Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Web Development
Software Development
Graphic Design
Functional Programming Principles in Scala
Mountains 101
Industrial Pharmacy-I
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Exploring community-driven auditing of pretrial risk assessment algorithms, addressing concerns and developing socially informed validation processes for fair decision-making frameworks.
Exploration of fairness in machine learning algorithms, focusing on disparity assessment, classification with fairness constraints, and comparative studies of fairness-enhancing interventions.
Explore algorithmic responsibility in administrative law and design, addressing challenges, interventions, and strategies for fostering public participation in technology governance.
Exploring online A/B testing, data sharing ethics, fairness in programming, and model performance reporting. Insights into cutting-edge research on responsible AI and data science practices.
Explore message-recovery attacks on Feistel-based format preserving encryption, examining technical challenges, known plaintext attacks, and theoretical implications for cryptographic security.
Explore local differential privacy for heavy hitter estimation on set-valued data. Learn about randomized response, RAPPOR, and the LDPMiner framework for privacy-preserving data analysis.
Innovative approach to locating memory corruption vulnerabilities using core dumps, tracking crash points, identifying stack frames, and determining corruption sources for improved software security.
Systematic analysis of Juniper's Dual EC cryptographic incident, exploring vulnerabilities, attack methods, and implications for network security and encryption standards.
Explore advanced probabilistic couplings for differential privacy, covering composition theorems, program logic, and accuracy-dependent privacy in this in-depth technical presentation.
Explore MPC-friendly symmetric key primitives for secure computation, focusing on PRFs, secure sharing, and efficient preprocessing techniques in cryptography.
Explore authenticated data feeds for smart contracts using Town Crier, leveraging Intel SGX for secure and confidential data delivery in decentralized environments.
Explore Bitcoin's stability without block rewards, examining key results, mining strategies, and potential future challenges in cryptocurrency economics.
Secure sharding protocol for open blockchains addressing scalability issues. Introduces Elastico, a novel solution using directory committees and epoch randomness for improved performance and security.
Explore asynchronous Byzantine fault tolerance protocols, focusing on Honey Badger's resilience, optimal performance, and practical applications in wide area networks.
Block-level provenance-based data protection for USB storage devices, enhancing security in sensitive organizations through remote TPM, integrity models, and access control.
Get personalized course recommendations, track subjects and courses with reminders, and more.