Zero Knowledge cover image

Adversarial Machine Learning Research with Florian Tramèr

Zero Knowledge

00:00

Is There a Theorem to Encrypt Machine Learning Processes?

The first machine learning project I ever worked on before starting my PhD was on this very topic, which we call model stealing attacks. So if you have a model that's sitting somewhere behind a cloud API, and you want this model to stay private, maybe because it uses proprietary information or you want to charge people for using it, then the fact that you let people query this model is inherently leaking information. And at some point with enough queries, you can probably reconstruct a local model that's kind of similar to the one that is supposed to be hidden. Whether this is feasible in practice depends a lot on the size of the model. For somewhat simple model sizes, this is usually not particularly expensive

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app