CS Department Events and Talks

  • Applying Machine Learning for Identifying Attacks at Run-time

    With the increase in malicious activity over the Internet, it has become extremely important to build tools for automatic detection of such activity. There ...

    Speaker:
    Nurit Devir
    Date:
    Monday, 28.1.2019, 10:00
    Place:
    Taub 601

    [Full version]

  • Exposure Evening to Communication Networks

    Exposure Evening to Communication NetworksThe CS Computer Communication Lab (LCCN) invites you to an exposure evening to communication networks - to get to know the laboratory activity, ...

    Date:
    Tuesday, 22.1.2019, 18:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Project Fair in IoT, Android, Ransomware and Networks

    Project Fair in IoT, Android, Ransomware and NetworksCS Labs: Systems and Software Development Laboratory (SSDL), Cyber and Computer Security Laboratory (CYBER), The Laboratory for Computer Communication and Networking (LCCN) invite ...

    Date:
    Tuesday, 22.1.2019, 12:30
    Place:
    Transparent Hall, Beit Hastudent

    [Full version]

  • Pixel Club: On The Resistance of Neural Networks to Label Noise

    Neural Networks have been shown to be remarkably resistant to label noise. This means that you can train a network using a data set ...

    Speaker:
    Amnon Drory (Tel-Aviv University)
    Date:
    Tuesday, 22.1.2019, 11:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Pixel Club: Isospectralization, Or How To Hear Shape, Style, and Correspondence

    The question whether one can recover the shape of a geometric object from its Laplacian spectrum (‘hear the shape of the drum’) is a ...

    Speaker:
    Arianna Rampini (Sapienza, University of Rome)
    Date:
    Monday, 21.1.2019, 11:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Decentralized Monetary Policy for Crypocurrencies

    The rapid increase in the popularity of cryptocurrencies brought with it not only questions regarding the quality of the technology itself, but also the ...

    Speaker:
    Alon Shtaierman
    Date:
    Monday, 21.1.2019, 11:00
    Place:
    Taub 601

    [Full version]

  • Theory Seminar: On Complexity of Closest Pair Problem

    Given a set of points in a metric space, the Closest Pair problem asks to find a pair of distinct points in the set ...

    Speaker:
    Karthik C.S.(Weizmann Institute of Science)
    Date:
    Wednesday, 16.1.2019, 12:30
    Place:
    Taub 201

    [Full version]

  • Stream Frequency Over Interval Queries

    Stream frequency measurements are fundamental in many data stream applications such as financial data trackers, intrusion-detection systems, and network monitoring. Typically, recent data items ...

    Speaker:
    Rana Shahout
    Date:
    Wednesday, 16.1.2019, 11:30
    Place:
    Taub 601

    [Full version]

  • COLLOQUIUM LECTURE - Consolidating and Exploring Open Textual Knowledge

    How can we capture effectively the information expressed in multiple texts? How can we allow people, as well as computer applications, to easily explore ...

    Speaker:
    Ido Dagan
    Date:
    Tuesday, 15.1.2019, 14:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Pixel Club: On the Expressive Power of ConvNets and RNNs as a Function of their Architecture

    The driving force behind convolutional and recurrent networks — two of the most successful deep learning architectures to date — is their expressive power. ...

    Speaker:
    Or Sharir (Hebrew University of Jerusalem)
    Date:
    Tuesday, 15.1.2019, 11:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Coding Theory: Iterative Programming of Noisy Memory Cells

    A model which mimics the programming operation of memory cells was first presented by Bunte and Lapidoth. Under this paradigm we assume that cells ...

    Speaker:
    Michal Horovitz (Migal - Research Institute)
    Date:
    Sunday, 13.1.2019, 14:30
    Place:
    Taub 601

    [Full version]

  • Theory Seminar: Prophet Inequalities for Independent Random Variables from an Unknown Distribution

    A central object in optimal stopping theory is the single-choice prophet inequality for independent, identically distributed random variables: Given a sequence of random variables ...

    Speaker:
    Paul Duetting (London School of Economics)
    Date:
    Wednesday, 9.1.2019, 12:30
    Place:
    Taub 201

    [Full version]

  • ceClub: Bitcoin-like Blockchain Architectures, Validation without per-Transaction Private Key Signatures

    Widely recognized as the inventor of digital cash, David is also known for other fundamental innovations in cryptography, including privacy and secure election technology. ...

