Upcoming Lectures

Integrating high-dimensional biological datasets to uncover disease-associated genes and gene networks

Speaker: Serdar Bozdag

“With the advances in high-throughput technologies in biology, numerous national and international consortiums have generated a vast amount of genotype, …

Read More
Photo of Dmitry Bestuzhev

2 Meters Down and Back: Hunting for most persistent implants

Speaker: Dmitry Bestuzhev

This presentation is about hunting UEFI implants and another undocumented “”features”” running on the Ring -2, gaining an eternal persistence …

Read More


Past Lectures

Jason Liu Portrait

Easy Breezy Python Simulation Using Simulus

Speaker: Jason Liu

Simulus is a full-fledged open-source discrete-event simulator, supporting both event-driven and process-oriented simulation world-views. It is implemented in Python with …

Read More

Spiral: Exploiting The Spam Correlations In Scalable Online Social Spam Detection

Speaker: Hailu Xu

Malicious URL links, fraudulent advertisements, faked reviews, and biased propaganda are bringing serious consequences for both virtual social networks and …

Read More

Reputation-aware Trajectory-based Data Mining in the Internet of Things (IoT)

Speaker: Samia Tasnim

Internet of Things (IoT) is a critically important technology for the acquisition of spatiotemporally dense data in diverse applications, ranging …

Read More

Trajectory Privacy Preservation and Lightweight Blockchain Techniques for Mobility-Centric IoT

Speaker: Abdur Rahman Bin Shahid

Various research efforts have been undertaken to solve the problem of trajectory privacy preservation in the Internet of Things (IoT) …

Read More

Inducing Stereotypical Character Roles via Clustering with Plot Information

Speaker: Labiba Jahan

If we are to understand stories, we must understand characters: characters are central to every narrative and drive the action …

Read More
Photo of Bruce Maggs

The Web PKI in Theory and Malpractice

Speaker: Bruce Maggs

The Public Key Infrastructure (PKI) for the web was designed to help thwart “phishing” attacks by providing a mechanism for …

Read More