Theme Selector
Filter by
No Results Found, Please Adjust Your Search
ai
Autonomous Timeline Analysis and Threat Hunting
DEF CON 33 2025
ai
FACADE High-Precision Insider Threat Detection Using Contrastive Learning
BH25 2025
ai
Autonomous Timeline Analysis and Threat Hunting
BH25 2025
AI
Toward Secure & Trustworthy AI: Independent Benchmarking
InCyber Forum 2025
AI
AI for Cybersecurity: Get Started Today
Sectember AI 2024
AI
AI Security: Top 5 Recommendations To Get Started Today
DevFest 2024
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
AI
RETSim: Resilient and Efficient Text Similarity
ICLR 2024
AI
Lessons Learned from Developing Secure AI Workflows at Google
RSA 2024
AI
How Large Language Models Are Reshaping the Cybersecurity Landscape
RSA 2024
AI
RETVec: Resilient and Efficient Text Vectorizer
NeurIPS 2023
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
RSA 2022
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
WAC 2021
security
Spotlight: Malware Lead Generation At Scale
ACSAC 2020
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Defcon & BH 2020
security
Malicious Documents Emerging Trends: A Gmail Perspective
RSA 2020
cryptography
A Hacker Guide To Deep Learning Based Side Channel Attacks
Defcon 2019
ai
Rethinking the detection of child sexual abuse imagery on the Internet
WWW 2019
ai
Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans
IO 2019
ai
Rethinking how to detect child sexual abuse imagery on the Internet
Enigma 2019
ai
Attacks against machine learning — an overview
May 2018
ai
How to handle mistakes while using AI to block attacks
Apr 2018
ai
Challenges faced while training an AI to combat abuse
Apr 2018
ai
Why AI is the key to robust anti-abuse defenses
Apr 2018
ai
How to successfully harness AI to combat fraud and abuse
RSA 2018