Workshops

Hacking Deep Learning 2

Cryptopraphy for Privacy- Preserving Machine Learning

Speaker: Morten Dahl
Hacking Deep Learning 2

Learning with Perturbations

Speaker: Tamir Hazan
Hacking Deep Learning 2

Privacy-Preserving Data Analysis:Proofs,Algorithms,and Systems

Speaker: Adria Gascon
Hacking Deep Learning 2

Tutorial on Adversrial Machine Learning

Speaker: Battista Biggio

Alternative cryptocurrencies

Speaker: Dziembowski S

Alternative Cryptocurrencies (cont.)

Speaker: Dziembowski S

Automated Analysis of TLS 1.3

Speaker: Van der Merwe T

Deep Learning in the Land of Adversity: Attacks, Defenses and Beyond

Speaker: Moustapha Cisse

DeepCAPTCHA- Protection Mechanisms Based on Adversarial Example

Speaker: Rita Osadchy

Differential Privacy and Collaborative Learning

Speaker: Anand Sarwate

DROWN: Breaking TLS using SSLv2

Speaker: Aviram N

Introduction

Speaker: Dziembowski S

Introduction (cont.)

Speaker: Dziembowski S

Mining Pools and Attacks

Speaker: Dziembowski S

Mining Pools and Attacks (cont.)

Speaker: Dziembowski S

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Speaker: Jager T

On the Security of TLS-DHE in the Standard Model

Speaker: Jager T

Security and Privacy in Machine Learning

Speaker: Nicolas Papernot

Smart contracts and applications

Speaker: Dziembowski S

Smart Contracts and Applications (cont.)

Speaker: Dziembowski S

TLS: Past , Present , Future

Speaker: Van Der Merwe T

What is in the Human Voice? Profiling Humans from Their Voice

Speaker: Rita Singh