In 1997, an MIT graduate student named Latanya Sweeney stunned the privacy world by matching publicly available voter rolls ...
Advanced internal scouting systems can sort massive amounts of information on NFL prospects, organizing evaluations, grades ...
Popular tool abuse, ClickFix, and identity-based attacks are among the most prevalent techniques bad actors are deploying ...
Constant identity assurance via behavioral signals or biometrics ensures continuous validation of identity instead of relying ...
DHS budget documents reveal ICE Glasses smart eyewear project with real-time biometric watchlist access for federal agents in ...
This issue of Transforming Care looks at how employees of health care systems are working to make AI useful while also ...
Beldex Research Labs has published new research exploring how cryptographic techniques can enable privacy-preserving ...
Identification of each animal in a collective becomes possible even when individuals are never all visible simultaneously, enabling faster and more accurate analysis of collective behavior.
Today’s retail environment has evolved. Theft is more frequent, more organized and more complex, pushing retailers to seek ...
Ford has filed a patent application for software that reads the occupant’s lips using cameras and sensors inside the vehicle.
Vehicle configuration complexity has increased exponentially over the last 10 years, primarily driven by a shift from ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results