Blogpost 23 by Ahmed Fraz BaigAugust 22, 2023Security and privacy in continuous authentication: non-technical to technical aspects Cybersecurity incidents are happening frequently and consistently. Poor authentication mechanism
Blogpost 22 by Feiyang TangAugust 22, 2023Pocket Spies: The Untold Story of Your Apps They're Tracking You More Than You Think Imagine having a friend who
Blogpost 21 by Luyi SunAugust 22, 2023Digital Identity and Privacy – Where Are We Now Abstract Researchers have taken great efforts into the management of digital
final eventJuly 19, 2023Workshop on Frontiers in Privacy and Security for Biometrics in Europe: Outcomes from PriMa & TReSPAsS-ETN EU Projects 12 -
Blogpost 20 by Mahdi GhafourianJuly 19, 2023Explainability and its Role to Provide Benevolent Artificial Intelligence Introduction Geoffrey Hinton, AI godfather: “I'm not convinced that a good
Protected: 3rd Research Conference – April 2023June 25, 2023There is no excerpt because this is a protected post.
Blogpost 19 by Ahmad HassanpourMay 3, 2023Impact of Generative AI on Users' Privacy in Online Social Networks Introduction In recent years, generative AI, a technology that