Hidden messages fool AI.
Imperfect forward secrecy: how Diffie-Hellman fails in practice.
Who owns 3D scans of historic sites?
Autonomous tools and design: a triple-loop approach to human-machine learning.
Open collaboration in an age of distrust.
Technical perspective: Attacking cryptographic key exchange with precomputation.
Are we having an ethical crisis in computing?
Face2Face: real-time face capture and reenactment of RGB videos.
Using remote cache service for bazel.
Hey Google, what's a moonshot?: how Silicon Valley mocks Apollo.
Intelligent systems for geosciences: an essential research agenda.
CRISPR: an emerging platform for gene editing.
Answering children's questions about computers.
Illegal pricing algorithms.
SQL is no excuse to avoid DevOps.
Technical perspective: Photorealistic facial digitization and manipulation.
The Church-Turing thesis: logical limit or breachable barrier?
UCF's 30-year REU site in computer vision.
Randomized anti-counterfeiting.
Deception, identity, and security: the game theory of sybil attacks.
Research for practice: security for the modern age.
Framework for implementing a big data ecosystem in organizations.
Modeling in engineering and science.
A people-centered economy.
Quantum leap.