|
Jack Hughes
Name: | Jack Hughes |
Affiliation: | University of Cambridge |
E-mail: | (only provided to users who are logged into talks.cam) |
Last login: | Wed Nov 20 14:19:12 +0000 2024 |
Public lists managed by Jack Hughes
Talks given by Jack Hughes
Obviously this only lists talks that are listed through talks.cam. Furthermore, this facility only works if the speaker's e-mail was specified in a talk. Most talks have not done this.
Talks organised by Jack Hughes
This list is based on what was entered into the 'organiser' field in a talk. It may not mean that Jack Hughes actually organised the talk, they may have been responsible only for entering the talk into the talks.cam system.
- Hansa Market, Cyberbunker, and Encrochat: The Security Practices of Organized Crime
- Why Johnny doesn’t write secure software?
- Securing the Future: Futures Literacy in Cyber Security
- Teardown of encrypted USB Flash drives
- Cybersecurity for Democracy: Providing Independent Auditing Frameworks for Platform Accountability
- Blind Backdoors in Deep Learning
- Computational Methods to Measure and Mitigate Weaponized Online Information
- Resilient Machine Learning: A Systems-Security Perspective
- Super-Posters in Extremist Forums
- It's not only the dark web: Distributed surface web marketplaces
- change of room: FW26
- Apple, App Tracking Transparency, and the Hidden Costs of More Privacy
- FastPay: High-Performance Byzantine Fault Tolerant Settlement
- Mix-net cryptoeconomics: Rebooting privacy-preserving communications as incentive-driven collaborative projects
- Dark web marketplaces and COVID-19: Flexible and resilient
- Understanding Modern Phishing
- Deep Learning Assisted Side-Channel Attacks
- Crowdsourcing Security Research: A case study of AdObserver
- Dmitry goes to Hollywood: Criminal Excellence in (Cyber) La La Land
- A Liar and a Copycat: Nonverbal Coordination Increases with Lie Difficulty
- Cybersecurity Risk to Hospitals from Building Services
- Towards Provable Physical Safety Against False Actuation Attacks in CPS
- User Privacy Concerns and Preferences in Smart Buildings
- Alternative sanctions for juvenile criminal hackers: The evaluation of the Dutch “Hack_Right” intervention
- Cultural Convergence in the time of COVID
- Hardware and Software Fingerprinting of Mobile Devices
- SHB Seminar
- Eavesdropping at Scale: Shifting the Threat Model in Satellite Broadband
- Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble
- Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras
- Sponge Examples: Energy-Latency Attacks on Neural Networks
- TRRespass: Exploiting the Many Sides of Target Row Refresh
- Collaborative Deanonymization
- Understanding Privacy-Related Questions on Stack Overflow
- The politics of data-driven governance
- Tech Abuse in the Intimate Partner Violence Setting: Issues, Challenges, and Mitigations
- SEAL: sealed-bid auction without auctioneers
- Trustable Hardware as a TOCTOU Problem: Overview and Potential Remedies
- Security, Privacy and Community in a Connected World
- Product Design, Liability, and Insecurity Engineering
- Measuring Cryptocurrency Fraud
- On the Effectiveness of Generating Adversarial Examples for Evading Blackbox Malware Classifiers
- Realistic Adversarial Machine Learning
|