Efficient Classification of Encrypted Traffic with Limited Labels Using Generative Adversarial Ne...
A Seminar on "Efficient Classification of Encrypted Traffic with Limited Labels Using Generative Adversarial Networks (GAN)"
-cropped.jpg?sfvrsn=2aa39c3e_1)
Quantum Elastodynamics: from Theory to AI Materials Design
A Seminar on "Quantum Elastodynamics: from Theory to AI Materials Design"

Agile Software Process Scaling and Management Model (ASPSMM) for Global Software Development
A Seminar on "Agile Software Process Scaling and Management Model (ASPSMM) for Global Software Development"
-for-global-software-development-banner.jpg?sfvrsn=98b3f222_1)
Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks ...
A Seminar on "Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS"

Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks
A Seminar on "Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks"

Information Scrambling and the Learning Landscape of A Quantum Machine Learning Algorithm
A webinar on "Information Scrambling and the Learning Landscape of A Quantum Machine Learning Algorithm"

Applications of Quantum Algorithms
A seminar on "Applications of Quantum Algorithms"

KFUPM Quantum Computing Workshop by Quantinuum
A workshop on "KFUPM Quantum Computing Workshop by Quantinuum"

PASQAL Quantum Computing from Hardware to Application
A workshop on "PASQAL Quantum Computing from Hardware to Application"

Embedded System Security Assurance: Unveiling Vulnerabilities through Side-Channel Analysis and F...
A workshop on "Embedded System Security Assurance: Unveiling Vulnerabilities through Side-Channel Analysis and Fault Injection"

Towards Portable Atomic Quantum Technologies via Additive Manufacturing
A seminar on "Towards Portable Atomic Quantum Technologies via Additive Manufacturing"
bfc13c29-ad17-40ad-bd30-7f7f87837caa.png?sfvrsn=e629e803_1)
Enabling Emerging Edge and IoT Applications with Edge-Cloud Data Management
A webinar on "Enabling Emerging Edge and IoT Applications with Edge-Cloud Data Management"

Offensive vs Defense AI-Powered Obfuscated Malware
A seminar on "Offensive vs Defense AI-Powered Obfuscated Malware"

The Race Toward Quantum Computing
A seminar on "The Race Toward Quantum Computing"

In the intersection of ML and wireless communication: “Communicate to learn” and “Learn to commun...
A Seminar on "In the intersection of ML and wireless communication: “Communicate to learn” and “Learn to communicate”"

Investigating Surface Treatments for Mitigating Coherent Loss in Superconducting Quantum Circuit
A seminar on "Investigating Surface Treatments for Mitigating Coherent Loss in Superconducting Quantum Circuit"

Introduction to Partially Observable Markov Decision Process
A workshop on "Introduction to Partially Observable Markov Decision Process"

ShadowMove: A Stealthy Lateral Movement Strategy
A webinar on "ShadowMove: A Stealthy Lateral Movement Strategy"

Challenges and Opportunities in NIST Post-Quantum Cryptography Standardization Process
A webinar on "Challenges and Opportunities in NISTPost-Quantum CryptographyStandardization Process"

Software Security Engineering: Challenges and Opportunities
A seminar on "Software Security Engineering: Challenges and Opportunities"

The Role of Facial Expression in Personal Identity Detection
A seminar on "The Role of Facial Expression in Personal Identity Detection"

An Internet of Secure and Private Things: A Service-Oriented Architecture
A seminar on "An Internet of Secure and Private Things: A Service-Oriented Architecture"

WormHex: A Volatile Memory Analysis Tool for Retrieval of Social Media Evidence
A Workshop on "WormHex: A Volatile Memory Analysis Tool for Retrieval of Social Media Evidence" (Presented in BlackHatME 2022)

Test Case Prioritization in DevOps using Machine Learning
A seminar on "Test Case Prioritization in DevOps using Machine Learning "

Performance and Security Constraints for CPS and IoT
A webinar on "Performance and Security Constraints for CPS and IoT"

Emerging Biometric Authentication Techniques
A webinar on "Emerging Biometric Authentication Techniques"

Artificial Intelligence Driven Security, Reliability, and Dependability of Cyber-Physical Systems
A webinar on "Artificial Intelligence Driven Security, Reliability, and Dependability of Cyber-Physical Systems"

ICS Cybersecurity Workshop with Saudi Aramco
A workshop organized by IRC-ISS for cybersecurity students delivered by Saudi Aramco.

How to Preserve Privacy in Learning?
A webinar on "How to Preserve Privacy in Learning?"

Quantum Information and Computing: Fundamentals and Applications
A webinar on "Quantum Information and Computing: Fundamentals and Applications"

Age of Information: A New Performance Metric for IoT-based Applications
A seminar on Age of Information: A New Performance Metric for IoT-based Applications
