skip to content

Department of Computer Science and Technology

Read more at: Human-producible Adversarial Examples

Human-producible Adversarial Examples

Tuesday, 28 November, 2023 - 14:00 to 15:00

Visual adversarial examples have so far been restricted to pixel-level image manipulations in the digital world or have required sophisticated equipment such as 2D or 3D printers to be produced in the physical real world. We present the first ever method of generating human-producible adversarial examples for the real...


Read more at: Red teaming privacy-preserving systems using AI

Red teaming privacy-preserving systems using AI

Tuesday, 14 November, 2023 - 14:00 to 15:00

Companies and governments are increasingly relying on privacy-preserving techniques to collect and process sensitive data. In this talk, I will discuss our efforts to red team deployed systems and argue that red teaming is essential to protect privacy in practice. I will first shortly describing how traditional de-...


Read more at: Differential Privacy: Theory to Practice for the 2020 US Census

Differential Privacy: Theory to Practice for the 2020 US Census

Monday, 18 December, 2023 - 14:00 to 15:00

From 2016 through 2021, statisticians and computer scientists at the US Census Bureau worked on the largest and most complex deployment of differential privacy to date: using the modern mathematics of privacy to protect the census responses for more than 330 million residents of the United States as part of the 2020 Census...


Read more at: Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India

Data, Identity and Governance: Evolution and Trajectory of Digital Public Infrastructure in India

Tuesday, 31 October, 2023 - 14:00 to 15:00

In the country of a population of 1.5 billion people, Digital Public Infrastructure (DPI) has played a crucial role in identity verification, financial inclusion and public service delivery in the last one decade. In 2009, the UIDAI-Aadhar project was launched to create unique digital ID based on biometric data to offer...


Read more at: CIA to AIC: Why Cyber Must Enable the Business

CIA to AIC: Why Cyber Must Enable the Business

Tuesday, 17 October, 2023 - 14:00 to 15:00

The traditional mantra of Confidentiality, Integrity, and Availability (CIA) no longer supports business objectives. Availability and Integrity of systems and data are now king and critical to the survivability of organization enterprises, with Confidentiality now coming a distant 3rd (or possibly even 4th and beyond). The...