Search for tag: "lecture"

Wenshan Cai - Field- and Carrier-Facilitated Nonlinear Nano-Optics

Engineered photonic nanostructures offer the exciting potential to create customized nonlinear optical media with tailored high-order effects, which are essential to the active control of light and…

From  Katie Gentilello on September 16th, 2021 0 plays 0  

Kevin Hutto - Sensing with Random Encoding for Enhanced Security in Embedded Systems

Embedded systems in physically insecure environments are subject to additional security risk via capture by an adversary. A captured microchip device can be reverse engineered to recover internal…

From  Katie Gentilello on May 7th, 2021 60 plays 0  

Kennon Bittick - Function Equivalence with Symbolic Execution

Summarizing and comparing basic blocks or functions across different binaries or between binary and source code has many applications for program verification including verifying compilation, source…

From  Katie Gentilello on May 6th, 2021 12 plays 0  

Andrew N. Cleland - Microelectromechanical Devices in the Quantum Limit

Recent advances in quantum technology and hardware have advanced MEMS systems to where these can now be designed and operated in the quantum regime, albeit using sophisticated quantum methods to…

From  Katie Gentilello on May 5th, 2021 2 plays 0  

Elie Khoury - Voice Biometrics and Emerging Security Threats in the Voice Channel

Voice Biometrics is the automated recognition of individuals based on their voice characteristics that are both biological and behavioral. Voice Biometrics is currently deployed in many real world…

From  Katie Gentilello on April 9th, 2021 17 plays 0  

Tianxin Tang - Provably-Secure Approximate k-NN Search Protocol

This talk examines the problem of privacy-preserving approximate kNN search in an outsourced environment — the client sends the encrypted data to an untrusted server and later can perform…

From  Katie Gentilello on April 1st, 2021 15 plays 0  

Ambrose Kam - Applying Deep Reinforcement Learning (DRL) in a Cyber Wargaming Engine

Cybersecurity is inherently complicated due to the dynamic nature of the threats and ever-expanding attack surfaces. Ironically, this challenge is exacerbated by the rapid advancement of many new…

From  Katie Gentilello on April 1st, 2021 22 plays 0  

Gary Fedder - What’s so Hard About Soft Interconnects?

Skin wearables are a compelling concept as an extension of today’s commercial wearables, having broad applications in health monitoring, as sensory and haptic interfaces, and even for…

From  Katie Gentilello on March 30th, 2021 1 plays 0  

Hany Farid - Creating, Weaponizing, and Detecting Deep Fakes

The past few years have seen a startling and troubling rise in the fake-news phenomena in which everyone from individuals to nation-sponsored entities can produce and distribute misinformation. The…

From  Katie Gentilello on March 30th, 2021 16 plays 0  

Harri Hursti - War By Other Means

From  Katie Gentilello on March 11th, 2021 16 plays 0  

Yuliia Lut - Recent Insights from Analysis of Users' Web Browsing Behavior

Accurately analyzing and modeling online browsing behavior plays a key role in understanding users and technology interactions. Specifically, understanding whether users have correct perceptions of…

From  Katie Gentilello on March 3rd, 2021 15 plays 0  

Beliz Kaleli - To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media

To make their services more user friendly, online social media platforms automatically identify text that corresponds to URLs and render it as clickable links. In this paper, we show that the…

From  Katie Gentilello on February 21st, 2021 10 plays 0  

David Heath - Zero Knowledge for Everything and Everyone

Zero-Knowledge (ZK) Proofs are important cryptographic objects that allow an untrusted prover to demonstrate to an untrusted verifier the truth of some statement while revealing nothing additional.…

From  Katie Gentilello on February 10th, 2021 33 plays 0  

Lefteris Anastasopoulos - Securing Democracy in the Fourth Industrial Revolution

In this talk I discuss research which focuses on designing systems needed to secure democracy and democratic political institutions, such as elections, in the interconnected digital world of the…

From  Katie Gentilello on January 23rd, 2021 26 plays 0