Events Add an event Speakers Talks Collections
 

Conference Speakers

Sort by
Newest
Trending
451-480 of 35910
451-480 of 35910
Filter
Junyu Zhou
Security Researcher at Tencent Security Xuanwu Lab
application software, brute-force attack, classic mac os, computer security, con, conference speakers, cross-site scripting, cyber security, dc27, def, def con 2019, def con 27, defcon, desktop metaphor, domain name system, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, html, hyperlink, hypertext transfer protocol, java (programming language), javascript, library (computing), localhost, macintosh, password, scripting language, security conference, security conference 2019, web browser, wechat
Tianze Ding
Senior Security Researcher at Tencent
Huiming Liu
security researcher at Tencent Security Xuanwu Lab
access control, airdrop, android (operating system), authentication, bluetooth, computer network, computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, email, encryption, hacker, hacker community, hacker conference, hackers, hacking conference, hotspot (wi-fi), hypertext transfer protocol, internet, internet security, ios, key (cryptography), key exchange, man-in-the-middle attack, near-field communication, password, peer-to-peer, personal identification number, security conference, security conference 2019, smartphone, transmission control protocol, wi-fi
Xiangqian Zhang
security researcher at Tencent Security Xuanwu Lab
access control, airdrop, android (operating system), authentication, bluetooth, computer network, computer security, con, conference speakers, cyber security, dc27, def, def con 2019, def con 27, defcon, email, encryption, hacker, hacker community, hacker conference, hackers, hacking conference, hotspot (wi-fi), hypertext transfer protocol, internet, internet security, ios, key (cryptography), key exchange, man-in-the-middle attack, near-field communication, password, peer-to-peer, personal identification number, security conference, security conference 2019, smartphone, transmission control protocol, wi-fi
Omri Ben Bassat
Security Researcher at Microsoft
Guangdong Bai
Senior Lecturer at The University of Queensland
Bo Qu
Distinguished Engineer at Palo Alto Networks
Qi Deng
Manager, security research at Palo Alto Networks
Tao Yan
Security Researcher at Palo Alto Networks
Tsuyoshi Taniguchi
Researcher at Fujitsu System Integration Laboratories, Ltd.
Christian Doerr
Professor at Hasso Plattner Institute
Yu Wang
Senior Staff Engineer at Didi Research America
Wu HuiYu
Senior Security Researcher at Tencent Blade Team
Yuxiang Li
Senior Security Researcher at Tencent Blade Team
Wish Wu
security expert at Tian Qiong Security Lab of Ant Group
Shijie Cao
Security Researcher at Ant Group
Hao Zhao
Chief Mobile Security Architect at Ant Financial Tianchen Security Lab
airline, anheuser-busch brands, button, cybersecurity, directv, fox broadcasting company, fuzzing, information, infosec, logic, marathon, mutation, nickelodeon, patient, potion, rsa, rsac, rsaconference, security, slider (baseball), software testing, wine
Xinlei Ying
Ant Security Light-Year Lab
Jiashui Wang
Эксперт по информационной безопасности at Ant-Financial Light-Year Security Lab
Gaoning Pan
Student at Zhejiang University
Xingwei Lin
Security Researcher at Ant Security Light-Year Lab
JunDong Xie
Ant Security Light-Year Lab
Adam Shostack
President at Shostack & Associates
accessibility, active listening, adobe photoshop, adversarial machine learning, advertising, agile software development, amazon (company), amazon web services, android (operating system), anxiety, appsec, appseccali, archaeology, attention, audit, authentication, behavior, belief, biometrics, blog, body language, brainstorming, buffer overflow, c++, categorization, closed-circuit television, cloud computing, cloud computing security, computer network, computer security, contract, conversation, credit, credit card, cross-site scripting, cryptocurrency, data security, database, denial-of-service attack, design, dialogue, empowerment, encryption, experiment, expert, facebook, facial recognition system, gamification, general data protection regulation, gesture, information privacy, internet, internet of things, internet privacy, knowledge, laboratory, law, learning, machine learning, microphone, microservices, microsoft visual studio, mobile app, multi-factor authentication, news, online chat, opera (web browser), outsourcing, owasp, password, patch (computing), payment card industry data security standard, pci-x, penetration test, peripheral component interconnect, playing card suit, point of sale, positive psychology, privacy, psychology, reason, regulatory compliance, reverse engineering, rsa conference, security, self-driving car, shopify, sms, software bug, software development, software framework, space, spades (card game), static program analysis, system, targeted advertising, test-driven development, theory, thread (computing), threat model, time, transport layer security, twitter, understanding, usability, use case, user experience design, user-centered design, version control, wireless security
Ce Qin
Security Researcher at Tencent Security Xuanwu Lab
application software, brute-force attack, classic mac os, computer security, con, conference speakers, cross-site scripting, cyber security, dc27, def, def con 2019, def con 27, defcon, desktop metaphor, domain name system, email, google analytics, google chrome, hacker, hacker community, hacker conference, hackers, hacking conference, hostname, html, hyperlink, hypertext transfer protocol, java (programming language), javascript, library (computing), localhost, macintosh, password, scripting language, security conference, security conference 2019, web browser, wechat
Yan Jia
Student at Nankai University
Dongfang Zhao
Student at Indiana University Bloomington
Luyi Xing
SDE/Security Engineer at Amazon Web Services
Ben Nassi
Ph.D. Student at Ben-Gurion University of the Negev
algorithm, ambient music, analog signal, camera, color, computer security, confidentiality, covid-19 pandemic, data compression, deep learning, depth perception, diaphragm (acoustics), distance, electric motor, encryption, equalization (audio), experiment, frequency, frequency domain, human eye, incandescent light bulb, information, internet, internet of things, laser, led lamp, lens, lidar, light, loudspeaker, machine learning, malware, metadata, microphone, microwave, network packet, optical flow, optical spectrometer, optics, outlier, perception, pixel, prediction, privacy, projector, radar, robust statistics, science, self-driving car, selfie, sensitivity and specificity, signal, siren (alarm), smartphone, sound, spectrum, speech recognition, stereoscopy, tesla, inc., time, traffic, truth, unmanned aerial vehicle, vibration, video, visual perception, wi-fi
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 1197
451-480 of 35910