PhD Seminar • Artificial Intelligence • Using Liquid Democracy for Low-Cost Ensemble Pruning
Please note: This seminar will take place online.
Ben Armstrong, PhD candidate
David R. Cheriton School of Computer Science
Supervisor:Professor Kate Larson
Ben Armstrong, PhD candidate
David R. Cheriton School of Computer Science
Supervisor:Professor Kate Larson
Armando Santos
Well-Typed/Haskell Consultants
Nils Lukas, PhD candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Florian Kerschbaum
Eric Lo
Chinese University of Hong Kong
Reynold C.K. Cheng
University of Hong Kong
Luke Rowe, Master's candidate
David R. Cheriton School of Computer Science
Supervisor: Professor Krzysztof Czarnecki
Candid Wüest
Global VP of Research, Acronis
In this technical talk, we will navigate through the intricate world of malware analysis and the methodologies employed by cybersecurity professionals, such as reverse engineering and blackboxing. We’ll contrast traditional methods, like signature-based detection, with more adaptive approaches such as behavior detection.
Antony Albert Raj Irudayaraj, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Daniel Vogel, Omid Abari
Antony Albert Raj Irudayaraj, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Daniel Vogel, Omid Abari
Antony Albert Raj Irudayaraj, PhD candidate
David R. Cheriton School of Computer Science
Supervisors: Professors Daniel Vogel, Omid Abari