Search for tag: "quantum information science"

Simson L. Garfinkel - Attacking and Protecting Public Data with Differential Privacy

Publishing exact statistical data creates mathematical risks and vulnerabilities that have only recently been appreciated. In 2010, the U.S. Census Bureau collected information on more than 308…

From  Kathryn Gentilello A week ago 13 views 0  

Sam Kean - The Periodic Table: A Treasure Trove of Passion, Adventure, Betrayal, and Obsession

Why did Gandhi hate iodine? Why did the Japanese kill Godzilla with missiles made of cadmium? How did radium nearly ruin Marie Curie’s reputation? And why did tellurium lead to the most bizarre…

From  Kathryn Gentilello 2 Weeks ago 7 views 0  

Tohid Shekari - RFDIDS: Radio Frequency-based Distributed Intrusion Detection System for the Power Grid

Recently, the number of cyber threats to power systems has increased at an unprecedented rate. For instance, the widespread blackout in Ukrainian power grid on December 2015 was a wakeup call that…

From  Kathryn Gentilello 2 Weeks ago 3 views 0  

Cybersecurity Demo Day Awards

A School of Computer Science team won the Institute for Information Security and Privacy’s (IISP) Demo Day Finale for their work on making machine learning (ML) models more secure. The winning…

From  Kathryn Gentilello 3 Weeks ago 6 views 0  

Carter Yagemann - Justitia

Biometric authentication promises userconvenience by measuring what makes eachof us unique using just a smartphone. Thedownside includes risks such as criminalsimpersonating us with stolen data and…

From  Kathryn Gentilello 3 Weeks ago 2 views 0  

Tohid Shekari - LADIDS: Lightning-Authenticated Distributed Intrusion Detection System for the Power Grid

Recent events affecting power grids (such asthe Ukrainian blackout in 2015) have highlightedthe vulnerabilities in modern power systems,especially power substations which form thebackbone of…

From  Kathryn Gentilello 3 Weeks ago 3 views 0  

Evan Downing - MLsploit

Machine learning is at risk of being attacked.As companies continue to depend onmachine learning to solve their problems,more sophisticated attacks are being createdto undermine and take advantage of…

From  Kathryn Gentilello 3 Weeks ago 3 views 0  

Cybersecurity Demo Day Welcome and Meet the Judges

Welcome by Dr. Michael Farrell Meet the Judges: Blake Patton, Tech Square Ventures John Schanz, TDF Ventures Rich Telljohann, IBM Security

From  Kathryn Gentilello 3 Weeks ago 3 views 0  

Terry Nelms - Caller Authentication Using Mobile Devices

Verifying the identity claim of a caller is challenging to both enterprises and individuals. Blindly trusting the caller is not an option; however, building trust is difficult because the…

From  Kathryn Gentilello 4 Weeks ago 4 views 0  

2019 SBDH All Hands Meeting - Panel 3: Industry Panel

Beverly Wright, PhD. Chief Analytics Officer, RelationalAI. Venkat Kambalapally. Staff Vice President, Technology, Anthem, Inc. Robert Joseph, PhD. Director of Industrial Strategy, Stanley Black…

From  Kathryn Gentilello A month ago 2 views 0  

2019 SBDH All Hands Meeting - Cyber-Infrastructure and Social-Cybersecurity Working Groups

Cyber-Infrastructure Working Group: Niall Gaffney, PhD. Director of Data Intensive Computing, Office of Advanced Cyberinfrastructure / CISE. Texas Advanced Computing Center. Social-Cybersecurity…

From  Kathryn Gentilello A month ago 3 views 0  

2019 SBDH All Hands Meeting - Panel 2: Visionary Projects

Gari Clifford, PhD. Spoke PI, Large Scale Medical Informatics for Patient Care Coordination and Engagement. Emory University. Santiago Grijalva, PhD. Spoke Co-PI, Smart Grids Big Data. Georgia Tech.…

From  Kathryn Gentilello A month ago 3 views 0  

2019 SBDH All Hands Meeting - Panel 1: South Hub Priority Areas

Jay Aikat, PhD. Co-PI, South Big Data Regional Innovation Hub – University of North Carolina-Chapel Hill. David McDowell, PhD. Priority Area Representative Georgia Tech. Heather Bradley, PhD.…

From  Kathryn Gentilello A month ago 2 views 0  

Chaouki T. Abdallah, Srinivas Aluru, Stan Ahalt, Renata Rawlings-Goss - Welcome Remarks and South Hub Impacts and Opportunities

The SBDH All Hands meetings are organized to bring together the SBDH community in order to foster new and support existing data science collaborations, share best practices and resources for data and…

From  Kathryn Gentilello A month ago 4 views 0  

Shang-Tse Chen - AI-infused Security: Robust Defense by Bridging Theory and Practice

While Artificial Intelligence (AI) has tremendous potential as a defense against real-world cybersecurity threats, understanding the capabilities and robustness of AI remains a fundamental challenge,…

From  Kathryn Gentilello A month ago 12 views 0  

John Baez - Mathematical Mysteries of the Periodic Table

Why do atoms behave the way they do? Why do electrons form “shells,” as seen in the periodic table? Why does the first shell hold 2 electrons, the second 8, and the third 18: twice the…

From  Kathryn Gentilello A month ago 4 views 0