Search for tag: "cybersecurity lecture series"

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A month ago 20 views 0  

James L. Patton - Deception, ExoNets, SmushWare, and Organic Data: New Frontiers In Neuro-Rehabilitation

Making use of visual display technology and human-robotic interfaces, many researchers have illustrated various opportunities to distort visual and physical realities. We have had success with…

From  Kathryn Gentilello A month ago 4 views 0  

Ryan Diestelhorst - The Future of Computer-Aided Engineering

New advancements in cloud computing and machine learning have created an opportunity for a revolutionary advancement in how hardware engineering is performed. In this talk, Ryan Diestelhorst will…

From  Kathryn Gentilello A month ago 7 views 0  

Sam Kean - The Periodic Table: A Treasure Trove of Passion, Adventure, Betrayal, and Obsession

Why did Gandhi hate iodine? Why did the Japanese kill Godzilla with missiles made of cadmium? How did radium nearly ruin Marie Curie’s reputation? And why did tellurium lead to the most bizarre…

From  Kathryn Gentilello A month ago 7 views 0  

Frederick Benaben - An AI Framework Used in Crisis Management and Decision Making

Model-Driven Engineering (MDE) is meant, above other usages mainly in software design, to support the process of system design, especially the transitions and the coherency between models of…

From  Kathryn Gentilello A month ago 13 views 0  

Ashwin Swaminathan - Perception at Magic Leap

This talk presents the importance of Computer Vision and Deep learning techniques in making Magic Leap an effective spatial computing platform. The four fundamental modalities are introduced: head…

From  Kathryn Gentilello A month ago 14 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello A month ago 8 views 0  

Rachel Patzer - Epidemiology & Population Health

This talk will discuss the principles of epidemiologic thinking and a foundation for population health sciences. Basic epidemiologic concepts including how best to answer a scientific question,…

From  Kathryn Gentilello A month ago 1 views 0  

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello A month ago 10 views 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello A month ago 4 views 0  

Tohid Shekari - LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid

Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…

From  Kathryn Gentilello A month ago 4 views 0  

Evan Downing - MLsploit

Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…

From  Kathryn Gentilello A month ago 3 views 0  

Cybersecurity Demo Day Welcome and Meet the Judges

Welcome by Dr. Michael Farrell Meet the Judges: Blake Patton, Tech Square Ventures John Schanz, TDF Ventures Rich Telljohann, IBM Security

From  Kathryn Gentilello A month ago 3 views 0  

Oded Green - Scalable Graph Analytics on GPU Accelerators

Sparse data computations are ubiquitous in science and engineering. Two widely used applications requiring sparse data computations are graph algorithms and linear algebra operations such as Sparse…

From  Kathryn Gentilello 2 Months ago 3 views 0  

John Preskill - Quantum Computing and the Entanglement Frontier

The quantum laws governing atoms and other tiny objects seem to defy common sense, and information encoded in quantum systems has weird properties that baffle our feeble human minds. John Preskill…

From  Kathryn Gentilello 2 Months ago 13 views 0  

James L. McClelland - Integrating New Knowledge into a Neural Network without Catastrophic Interference: Computational and Theoretical Investigations in a Hierarchically Structured Environment

According to complementary learning systems theory, integrating new memories into a multi-layer neural network without interfering with what is already known depends on interleaving presentation of…

From  Kathryn Gentilello 2 Months ago 6 views 0