|
Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…
name
Elie Khoury Date
April 2nd, 2021
|
|
This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…
name
Tianxin Tang Date
March 26th, 2021
|
|
Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…
name
Ambrose Kam Date
March 19th, 2021
|
|
The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…
name
Hany Farid Date
March 12th, 2021
|
|
name
Harri Hursti Date
March 5th, 2021
|
|
Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…
name
Yuliia Lut Date
February 26th, 2021
|
|
To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…
name
Beliz Kaleli Date
February 12th, 2021
|
|
name
Phani Vadrevu Date
January 29th, 2021
|
|
Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…
name
David Heath Date
February 5th, 2021
|
|
In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…
name
Lefteris Anastasopoulos Date
January 15th, 2021
|
|
Privacy is a multi-faceted challenge for organizations – to be successful, they must take a holistic approach to protecting the personal data and information of all stakeholders. Privacy…
name
Evan Wm Glover Date
November 20th, 2020
|
|
5G NR mmWave opens doors to vast amounts of network capacity, fiber-like speeds and ultra-low latencies that promise to bring new and enhanced experiences to the masses, as well as inherent security…
name
Henry Tong, Larry LaMont Date
October 23rd, 2020
|
|
Cloud FPGAs have been gaining popularity in recent years due to the ability of users to request FPGA resources quickly, flexibly, and on-demand. However, as public cloud providers make FPGAs…
name
Jakub Szefer Date
November 13th, 2020
|
|
name
Youngwook Do Date
November 6th, 2020
|
|
The rapid growth of online advertising has fueled the growth of ad-blocking software, such as new ad-blocking and privacy-oriented browsers or browser extensions. In response, both ad publishers and…
name
Karthika Subramani Date
October 30th, 2020
|
|
Attack surface reduction through the removal of unnecessary application features and code is a promising technique for improving security without incurring any additional overhead. Recent software…
name
Seyedhamed Ghavamnia Date
October 16th, 2020
|