In this talk, we will give an overview of “adversarial” attacks on deep learning, generally known as adversarial machine learning...
Read more arrow_right_altRecently, there has been an enormous interest in Internet of Things (IoT) systems, and a large deployment of IoT systems...
Read more arrow_right_altWireless Embedded Systems have seen tremendous growth with a vast number of deployed devices, with their numbers continuing to increase...
Read more arrow_right_altWe look at roundabouts as synchronous car multiplexers to overcome the current limitations of roundabouts in capacity, safety, and energy...
Read more arrow_right_altComputer programs may be protected by patents if they meet requirements that vary from one jurisdiction to another. We will...
Read more arrow_right_altIn this talk, I will present my research on investigating and assessing the state of user privacy in a rapidly...
Read more arrow_right_altCyber-dependent crimes have rocketed in recent years. Illicit services, knowledge and tools are a commodity exchanged in anonymous online markets....
Read more arrow_right_altRemote monitoring of an information source (or a process of interest) is inherent to emerging applications in various domains including...
Read more arrow_right_altThe Web consists of numerous Web communities, news sources, and services, which are often exploited by various entities for the...
Read more arrow_right_altIn this seminar, one of the members of our Alumni Network, Dr. Elli Zavou, will take stock of her experience...
Read more arrow_right_alt
Recent Comments