Event Category: In-house Presentation

Network-Layer attacks in Blockchain Systems

In this talk, I will introduce some topics from my current research on the design of cryptocurrency networks and the...

Read more arrow_right_alt

From Source to Fragmentation: Unveiling Supply Chain Dynamics and OEM Customizations in Android TLS Stack

The Android ecosystem’s open-source nature allows Original Equipment Manufacturers (OEMs) to tailor the platform to their specific needs, resulting in...

Read more arrow_right_alt

Exploring and Building Digital Twins for Quantum Key Distribution Networks

Quantum Key Distribution (QKD) networks, which use the principles of Quantum Mechanics to securely distribute cryptographic keys to remote entities,...

Read more arrow_right_alt

Caught Between Feeling Lucky and Abusing Free Returns: How to Bootstrap Data Marketplaces

Data is the fuel of AI systems, meant to have a profound impact on society and the economy. However, bootstrapping...

Read more arrow_right_alt

A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums

To date, most analysis of collaboration between malware authors has been performed on meta-data and compiled binaries, while ignoring artifacts...

Read more arrow_right_alt

I love pinapple on pizza! = I hate pinapple on pizza: Stance-Aware Sentence Transformers for Opinion Mining

Sentence transformers’ job is to convert pieces of text into embedded vectors, where similar (dissimilar) pieces of text have spatially...

Read more arrow_right_alt

Characterizing, Modeling and Exploiting the Mobile Demand Footprint of Large Public Protests

Smartphones and mobile applications are staple tools in the operation of current-age public demonstrations, where they support organizers and participants...

Read more arrow_right_alt

FedQV: Leveraging Quadratic Voting in Federated Learning

Federated Learning (FL) permits different parties to collaboratively train a global model without disclosing their respective local labels. A crucial...

Read more arrow_right_alt

Sustainable Provision of URLLC Services for V2N: Analysis and Optimal Configuration

The rising popularity of Vehicle-to-Network (V2N) applications is driven by the Ultra-Reliable Low-Latency Communications (URLLC) service offered by 5G. The...

Read more arrow_right_alt

Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis

The Metaverse is a virtual world that is becoming increasingly popular. Recent technological advances, such as head-mounted displays and novel...

Read more arrow_right_alt

Archives

Categories