Security and Privacy

Available Speakers and their Lectures on this Topic

Haider Abbas – Islamabad, Pakistan

Rizwan Ahmed – Nagpur, India

Mohammad Abdullah Al Faruque – Irvine, CA, USA

Mohammed M. Alani – Mississauga, ON, Canada

  • How can we trust AI in Cybersecurity?
    With the cybersecurity market exceeding 50USD billion, are organizations doing enough to stops the rapid increase in attacks? The trends and the success rates of the attacks suggest...
  • How safe is your AI application?
    The rapid growth in adopting artificial intelligence in different aspects of life has made it an interesting target to malicious actors. The growth in investments in artificial intelligence should...

Mehdi Bahrami – Santa Clara, CA, USA

Federico Cerutti – Brescia, Italy

Pin-Yu Chen – WHITE PLAINS, NY, USA

Betty H.C. Cheng – East Lansing, MI, USA

Aswani Kumar Cherukuri – Vellore, India

  • Exploring Blockchain Technology
    Blockchain is a distributed ledger technology that maintains verifiable records with protection against malicious modifications and with Byzantine fault tolerance.   This...

Kim-Kwang Raymond Choo – San Antonio, TX, USA

Ashutosh Dutta – Laurel, MD, USA

Josiah Dykstra – Severn, MD, USA

  • American Self-Defense in Cyberspace
    The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving...
  • Getting Started with Cybersecurity Science
    This talk offers an introduction for students and practitioners to the application of the scientific method to cybersecurity tools and systems. Creating, using, and evaluating cybersecurity tools...

Francesco Flammini – Västerås, Sweden

Domenic Forte – Gainesivlle, FL, USA

Swaroop Ghosh – State College, PA, USA

Gernot Heiser – Sydney, NSW, Australia

  • Making Trusted Systems Trustworthy
    We trust computer systems all the time: with our money, our sensitive private data, our critical infrastructure and, in the age of autonomous vehicles, increasingly with our lives. Yet...

Rasheed Hussain – Bristol, United Kingdom

Xiaohua Jia – Hong Kong, Hong Kong

  • Data Authorized Machine Learning and Unlearning
    Data ownership protection is an important task in machine learning (ML). However, it is always difficult to protect data owner’s right in the process of ML and the development of data-driven...

Latifur Rahman Khan – Plano, TX, USA

Weizhi Meng – Copenhagen, Denmark

David Mohaisen – Orlando, FL, USA

Corina Pasareanu – Sunnyvale, CA, USA

Junaid Qadir – Doha, Qatar

  • Secure and Robust Machine Learning for Healthcare
    Recent years have witnessed widespread adoption of machine learning (ML)/deep learning (DL) techniques due to their superior performance for a variety of healthcare applications ranging from the...

Danda B Rawat – Washington, DC, USA

RK Shyamasundar – Mumbai, India

Nicolas Sklavos – Patra, Greece

Yan Solihin – Orlando, FL, USA

Houbing Song – Baltimore, MD, USA

Daniel Takabi – ATLANTA, GA, USA

  • Secure Privacy preserving Machine Learning
    Deep learning with neural networks has become a highly popular machine learning method due to recent breakthroughs in computer vision, speech recognition, and other areas. However, the deep...

Salvador Elias Venegas-Andraca – Mexico City, Mexico

  • Cybersecurity and Quantum Computing
    Quantum technology is a multidisciplinary field of science and engineering in which physics, mathematics, computer science, and engineering meet with the goal of understanding how quantum...

Stefano Zanero – Milano, Italy