    Speaker:
    David Chaum (The inventor of digital cash)
    Date:
    Wednesday, 9.1.2019, 11:30
    Place:
    Electrical Eng. Building 861

    [Full version]

  • Acquisition and Prediction of Gestures' Surface EMG Data Using Sequential Deep Learning Methods

    As technology becomes highly integrated into nearly every aspect of life, and in many cases is indispensable, maintaining relative hand functionality is crucial. A ...

    Speaker:
    Idan Hasson
    Date:
    Tuesday, 8.1.2019, 11:30
    Place:
    Taub 601

    [Full version]

  • Pixel Club: Variational Plane-Sweeping for Robust Multi-Image Alignment

    We tackle the problem of multiple image alignment and 3D reconstruction under extreme noise. Photographs acquired in scenes with large intensity variations or in ...

    Speaker:
    Yuval Goldfracht (Marine Imaging Lab, University of Haifa)
    Date:
    Tuesday, 8.1.2019, 11:30
    Place:
    Electrical Eng. Building 1061

    [Full version]

  • Natural Language Programming: Turning Texts into Executable Code

    Can we program computers in our native tongue? This idea, termed natural language programming (NLPRO), has attracted attention almost since the inception of computers ...

    Speaker:
    Reut Tsarfaty - GUEST LECTURE
    Date:
    Tuesday, 8.1.2019, 10:30
    Place:
    Room 201 Taub Bld.

    [Full version]

  • Deep Anomaly Detection Using Geometric Transformations

    We consider the problem of anomaly detection in images, and present a new detection technique. Given a sample of images, all known to belong ...

    Speaker:
    Izhak Golan
    Date:
    Monday, 7.1.2019, 11:30
    Place:
    Taub 601

    [Full version]

  • ceClub: Neural Code Comprehension: A Learnable Representation of Code Semantics

    In the era of “Big Code”, research is being conducted into automating the understanding of computer programs. Most of the current works borrow techniques ...

    Speaker:
    Tal Ben-Nun (ETH Zurich)
    Date:
    Monday, 7.1.2019, 11:30
    Place:
    Electrical Eng. Building 1061

    [Full version]

  • Coding Theory: Private Information Retrieval: From Replicated to Arbitrary Linear Coded Data

    Private information retrieval (PIR) is a technique of retrieving data from servers in a distributed storage system (DSS), without revealing the identity of the ...

    Speaker:
    Siddhartha Kumar (Simula UiB)
    Date:
    Sunday, 6.1.2019, 14:30
    Place:
    Taub 601

    [Full version]

  • When Existing Techniques Preserve Differential Privacy

    It is no secret that online companies, hospitals, credit-card companies and governments hold massive datasets composed of our sensitive personal details. Information from such ...

    Speaker:
    Or Sheffet - CS-Lecture
    Date:
    Sunday, 6.1.2019, 10:30
    Place:
    Room 601 Taub Bld.

    [Full version]

  • On Optimization and Expressiveness in Deep Learning

    Understanding deep learning calls for addressing three fundamental questions: expressiveness, optimization and generalization. Expressiveness refers to the ability of compactly sized deep neural networks ...

    Speaker:
    Nadav Cohen - CS-Lecture
    Date:
    Thursday, 3.1.2019, 10:30
    Place:
    Room 337 Taub Bld.

    [Full version]

  • Theory Seminar: Function-Inversion Problem: Barriers and Opportunities

    n the function-inversion problem, an algorithm gets black-box access to a function $f:[N] \to [N]$ and takes as input a point $y \in [N]$, ...

    Speaker:
    Dima Kogan (Stanford University)
    Date:
    Wednesday, 2.1.2019, 12:30
    Place:
    Room 201 Taub Bld.

    [Full version]

  • ceClub: Learning-Assisted Hardware Security

    Hardware security of integrated circuits (ICs) is a significant concern in many emerging market segments, such as intelligent transportation, innovative health care, sophisticated security ...

    Speaker:
    Inna P.-Vaisband (University of Illinois)
    Date:
    Wednesday, 2.1.2019, 11:30
    Place:
    EE Meyer Building 861

    [Full version]

  • COLLOQUIUM LECTURE - Toward Human-centered Programming Language Design

    Programming languages are a tool for human thought, expression, and work yet they are principally designed using mathematical and engineering techniques. In this talk, ...

    Speaker:
    Joshua Sunshine
    Date:
    Tuesday, 1.1.2019, 14:30
    Place:
    Room 337 Taub Bld.

    [Full version]