It’s Another Attack on the U.S. Capitol
Using the same password for business and personal accounts is a common but risky practice that creates vulnerabilities.
It’s Another Attack on the U.S. Capitol
Using the same password for business and personal accounts is a common but risky practice that creates vulnerabilities.
Detecting/Explaining Industrial Hacks
XAI provides clear descriptions of Industrial Control System anomalies in accessible terms.
Dark Patterned Voices Manipulate Users
The vocal cues of voice user interfaces can be subtly manipulated to influence users' opinions.
A firmware change to Bluetooth chip sets makes the unwelcome tracking of a device by stalkers, hackers, and others impractical.
Only innovation will stave off the unbridled increase in power needed to run the chips behind exploding AI features and functionality.
Relying on BONES to Enhance Video Streaming
Advances in deep learning allow the enhancement of video content when streaming bandwidth fluctuates or is constrained.
Making Conversation a Robot’s Command
Recent advances help close the gap between high-level specifications of robotic behavior, and low-level implementations of robotic platforms.
Maximizing Power Grid Security
Edge AI Devices Eye Lifetime Learning
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved