Theme Selector
Explore
Recent all
Recent
Cybersecurity
DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement
ACSAC 2025
ai
Autonomous Timeline Analysis and Threat Hunting
DEF CON 33 2025
ai
FACADE High-Precision Insider Threat Detection Using Contrastive Learning
BH25 2025
ai
Autonomous Timeline Analysis and Threat Hunting
BH25 2025
AI
Toward Secure & Trustworthy AI: Independent Benchmarking
InCyber Forum 2025
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
user experience
Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google
CHI 2024
ai
Wingardium Trivia-osa! On-Device Sorting Hatbot Powered by Gemma, Ollama, USearch, and RETSim
May 2024
AI
RETSim: Resilient and Efficient Text Similarity
ICLR 2024
ai
On the consequences of the AI workforce entering the market
Jun 2023
how-to
Stay safe online in 10 easy steps
Aug 2021
Magic
3 million smiles during the pandemic - the retrospective
Jul 2021
ai
Wingardium Trivia-osa! On-Device Sorting Hatbot Powered by Gemma, Ollama, USearch, and RETSim
May 2024
ai
On the consequences of the AI workforce entering the market
Jun 2023
how-to
Stay safe online in 10 easy steps
Aug 2021
Magic
3 million smiles during the pandemic - the retrospective
Jul 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Jun 2021
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
web
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
user experience
Understanding the online safety and privacy challenges faced by South Asian women
Jun 2019
security
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
security
Account security - a divided user perception
Feb 2019
security
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
web
Quantifying the impact of the Twitter fake accounts purge - a technical analysis
Aug 2018
Cybersecurity
DROIDCCT: Cryptographic Compliance Test via Trillion-Scale Measurement
ACSAC 2025
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
user experience
Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google
CHI 2024
AI
RETSim: Resilient and Efficient Text Similarity
ICLR 2024
AI
RETVec: Resilient and Efficient Text Vectorizer
NeurIPS 2023
cryptography
Hybrid Post-Quantum Signatures in Hardware Security Keys
ACNS 2023
user experience
It's common and a part of being a content creator: Understanding How Creators Experience and Cope with Hate and Harassment Online
CHI 2022
cybersecurity
Designing Toxic Content Classification for a Diversity of Perspectives
SOUPS 2021
cybersecurity
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
S&P 2021
cybersecurity
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
IMC 2020
cybersecurity
Why wouldn't someone think of democracy as a target? Security practices & challenges of people involved with U.S. political campaigns"
Usenix Security 2021
security
Spotlight: Malware Lead Generation At Scale
ACSAC 2020
ai
Autonomous Timeline Analysis and Threat Hunting
DEF CON 33 2025
ai
FACADE High-Precision Insider Threat Detection Using Contrastive Learning
BH25 2025
ai
Autonomous Timeline Analysis and Threat Hunting
BH25 2025
AI
Toward Secure & Trustworthy AI: Independent Benchmarking
InCyber Forum 2025
AI
AI for Cybersecurity: Get Started Today
Sectember AI 2024
AI
AI Security: Top 5 Recommendations To Get Started Today
DevFest 2024
AI
Lessons Learned from Developing Secure AI Workflows at Google
RSA 2024
AI
How Large Language Models Are Reshaping the Cybersecurity Landscape
RSA 2024
cybersecurity
How AI helps keeping Gmail inboxes malware free
FIC 2023
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
RSA 2022
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
WAC 2021
security
Account protections - A Google Perspective
FIC 2020