Archive |

ASSET Seminar: Machine Learning: A Data-Centric Perspective, Aleksander Madry (Massachusetts Institute of Technology)

ABSTRACT: The training data that modern machine learning models ingest has a major impact on these models’ performance (as well as failures). Yet, this impact tends to be neither fully […]

ASSET Seminar: Lockout: Sparse Regularization of Neural Networks, Gilmer Valdes (UCSF)

ABSTRACT: Many regression and classification procedures fit a function f(x;w) of predictor variables x to data 〖{x_i,y_i}〗_1^N based on some loss criterion L(y,f(x;w)). Often, regularization is applied to improve accuracy […]

CIS Seminar: “Cryptography, Security, and Law”

My research focuses on the security, privacy, and transparency of technologies in societal and legal context. My talk will focus on three of my recent works in this space, relating […]

CIS Seminar: “Secure Computation with Minimal Interaction”

In the current digital and decentralized world, there is an imminent need for technologies that can provide a fast approach to compute on private data while guaranteeing secrecy. Secure Multiparty […]

CIS Seminar: “Birds of a Feather Flock Together: How Homophily Leads to Segregation, Inequality, and Inefficiency and What We Can Do About It”

Humans exhibit a strong tendency to associate with those similar to them. This tendency, termed homophily in the social sciences, impacts both the structure of society and its outcomes. In […]

CIS Seminar: “Methods of Data Lookup with Hashing”

We will discuss methods of data lookup, with a focus on hash sets / tables, including motivation, properties, and variants. This will be in the context of a “CS 2” […]

CIS Seminar: “Rethinking System Design for Expressive Cryptography”

Expressive cryptography, including Secure Multi-Party Computation (SMPC) and Fully Homomorphic Encryption (FHE), has the potential to enable transformative new applications, drawing significant interest from industry. Unfortunately, it is often slow […]

CIS Seminar: “Software Security Challenges in the Era of Modern Hardware”

Today’s hardware cannot keep secrets. Indeed, the past two decades have seen the discovery of a slew of attacks where an adversary exploits hardware features to leak software’s sensitive data. These attacks […]

CIS Seminar: “Proofs, Cryptography and Quantum Information”

Many cryptographic protocols will be rendered insecure if sufficiently powerful quantum computers are built. While this remains at least a few decades away, there is another, more immediate, problem: many […]

Joseph Bordogna Forum: Dr. Gary May, Chancellor of UC-Davis

Please save the date to join us for this annual distinguished lecture.  The Joseph Bordogna Forum will foster conversation and debate regarding important issues at the nexus of technology and […]

Pages 1 7 8 9 10 11 26
Archive |