InBerkeleyISchoolbyBerkeley I SchoolA Recap of CyberForce 2024Two MICS (Masters in Information & Cybersecurity) teams from the University of California, Berkeley School of Information — HotMICS and…Nov 25
InBerkeleyISchoolbyAnastasia SizenskyFGSM Attacks on MNIST Fashion DatasetIn this article we will look at how the FGSM adversarial attack can corrupt classification results and reduce the accuracy of machine…Jun 6, 2023
InBerkeleyISchoolbyBerkeley I SchoolInsights and Takeaways from “Military Transitions: Lessons from the Field”By Mary McHaleNov 19Nov 19
InBerkeleyISchoolbySudip KarHiring using GenAI? Be Cautious!In late 2022, ChatGPT threw the world into a frenzy of interest, and individuals and corporations alike got on the new Gen AI bandwagon…Nov 12Nov 12
InBerkeleyISchoolbyBerkeley I SchoolCybersecurity Master’s Alums Help Internet Users Bypass Regional Censorship“Kosmos Global Access Proxy” is the Summer 2024 Master of Information & Cybersecurity Capstone Project WinnerSep 10Sep 10
InBerkeleyISchoolbyBerkeley I SchoolA Recap of CyberForce 2024Two MICS (Masters in Information & Cybersecurity) teams from the University of California, Berkeley School of Information — HotMICS and…Nov 25
InBerkeleyISchoolbyAnastasia SizenskyFGSM Attacks on MNIST Fashion DatasetIn this article we will look at how the FGSM adversarial attack can corrupt classification results and reduce the accuracy of machine…Jun 6, 2023
InBerkeleyISchoolbyBerkeley I SchoolInsights and Takeaways from “Military Transitions: Lessons from the Field”By Mary McHaleNov 19
InBerkeleyISchoolbySudip KarHiring using GenAI? Be Cautious!In late 2022, ChatGPT threw the world into a frenzy of interest, and individuals and corporations alike got on the new Gen AI bandwagon…Nov 12
InBerkeleyISchoolbyBerkeley I SchoolCybersecurity Master’s Alums Help Internet Users Bypass Regional Censorship“Kosmos Global Access Proxy” is the Summer 2024 Master of Information & Cybersecurity Capstone Project WinnerSep 10
InBerkeleyISchoolbySudip KarStrive for STRIDEFor almost everyone in the software security field, the STRIDE framework is probably one of the most important security threat modeling…Oct 25
InBerkeleyISchoolbyBerkeley I SchoolUC Berkeley Data Science Master’s Students Empower Teachers with Lesson Planning ToolkitEduCreate is the winner of the Summer 2024 Hal R. Varian AwardSep 10
InBerkeleyISchoolbySudip KarWhy Differential Privacy?Thanks to folks who read and liked my previous article on preventing information disclosure by GenAI using differential privacy. While I am…Jun 4