Latest videos Most viewed videos last month Tag cloud 21 views, 21 this year, 3 this monthSpeaker anonymization: current methods, challenges and perspectivesMay 6th, 2024 7 views, 7 this yearData Privacy and Evaluation Challenges of Large Language Model Based Speech RecognitionFebruary 5th, 2024 14 views, 14 this year, 1 this monthSafeguarding Voices via Adversarial Examples: Defense and Way Forward in the Era of GenAIJanuary 22nd, 2024 6 views, 6 this yearTowards End-to-End Private Automatic Speaker RecognitionOctober 10th, 2023 6 views, 6 this yearEnhancing forensic audio: What works, what doesn't - and how can we know?October 10th, 2023 Display more videos 21 views, 21 this year, 3 this monthSpeaker anonymization: current methods, challenges and perspectivesMay 6th, 2024 81 views, 2 this year, 1 this monthPrivacy-Preserving Distributed Optimization via Subspace Perturbation: A General FrameworkAugust 3rd, 2020 14 views, 14 this year, 1 this monthSafeguarding Voices via Adversarial Examples: Defense and Way Forward in the Era of GenAIJanuary 22nd, 2024 240 views, 3 this yearEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018 212 views, 10 this yearSam L. Thomas, IRISA "Experiences with the Carnegie Mellon University Binary Analysis Platform (CMU BAP)"November 22nd, 2018 No videos. malwarelinuxelfanalysisdataleuvenkeypufbitnumbersecurityenterprisesymantecenterprisesindustrydnsinternetsystempresentrdnsbapbinarystaticgotovchits2018sébastienbardinsrissl