A study by researchers at the University of Georgia, Kennesaw State University, and Temple University identified cybersecurity weaknesses that could threaten the...University of Georgia From ACM TechNews | May 6, 2021
Cryptographic algorithms called zero-knowledge proof protocols are a mathematical method that enables the owner of an ML model to generate a succinct proof to demonstrate...Texas A&M University From ACM TechNews | May 6, 2021
Experts will say in today's Congressional testimony that the U.S. can learn from how cyberthreats have evolved in addressing growing online information operations...The Washington Post From ACM News | April 30, 2021
The U.S. Department of Justice launched the Ransomware and Digital Extortion Task Force to address the increase in ransomware attacks on critical U.S. organizations...The Hill From ACM TechNews | April 29, 2021
The EU Commission is expected to award a contract soon for a central system to verify "digital green passes" for those who have been vaccinated against COVID-19...Reuters From ACM TechNews | April 29, 2021
Researchers used satellite photos of three cities and manipulation of video and audio files to identify new methods of detecting deepfake satellite images.
University of Washington From ACM TechNews | April 28, 2021
Researchers found that next-generation sensors and controls used with high-performance computing, analytics, and machine learning could minimize road congestion...National Renewable Energy Laboratory From ACM TechNews | April 28, 2021