Data Science in Cyber-Security and Related Statistical Challenges
Data science techniques have an important role to play in the next generation of cyber-security defenses. Inside a typical enterprise computer network, a number of high-volume data sources are available which could enable the discovery…
SealPIR
SealPIR allows a client to download an element from a database stored by a server without revealing which element was downloaded. SealPIR was introduced in our paper. SealPIR is a (research) library and should not be…
Rethinking IoT Analytics with Universal Monitoring
Many IoT analytics tasks require accurate estimates of metrics for many applications such as heavy hitters, anomaly detection (e.g., entropy of source addresses), and security (e.g., DoS detection). Obtaining accurate estimates given CPU, memory, energy,…
City Data Exchange and Edge Analytics: A case for an Open Stack
The Indian government is attempting an ambitious aspirational move to “smarten” India’s cities. We do a deep dive analysis of a recent RFP for the same, which has been put out by the city of…
Machine Learning with Limited Signals at Mote-Scale
This talk describes the growing role of machine learning in battery-powered wireless sensor networks being deployed in rural and urban areas for environmental and wildlife projection. Specifically, we will discuss radar-based HornNet, deployed in a…