Courses from 1000+ universities
Coursera sees headcount decrease and faces lawsuit in 2023, invests in proprietary content while relying on Big 5 partners.
600 Free Google Certifications
Business Intelligence
Programming Languages
Data Analysis
Paleontology: Theropod Dinosaurs and the Origin of Birds
Preparing to Manage Human Resources
Transforming Digital Learning: Learning Design Meets Service Design
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Security. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explore LiDAR spoofing techniques and their impact on AV obstacle detection with USENIX. 14-minute analysis of defense strategies.
Explore email encryption vulnerabilities and countermeasures with USENIX in a concise 14-minute session.
Explore advanced security techniques against data poisoning in LDP with USENIX. Learn to manipulate data estimations and defense methods in 20 minutes.
Explore bandwidth-efficient distributed ORAM with USENIX in a concise 15-minute presentation, focusing on secure computation and innovative communication cost reductions.
Learn privacy-preserving techniques with ACORN, improving secure aggregation and input validation. 16-min insight by Google and Amazon experts.
Learn proactive ML defense strategies against backdoor attacks with USENIX. Discover robust detection techniques in a 15-minute session.
Explore human vs. machine malware classification with USENIX in a 15-minute study on decision-making and feature extraction.
Explore Android's logging of sensitive data and its implications on privacy with USENIX in a concise 14-minute session.
Explore decentralized private computation with VeriZexe, improving efficiency and privacy in blockchain, with USENIX. 15-minute overview.
Explore Android malware detection with continuous learning techniques in a 14-minute session with USENIX. Enhance classifier longevity and accuracy.
Explore practical memory sanitization for binary fuzzing with MTSan, featuring low overhead and ARM MTE, in a 14-min session with USENIX.
Explore zk-SNARKs optimization with zkSaaS framework for privacy-preserving proof generation. 15-min insight with USENIX. Faster, scalable solutions.
Explore robocall analysis with SnorCall, uncovering scam trends and defenses in a 14-min session with USENIX.
Explore privacy policy labeling with Calpric, using crowdsourcing and active learning for cost-effective data at USENIX. 15 min.
Explore adversarial attacks on perceptual hashing in online systems with USENIX. Learn to assess and counter vulnerabilities in 15 minutes.
Get personalized course recommendations, track subjects and courses with reminders, and more.