The AI economy will benefit incumbents – if they can leverage their proprietary data. To prepare for ‘AI eating software,’ enterprises need to standardize data collection processes across the organization.
Exploring better forms of multi-factor authentication (MFA) that use new behavioral signals and machine learning for a more secure and invisible experience. Co-authored with Shuman Ghosemajumder, Global Head of Artificial Intelligence at F5, former CTO of Shape Security and Click Fraud Czar at Google.
Master any skill with these four principles.
The US must foster public-private partnerships to raise collective understanding of current threat vectors, incentivizing state-level policy and cultivating a new generation of cyber-defenses. Co-authored with Steve Westly, former Controller of California and Tesla board member.
This paper investigates how disinformation and extremist ideas spread with respect to various population parameters, utilizing graph theory and stochastic games to evaluate the efficacy of censorship, punishment, and social welfare. Co-authored with Dogukan Yucel and advised by Dr. Feng Fu for MATH 76: The Mathematics of Misinformation.