Latest videos Most viewed videos last month Tag cloud 1 views, 1 this year, 1 this monthData Privacy and Evaluation Challenges of Large Language Model Based Speech RecognitionFebruary 5th, 2024 9 views, 9 this year, 5 this monthSafeguarding Voices via Adversarial Examples: Defense and Way Forward in the Era of GenAIJanuary 22nd, 2024 6 views, 6 this year, 2 this monthTowards End-to-End Private Automatic Speaker RecognitionOctober 10th, 2023 5 views, 5 this year, 1 this monthEnhancing forensic audio: What works, what doesn't - and how can we know?October 10th, 2023 9 views, 9 this yearTowards Formalizing Speech Privacy for Speech Data Release and AnalysisOctober 10th, 2023 Display more videos 9 views, 9 this year, 5 this monthSafeguarding Voices via Adversarial Examples: Defense and Way Forward in the Era of GenAIJanuary 22nd, 2024 6 views, 6 this year, 2 this monthTowards End-to-End Private Automatic Speaker RecognitionOctober 10th, 2023 123 views, 7 this year, 1 this monthIngrid Verbauwhede, KU Leuven "The need for Hardware roots of trust"November 22nd, 2018 5 views, 5 this year, 1 this monthEnhancing forensic audio: What works, what doesn't - and how can we know?October 10th, 2023 239 views, 2 this yearEmanuele Cozzi, EURECOM "Understanding Linux Malware"November 22nd, 2018 No videos. malwarelinuxelfanalysisdataleuvenkeypufbitnumbersecurityenterprisesymantecenterprisesindustrydnsinternetsystempresentrdnsbapbinarystaticgotovchits2018sébastienbardinsrissl