Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks
A Seminar on "Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks"
Information Scrambling and the Learning Landscape of A Quantum Machine Learning Algorithm
A webinar on "Information Scrambling and the Learning Landscape of A Quantum Machine Learning Algorithm"
Applications of Quantum Algorithms
A seminar on "Applications of Quantum Algorithms"
KFUPM Quantum Computing Workshop by Quantinuum
A workshop on "KFUPM Quantum Computing Workshop by Quantinuum"
PASQAL Quantum Computing from Hardware to Application
A workshop on "PASQAL Quantum Computing from Hardware to Application"
Embedded System Security Assurance: Unveiling Vulnerabilities through Side-Channel Analysis and F...
A workshop on "Embedded System Security Assurance: Unveiling Vulnerabilities through Side-Channel Analysis and Fault Injection"
Towards Portable Atomic Quantum Technologies via Additive Manufacturing
A seminar on "Towards Portable Atomic Quantum Technologies via Additive Manufacturing"
Enabling Emerging Edge and IoT Applications with Edge-Cloud Data Management
A webinar on "Enabling Emerging Edge and IoT Applications with Edge-Cloud Data Management"
Offensive vs Defense AI-Powered Obfuscated Malware
A seminar on "Offensive vs Defense AI-Powered Obfuscated Malware"
The Race Toward Quantum Computing
A seminar on "The Race Toward Quantum Computing"
In the intersection of ML and wireless communication: “Communicate to learn” and “Learn to commun...
A Seminar on "In the intersection of ML and wireless communication: “Communicate to learn” and “Learn to communicate”"
Investigating Surface Treatments for Mitigating Coherent Loss in Superconducting Quantum Circuit
A seminar on "Investigating Surface Treatments for Mitigating Coherent Loss in Superconducting Quantum Circuit"
Introduction to Partially Observable Markov Decision Process
A workshop on "Introduction to Partially Observable Markov Decision Process"
ShadowMove: A Stealthy Lateral Movement Strategy
A webinar on "ShadowMove: A Stealthy Lateral Movement Strategy"
Challenges and Opportunities in NIST Post-Quantum Cryptography Standardization Process
A webinar on "Challenges and Opportunities in NISTPost-Quantum CryptographyStandardization Process"
Software Security Engineering: Challenges and Opportunities
A seminar on "Software Security Engineering: Challenges and Opportunities"
The Role of Facial Expression in Personal Identity Detection
A seminar on "The Role of Facial Expression in Personal Identity Detection"
An Internet of Secure and Private Things: A Service-Oriented Architecture
A seminar on "An Internet of Secure and Private Things: A Service-Oriented Architecture"
WormHex: A Volatile Memory Analysis Tool for Retrieval of Social Media Evidence
A Workshop on "WormHex: A Volatile Memory Analysis Tool for Retrieval of Social Media Evidence" (Presented in BlackHatME 2022)
Test Case Prioritization in DevOps using Machine Learning
A seminar on "Test Case Prioritization in DevOps using Machine Learning "
Performance and Security Constraints for CPS and IoT
A webinar on "Performance and Security Constraints for CPS and IoT"
Emerging Biometric Authentication Techniques
A webinar on "Emerging Biometric Authentication Techniques"
Artificial Intelligence Driven Security, Reliability, and Dependability of Cyber-Physical Systems
A webinar on "Artificial Intelligence Driven Security, Reliability, and Dependability of Cyber-Physical Systems"
ICS Cybersecurity Workshop with Saudi Aramco
A workshop organized by IRC-ISS for cybersecurity students delivered by Saudi Aramco.
How to Preserve Privacy in Learning?
A webinar on "How to Preserve Privacy in Learning?"
Quantum Information and Computing: Fundamentals and Applications
A webinar on "Quantum Information and Computing: Fundamentals and Applications"
Age of Information: A New Performance Metric for IoT-based Applications
A seminar on Age of Information: A New Performance Metric for IoT-based Applications