Quantum Cryptography and Comm

The ability to transmit quantum information over long distances will enable implementation of many fascinating quantum communication tasks and provide us with novel capabilities that reach beyond what we can do over classical Internet alone. Examples of such tasks include blind quantum computing, clock synchronization or distributed quantum computing. Quantum cryptography is one family of such tasks with the most famous one being quantum key distribution.

Quantum Cryptography and Comm

The ability to transmit quantum information over long distances will enable implementation of many fascinating quantum communication tasks and provide us with novel capabilities that reach beyond what we can do over classical Internet alone. Examples of such tasks include blind quantum computing, clock synchronization or distributed quantum computing. Quantum cryptography is one family of such tasks with the most famous one being quantum key distribution.

Machine Learning

Introduction to core machine learning models and algorithms for classification, regression, dimensionality reduction and clustering. The course will cover the mathematical foundations behind the most common machine learning algorithms, and the effective use in solving real-world applications. Requires a strong mathematical background and knowledge of one high-level programming language such as Python.

Machine Learning

Introduction to core machine learning models and algorithms for classification, regression, dimensionality reduction and clustering. The course will cover the mathematical foundations behind the most common machine learning algorithms, and the effective use in solving real-world applications. Requires a strong mathematical background and knowledge of one high-level programming language such as Python.

Intelligent Visual Computing

The course will teach students algorithms that intelligently process, analyze and generate visual data. The course will start by covering the most commonly used image and shape descriptors. It will proceed with statistical models for representing 2D images, textures, 3D shapes and scenes. The course will then provide an in-depth background on topics of shape and image analysis and co-analysis. Particular emphasis will be given on topics of automatically inferring function from shapes, as well as their contextual relationships with other shapes in scenes and human poses.

Intelligent Visual Computing

The course will teach students algorithms that intelligently process, analyze and generate visual data. The course will start by covering the most commonly used image and shape descriptors. It will proceed with statistical models for representing 2D images, textures, 3D shapes and scenes. The course will then provide an in-depth background on topics of shape and image analysis and co-analysis. Particular emphasis will be given on topics of automatically inferring function from shapes, as well as their contextual relationships with other shapes in scenes and human poses.

Cyber Effects

This course covers a range of topics related to cyber security and operations. As each topic could be its own course, they will be presented broadly. The focus is on real-world studies of reverse engineering, exploit analysis, and capability development within the context of computer network operations and attack. The course has a strong emphasis on hands-on exercises and projects. Industry-standard tools such as Ghidra and CVE will be leveraged.

Cyber Effects

This course covers a range of topics related to cyber security and operations. As each topic could be its own course, they will be presented broadly. The focus is on real-world studies of reverse engineering, exploit analysis, and capability development within the context of computer network operations and attack. The course has a strong emphasis on hands-on exercises and projects. Industry-standard tools such as Ghidra and CVE will be leveraged.
Subscribe to