In this talk, I will present our approach for investigating how machine learning models leak information about the individual data records on which they were trained. My focus will be on the fundamental membership...
In this talk, I will present our approach for investigating how machine learning models leak information about the individual data records on which they were trained. My focus will be on the fundamental membership...
UMass Amherst is an SFS school. That means we hand out scholarships from the National Science Foundation's Scholarship for Service program. In short, in exchange for promising to work for the government in a cybersecurity...
MS Concentrations Information Sessions
Prof. Ben Marlin will discuss the Data Science Concentration
Prof. Brian Levine will discuss the Security Concentration
Abstract: Machine learning algorithms are everywhere, ranging from simple data analysis and pattern recognition tools used across the sciences to complex systems that achieve super-human performance on various tasks....
Our exec board has been building a Capture-The-Flag security based competition for the past several months and it is ready for you to compete in! Come on down and compete against your peers as you work through security...
Abstract: Privacy concerns are becoming a major obstacle to using data in the way that we want. It's often unclear how current regulations should translate into technology, and the changing legal landscape surrounding...
Abstract: Wireless networks are ubiquitous and are playing an increasingly important role in our everyday lives. A lot of emerging applications heavily reply on and require an even more sophisticated Wi-Fi network...
ACM Cybersecurity Club's next speaker for the semester, Charlie Jacco from KPMG will discuss the work he does as a security engineer at KPMG and some of the interesting things he's seen there over the last few years....
Did you know Israeli companies operating in Boston make up 4% of Massachusetts' GDP?
Meet the players in Boston's Israeli cybersecurity innovation eco-system through 3 interactive company visits. Co-...
Come learn about CICS's new graduate certificate program in Information Security Management. This program offers training in applied information security, policy, and risk management. This five-course certificate is...