Hridoy Sankar Dutta
| Name: | Hridoy Sankar Dutta |
| Affiliation: | University of Cambridge |
| E-mail: | (only provided to users who are logged into talks.cam) |
| Last login: | 27 Dec 2023, 9:51 a.m. |
Public lists managed by Hridoy Sankar Dutta
Talks given by Hridoy Sankar Dutta
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Hridoy Sankar Dutta
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Hridoy Sankar Dutta actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- How Misinformation Creators (Ab)use Generative AI Tools
- The end of world as we know it
- Automated detection of cryptocurrency investment scams at scale
- A biography of Tor - a cultural and technological history of power, privacy, and global politics at the internet's core
- Applications of proofs to network security
- Legal Concepts in Cybersecurity and Privacy for Digital & Smart Environments
- Data Poisoning and Fakes in Mobile, Web and Cyber Physical Systems
- Mysticeti: Low-Latency DAG Consensus with Fast Commit Path
- How to Catch an AI Liar: Lie Detection in Black-Box LLMs by Asking Unrelated Questions
- Characterizing Machine Unlearning through Definitions and Implementations
- Owl - an augmented password-authenticated key exchange protocol
- Securing the WebPKI in Practice: A tour of the technologies, politics and open problems
- Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data
- One Protocol to Rule Them All? On Securing Interoperable Messaging
- A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse
- Two Sides of the Same Crime
- Differential Privacy: Theory to Practice for the 2020 US Census
- Securing Supply Chains with Compilers
- 25 years of crypto wars and privacy tussles – where next?
- Human-producible Adversarial Examples
- Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks
- Red teaming privacy-preserving systems using AI
- Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India
- CIA to AIC: Why Cyber Must Enable the Business
- A Tale of Two Internet (In)Security Problems
- On the Insecurity of PLC Systems
- EviHunter: Identifying Digital Forensic Artifacts from Android Apps/Devices via Static & Dynamic Analysis + Android™ App Forensic Artifacts Database
- A View of the Dark Web through the Lens of NLP and Language Modeling
- The Unlearning Problem(s)
- The Nym mixnet: Design and Evaluation
- The INCEL Movement: A New Form of Technology-Facilitated Abuse
![[Talks.cam]](/static/images/talkslogosmall.gif)
