Event Category: In-house Presentation

Beyond the Veil of Reality: Unraveling the world of the Multiple dimensions

“Have you ever felt that our three-dimensional world is only the tip of the iceberg and there exists a much...

Read more arrow_right_alt

The Trials and Tribulations of Open RAN Deployment!

Open Interfaces are good for innovation, diversity and competition. I will talk about the merits of Open RAN, the O-RAN...

Read more arrow_right_alt

Explaining AI Decisions in Telecom: Leveraging LLMs for Clear and Actionable Insights

AI-driven solutions are transforming telecommunications, but their lack of transparency makes them hard to trust. While XAI techniques help explain...

Read more arrow_right_alt

Machine Learning for FPGAs accelerators

Machine learning, and especially deep learning, are techniques that are truly computationally demanding. This issue becomes even more critical when...

Read more arrow_right_alt

Setchain Algorithms for Blockchain Scalability

In this talk, I will discuss our current research on Blockchain scalability using Setchain Data-type. Blockchain scalability has been a...

Read more arrow_right_alt

Network-Layer attacks in Blockchain Systems

In this talk, I will introduce some topics from my current research on the design of cryptocurrency networks and the...

Read more arrow_right_alt

From Source to Fragmentation: Unveiling Supply Chain Dynamics and OEM Customizations in Android TLS Stack

The Android ecosystem’s open-source nature allows Original Equipment Manufacturers (OEMs) to tailor the platform to their specific needs, resulting in...

Read more arrow_right_alt

Exploring and Building Digital Twins for Quantum Key Distribution Networks

Quantum Key Distribution (QKD) networks, which use the principles of Quantum Mechanics to securely distribute cryptographic keys to remote entities,...

Read more arrow_right_alt

Caught Between Feeling Lucky and Abusing Free Returns: How to Bootstrap Data Marketplaces

Data is the fuel of AI systems, meant to have a profound impact on society and the economy. However, bootstrapping...

Read more arrow_right_alt

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

To date, most analysis of collaboration between malware authors has been performed on meta-data and compiled binaries, while ignoring artifacts...

Read more arrow_right_alt

Archives

Categories