Archive
Results
Showing: 1 to 9 of 9Affiliation shown is the affiliation at the time the talk was given.
![Fingerprinting Encrypted Voice Commands on Smart Speakers](/assets/video/secsem/images/secsem_20191204_full.jpg)
Fingerprinting Encrypted Voice Commands on Smart Speakers
Boyang Wang - University of Cincinnati
![Locally Differential Private Protocols for Frequency Estimation](/assets/video/secsem/images/secsem_20171018_full.jpg)
Locally Differential Private Protocols for Frequency Estimation
Tianhao Wang - Purdue University
![CIO Risk Appetite and Information Security Management](/assets/video/secsem/images/secsem_20170322_full.jpg)
CIO Risk Appetite and Information Security Management
Tawei (David) Wang - DePaul University
![Secure and Private Outsourcing to Untrusted Cloud Servers](/assets/video/secsem/images/secsem_20140129_full.jpg)
Secure and Private Outsourcing to Untrusted Cloud Servers
Shumiao Wang - Purdue University
![Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses](/assets/video/secsem/images/secsem_20100915_full.jpg)
Side Channel Threats in the Software-as-a-Service Era: Challenges and Responses
Xiaofeng Wang - Indiana University
Privacy-Preserving Genome Computing Through Program Specialization
Xiaofeng Wang - Indiana University
![Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies](/assets/video/secsem/images/secsem_20061025_full.jpg)
Beyond Separation of Duty: An Algebra for Specifying High-level Security Policies
Qihua Wang - Purdue University
![Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks](/assets/video/secsem/images/secsem_20050330_full.jpg)
Vulnerability-Driven Network Filters for Preventing Known Vulnerability Attacks
Helen J. Wang - Microsoft Research
Ways to Watch
![YouTube](/assets/images/youtube_200.png)