Voice interactive systems are omnipresent these days, since voice is one of the most natural means to interact with automated systems. More and more we have devices at home with smart speakers, always listening to our conversations and potentially recording privacy sensitive information which could be linked back to you. It is now essential more than ever to consider “voice anonymisation”, which means removing the identity and suppressing the privacy sensitive aspects in a speech signal.

EURECOM’s Prof. Nicholas Evans, expert in speaker recognition, deepfake detection, privacy preservation and biometrics will guide us through the VoicePrivacy Challenge Initiative, a project…


Although silk trade is often linked to Asian origins, it was fundamental for the European culture, linked to our history, sociology, economy and art. From furniture and clothing to tapestries and formal attires, silk was present throughout history quite often as a symbol of luxury. Following the European silk road through the centuries will lead us to a better understanding of European history, unravelling the effects of the commercial and cultural exchanges around silk to modern society.

EURECOM’s Prof. Raphaël Troncy, expert in Knowledge Graphs, Semantic Web and Natural Language Understanding, will guide us through his EU research project SILKNOW


Have you ever considered that most of the devices you own contain complex software, like your phone, laptop, cars, even washing and coffee machines? Software is increasingly present in everyday devices, industrial machines are more connected to the network and hardware architectures are becoming more complex, having an impact on the complexity of the software design as well. Rapidly stepping into a world of IoT, interconnected devices either for personal or industrial use, become as well more exposed to cyber threats and external attacks.

EURECOM’s Prof. Aurélien Francillon, expert in software security in embedded systems, will guide us through his…


Nowadays, wireless networks are mainly configured in a centralised manner, where the whole traffic is managed from a central point. In fact, a central unit collects and processes all the information, in order to make decisions on resource allocation, a process often introducing extra delays. However, in the future we can imagine having billion devices from phones and tablets to industrial machines and drones, struggling to use the spectrum, causing a lot of interference, but also demanding instantaneous decisions, especially in the case of critical applications. …


Wordclouds generated by real queries of CoronaCheck algorithm in four languages

According to the World Health Organisation (WHO), along with the Coronavirus pandemic, we are also experiencing an “infodemic”: a large spread of false, misleading and unreliable sources of news about the virus and its effects.

EURECOM’s professor Dr. Paolo Papotti, expert in data management and information quality, will guide us through how AI algorithms can be used to verify online information and especially statistical claims.

Q. What is your approach in the fight against misinformation and how did you start working on it?

PP. I have been interested in the misinformation problem for quite some time, working on factchecking for…


We are producing more data in the last few years than we ever did as a human kind. We now store all of our thoughts and actions as digital files. However, except when we run out of storage space on our phones, we do not usually think much about problems related to storing our data over several decades. IBM manufactured the first hard drive in 1956, where you could store one mp3 song in a disk at the size of a washing machine. We have come a long way and data storage technology has evolved tremendously over the last five…


Artificial intelligence (AI), the broad discipline of creating intelligent machines, has been very well established in the everyday technology and adopted in popular culture more than any other technological achievement. Daily, we interact with intelligent systems while sending an email, unlocking our phones, using social media, receiving recommendations for shopping, travel, entertainment etc. AI is using technology like machine learning (ML)*, natural language processing (NLP)*, computer vision etc., in order to carry out tasks which normally require human intelligence, for example problem solving or learning. But how much can we trust AI for applications that are critical like healthcare, aviation…


DEF CON is the largest security and hacking international convention, having started almost 30 years ago, attracting security professionals, academics, amateurs and hacking enthusiasts from all over the world. This year, due to the current pandemic, instead of Las Vegas, DEF CON will take place… online for the first time!

During DEF CON, security specialists have the chance to participate in one of the most prestigious among all hacking competitions, known as “Capture the Flag” (CTF), where teams compete in order to solve a series of challenges, win and bring the “digital flag” back home.

EURECOM’s Professors in Digital Security…

EURECOM Communication

Graduate school & Research Center in digital science with a strong international perspective, located in the Sophia Antipolis technology park.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store