Search for tag: "institute"

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A month ago 20 views 0  

James L. Patton - Deception, ExoNets, SmushWare, and Organic Data: New Frontiers In Neuro-Rehabilitation

Making use of visual display technology and human-robotic interfaces, many researchers have illustrated various opportunities to distort visual and physical realities. We have had success with…

From  Kathryn Gentilello A month ago 4 views 0  

Ryan Diestelhorst - The Future of Computer-Aided Engineering

New advancements in cloud computing and machine learning have created an opportunity for a revolutionary advancement in how hardware engineering is performed. In this talk, Ryan Diestelhorst will…

From  Kathryn Gentilello A month ago 7 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello A month ago 8 views 0  

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello A month ago 10 views 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello A month ago 4 views 0