Table of Contents
- On Cybersecurity and Machine Learning
- Detecting Suspicious Activity
- Malware Detection Using Transformers and BERT
- Detecting Fake Reviews
- Detecting Deepfakes
- Detecting Machine-Generated Text
- Attributing Authorship and How to Evade it
- Detecting Fake News with Graph Neural Networks
- Attacking Models with Adversarial Machine Learning
- Protecting User Privacy with Differential Privacy
- Protecting User Privacy with Federated Machine Learning
- Breaking into the Sec-ML Industry

