theme image

ai

ai
profile
How Large Language Models Are Reshaping the Cybersecurity Landscape
AI

How Large Language Models Are Reshaping the Cybersecurity Landscape

Sectember AI 2024

Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
cryptography

Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning

CHES 2024

RETSim: Resilient and Efficient Text Similarity
AI

RETSim: Resilient and Efficient Text Similarity

ICLR 2024

Lessons Learned from Developing Secure AI Workflows at Google
AI

Lessons Learned from Developing Secure AI Workflows at Google

RSA 2024

How Large Language Models Are Reshaping the Cybersecurity Landscape
AI

How Large Language Models Are Reshaping the Cybersecurity Landscape

RSA 2024

RETVec: Resilient and Efficient Text Vectorizer
AI

RETVec: Resilient and Efficient Text Vectorizer

NeurIPS 2023

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
cybersecurity

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

RSA 2022

Deep-Cryptanalysis - Fashion or Revolution?
cybersecurity

Deep-Cryptanalysis - Fashion or Revolution?

WAC 2021

Spotlight: Malware Lead Generation At Scale
security

Spotlight: Malware Lead Generation At Scale

ACSAC 2020

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
cryptography

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

Defcon & BH 2020

Malicious Documents Emerging Trends: A Gmail Perspective
security

Malicious Documents Emerging Trends: A Gmail Perspective

RSA 2020

A Hacker Guide To Deep Learning Based Side Channel Attacks
cryptography

A Hacker Guide To Deep Learning Based Side Channel Attacks

Defcon 2019

Rethinking the detection of child sexual abuse imagery on the Internet
ai

Rethinking the detection of child sexual abuse imagery on the Internet

WWW 2019

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans
ai

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans

IO 2019

Rethinking how to detect child sexual abuse imagery on the Internet
ai

Rethinking how to detect child sexual abuse imagery on the Internet

Enigma 2019

Attacks against machine learning — an overview
ai

Attacks against machine learning — an overview

May 2018

How to handle mistakes while using AI to block attacks
ai

How to handle mistakes while using AI to block attacks

Apr 2018

Challenges faced while training an AI to combat abuse
ai

Challenges faced while training an AI to combat abuse

Apr 2018

Why AI is the key to robust anti-abuse defenses
ai

Why AI is the key to robust anti-abuse defenses

Apr 2018

How to successfully harness AI to combat fraud and abuse
ai

How to successfully harness AI to combat fraud and abuse

RSA 2018

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.