies. To leap ahead of attackers, we must move beyond passive defense strategies toward a new science of interactive personalized deception for cyberdefense. Our proposed approach involves (1) building models of attackers and their propensities and (2) characterizing computers, networks, users, and their relationships and interactions so as to enable realistic deception. We will develop a modular framework for evaluation of the key deception techniques consisting of a pluggable game-based scaffolding.

Date: 10/01/21 - 9/30/23
Amount: $150,000.00
Funding Agencies: National Science Foundation (NSF)

The overarching goal of the proposed research is to identify, test, and evaluate technologically enabled and community-supported solutions for temporally distributing travel demand for on-demand public transportation services in an equitable manner, without the use of traditional pricing incentives. We are specifically interested in understanding whether enabling and incentivizing prosocial behavior, such as volunteering to shift one������������������s trip time to accommodate others, share a ride, and cooperate with other users to improve outcomes for the user community or to prioritize a transportation disadvantaged user, is a potential solution that is feasible and desirable for communities. If our preliminary analysis during the proposed planning grant (PG) supports the case of cooperative adaptive ride planning, we will investigate how prosocial behavior can be enabled in a trip scheduling environment and be facilitated through the use of artificial intelligence (AI), and we will test and evaluate the efficacy of this approach in improving service during an integrative research grant (IRG). No previous research has explored empathy and prosocial behavior in the context of traveler choices and decision-making.

Date: 04/04/18 - 8/15/23
Amount: $3,655,309.00
Funding Agencies: US Dept. of Defense (DOD)

This project proposes the continuation of the Science of Security Lablet at NC State University. Science of Security refers to the study of cybersecurity from an explicitly scientific perspective. Cybersecurity encompasses elements of technology, human behavior, and policy. Science of Security seeks to identify and apply the appropriate scientific principles on cybersecurity problems, enhancing rigor and reproducibility, thereby improving the transfer of research to practice. This Lablet provides a home for investigations into diverse topics pertaining to a Science of Security. The Lablet will support the three major elements of a Science of Security: research, scientific methods, and community engagement.

Date: 12/01/20 - 5/31/23
Amount: $95,000.00
Funding Agencies: US Army - Army Research Office

This project investigates a form of active cyberdefense based on defensive deception against an attacker. It applies a form of game theory called hypergame theory that enables a natural representation of situations where an attacker and a defender can be understood as playing a different game. This project will develop computational models of hypergames that reflect cyber attack and defense strategies to support the investigation of tradeoffs such as between defense effectiveness and cost. If successful, the project will yield representations and algorithms that defenders could apply to disrupt an attacker's beliefs and thus cause attacks to fail.

Date: 01/01/21 - 12/31/21
Amount: $225,000.00
Funding Agencies: Texas A&M Engineering Experiment Station

IT/OT convergence is here. However, along with producing great improvements in automation and agility, it vastly increases the threat surface of manufacturing. Whereas previously OT networks were isolated from the outside, now they can be readily accessed and attacked through the IT network. Traditional security emphasizes perimeter defenses, which seek to prevent an attacker from penetrating a network. However, as manufacturing and other industries have commonly experienced, attackers often do breach perimeter defenses through a combination of technical and human factors. An insider threat is an attacker on the inside, e.g., via stolen user credentials or a compromised equipment vendor. How can we detect and respond to insider threats? The detection must cause minimal disruption to operations. It is not feasible to "shut down and reinstall everything" in manufacturing. Therefore, this project will investigate defensive deception in manufacturing as means to achieve resilience in the face of insider threats.

Date: 01/17/19 - 12/31/20
Amount: $210,406.00
Funding Agencies: Laboratory for Analytic Sciences

LAS DO1 Singh - 2.1 Human- Machine Collaboration - Workflows

Date: 01/01/20 - 6/30/20
Amount: $37,149.00
Funding Agencies: Center of Hybrid Multicore Productivity Research (CHMPR) - NCSU Research Site

: How can we help organizations share access to their data with their business partners and users effectively (providing precise controls including the ability to terminate access as needed) and efficiently (with low administrative overhead)? Specifically, how can organizations negotiate and ����������������prosecute��������������� (i.e., enact, monitor, enforce) business contracts in real-time to support real-time analytics? This project investigates an approach based on the combination of a logic-based approach based on legal norms with blockchain architecture for a shared ledger. RQ1. How can we express sharing policies formally, including policies referencing other policies? RQ2. How can we represent the requisite information in an information architecture that combines an immutable ledger with mutable information stores? RQ3. How can we reason with sharing policies in our information architecture, using smart contracts on the blockchain to verify compliance and guide the reasoning of the off-blockchain agents?


View all grants
  • 2021 | Fellow, ACM
  • 2021 | Carla Savage Award
  • 2017 | Member of the Research Leadership Academy, NC State University
  • 2017 | Alumni Association Outstanding Research Award, NC State University
  • 2017 | Fellow, Association for the Advancement of Artificial Intelligence
  • 2016 | Partnership Award, IBM
  • 2016 | Influential Paper Award, IFAAMAS
  • 2016 | Alumni Association Distinguished Graduate Professorship Award, NC State University
  • 2015 | Alumni Association Outstanding Research Award, NC State University
  • 2009 | Fellow, Institute of Electrical and Electronics Engineers
  • 2007 | Faculty Award, IBM
  • 2007 | Research Council Faculty Award, Intel
  • 2001 | University Research Award, Cisco
  • 2000 | Partnership Award, IBM
  • 1997-2000 | Computer Society Distinguished Visitor, IEEE
  • 1996| Partnership Award, IBM
  • 1996 | Faculty Early CAREER Award, NSF