Projects

Betrayed by Apps
Finding Haystacks within Haystacks
Handling Extreme Class Imbalance and Learning from Rare Events
Certifiable Security & Privacy Risk Robustness for Deep Neural Networks
Enhanced Cybersecurity through Artificial Intelligence Driven Red Teaming and Blue Teaming