Event Category: External Presentation (External Speaker)

SGD on Distributed Systems

Deep learning is booming thanks to enormous datasets with very large models, and the widespread availability of supercomputing via GPUs....

Read more arrow_right_alt

On Three Research Problems

In this talk, I will present applications of the communication theory framework to three research problems. The first is a...

Read more arrow_right_alt

Overview of Adversarial Machine Learning (AML) with Applications to Network Anomaly Detection (NAD)

In this talk, we will give an overview of “adversarial” attacks on deep learning, generally known as adversarial machine learning...

Read more arrow_right_alt

The hardware and software design for a Cyber-IoT-Physical system

Recently, there has been an enormous interest in Internet of Things (IoT) systems, and a large deployment of IoT systems...

Read more arrow_right_alt

Tackling the Energy Asymmetry between Sensing, Computation, and Communication in Wireless Embedded Systems

Wireless Embedded Systems have seen tremendous growth with a vast number of deployed devices, with their numbers continuing to increase...

Read more arrow_right_alt

Roundabouts as Switches: Synchro [& Turbo] Roundabouts with Rotating Priority Sectors (STYROPS) for High-Capacity, Safe, and Sustainable Roundabouts

We look at roundabouts as synchronous car multiplexers to overcome the current limitations of roundabouts in capacity, safety, and energy...

Read more arrow_right_alt

How to Protect Software through Patents and Trade Secrets

Computer programs may be protected by patents if they meet requirements that vary from one jurisdiction to another. We will...

Read more arrow_right_alt

Reassessing User Privacy in a Hyperconnected Internet

In this talk, I will present my research on investigating and assessing the state of user privacy in a rapidly...

Read more arrow_right_alt

When criminals are mastering the Internet: emerging threats and challenges

Cyber-dependent crimes have rocketed in recent years. Illicit services, knowledge and tools are a commodity exchanged in anonymous online markets....

Read more arrow_right_alt

Age of Information: Analysis and Optimization

Remote monitoring of an information source (or a process of interest) is inherent to emerging applications in various domains including...

Read more arrow_right_alt