Search for tag: "della roy lecture"

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A month ago 21 views 0  

Ryan Diestelhorst - The Future of Computer-Aided Engineering

New advancements in cloud computing and machine learning have created an opportunity for a revolutionary advancement in how hardware engineering is performed. In this talk, Ryan Diestelhorst will…

From  Kathryn Gentilello A month ago 7 views 0  

Sam Kean - The Periodic Table: A Treasure Trove of Passion, Adventure, Betrayal, and Obsession

Why did Gandhi hate iodine? Why did the Japanese kill Godzilla with missiles made of cadmium? How did radium nearly ruin Marie Curie’s reputation? And why did tellurium lead to the most bizarre…

From  Kathryn Gentilello A month ago 7 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello A month ago 8 views 0  

John Preskill - Quantum Computing and the Entanglement Frontier

The quantum laws governing atoms and other tiny objects seem to defy common sense, and information encoded in quantum systems has weird properties that baffle our feeble human minds. John Preskill…

From  Kathryn Gentilello 2 Months ago 13 views 0  

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello 2 Months ago 4 views 0  

Alanson Sample - Reinventing the Physical Layer to Create Interactive Sensing and Computing Systems

Harnessing electromagnetic waves has changed how we live, work, and play. While the semiconductor industry has enabled faster, cheaper, and lower power wireless computing devices, there is the…

From  Kathryn Gentilello 2 Months ago 11 views 0  

Kira Barton - Advancements in Modeling, Sensing and Control for High-Resolution Additive Manufacturing

Additive manufacturing (AM) describes a class of processes that perform a layer-by-layer “bottom-up” fabrication approach as opposed to traditional top-down, subtractive fabrication such…

From  Kathryn Gentilello 2 Months ago 10 views 0  

Konstantin Batygin - Planet Nine From Outer Space

At the outskirts of the solar system, beyond the orbit of Neptune, lies an expansive field of icy debris known as the Kuiper belt. The orbits of the individual asteroid-like bodies within the Kuiper…

From  Kathryn Gentilello 2 Months ago 7 views 0  

Shimeng Yu - Neuro-Inspired Computing with Synaptic and Neuronal Devices

Neuro-inspired computing is a new computing paradigm that emulates the neural network for information processing. To enable the large-scale neuromorphic system, it is important to develop compact…

From  Kathryn Gentilello 2 Months ago 4 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello 2 Months ago 18 views 0  

John Baez - Mathematical Mysteries of the Periodic Table

Why do atoms behave the way they do? Why do electrons form “shells,” as seen in the periodic table? Why does the first shell hold 2 electrons, the second 8, and the third 18: twice the…

From  Kathryn Gentilello 2 Months ago 7 views 0  

Ron Gula - Grand Cyber Questions and How They Impact Cyber Start-ups

Ron Gula will discuss some of the harder questions in cyber we've not come to terms with such as quantifying cyber risk and the government's responsibility for keeping us "cyber…

From  Kathryn Gentilello 2 Months ago 11 views 0  

Jayakanth Ravichandran - Dimensional Control of Light-Matter Interaction in Perovskite Chalcogenides

Perovskite Chalcogenides are a new class of semiconductors which have tunable band gap in the visible to infrared part of the electromagnetic spectrum. Besides this band gap tunability, they offer a…

From  Kathryn Gentilello 2 Months ago 2 views 0  

Hanjun Dai - Adversarial Attack on Graph-Structured Data

Deep learning on graph structures has shown exciting results in cybersecurity applications, such as risk management, binary code similarity detection, etc. However, few attentions have been paid to…

From  Kathryn Gentilello 2 Months ago 21 views 0  

Johannes Schmidt-Hieber - Mathematics for Deep Neural Networks: Energy landscape and open problems (Lecture 5/5)

To derive a theory for gradient descent methods, it is important to have some understanding of the energy landscape. In this lecture, an overview of existing results is given. The second part of the…

From  Kathryn Gentilello 2 Months ago 25 views 0