1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
10 years of news and resources for members of the IEEE Signal Processing Society
Upcoming Webinar! 21 October 2019
Webinar Topic: "Fast Detection of Transformed Data Leaks"
Presented by Dr. Xiaokui Shu and based on an IEEE Xplore article
published in IEEE Transactions on Information Forensics and Security
|Presenter: Dr. Xiaokui Shu
|Date: 21 October 2019
Time: 11:00 am EDT (New York time)
Duration: Approximately 1 hour
Register: Attendee Registration
About this Topic:
This webinar, “Fast Detection of Transformed Data Leaks,” will discuss how the leak of sensitive data across secure network boundaries is becoming one of the most critical concerns for many industries in the move towards digitalization, building worldwide information portals, and the cloud. Due to the complex causes of data leaks, developers and researchers have created an umbrella of methods to identify, mitigate, and prevent leaks in different scenarios. This data leak detection webinar begins with a few distinct data leak cases and real-world countermeasures to inspire the audience to discover research problems. Then we pick up one set of detection problems regarding data comparison and dive into a string of detection approaches from simple to complex. Different design requirements regarding the deployment needs will be discussed, followed by existing solutions in the literature or commercial products. The last part of the webinar will generalize sensitive data into knowledge, connect data leak detection with other rapidly growing fields, and discuss potential research directions in the near future.
About the Presenter:
Dr. Xiaokui Shu is a Research Staff Member in the Cognitive Cybersecurity Intelligence Group at the IBM T. J. Watson Research Center. He received his Ph.D. degree in computer science from Virginia Tech and was the recipient of the Outstanding Ph.D. Student Award. He received his Bachelor’s degree from the University of Science and Technology of China (USTC) through the Guo Moruo Scholarship. He succeeded at his first penetration test (a type of ethical hacking) at USTC, and was awarded first prize in the Virginia Tech Inaugural Cybersecurity Summit Competition. His research interests are in system and network security, and he has published more than a dozen papers in the past few years on cyber-reasoning, program anomaly detection, data leak detection, mobile security, and user behavior analytics. The ACM featured his anomaly detection research in 2016 and highlighted his threat intelligence computing methodology in 2018. His data leak detection research opens doors to new business models, and many of his innovations have been patented by Yahoo and IBM.
© Copyright 2021 IEEE – All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.