Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Introduction
00:00 • 2min
Announcing the Sponsor of the ZK Podcast
01:46 • 5min
The Side Channel Attacks and Privacy Tokens
06:42 • 5min
What's the Problem With Side Channel Attacks in Cryptocurrency?
11:21 • 6min
The Ronan Bridge Hack - Is the IP Address Encrypted?
16:56 • 4min
Are You a PhD Candidate at Google Research?
20:31 • 3min
How Machine Learning Training Works
23:53 • 5min
Is There a Breaking Point in Machine Learning?
28:26 • 3min
Is There a Theorem to Encrypt Machine Learning Processes?
31:19 • 4min
Is ZKML Predefined or Model Predefined?
35:48 • 2min
Is There a Security Break in ML?
37:38 • 2min
Attacks on the Training Data in Machine Learning
39:26 • 3min
Are You Trying to Break Machine Learning Models?
42:24 • 4min
Is There a Trade-Off Between Fairness and Privacy?
45:58 • 5min
Is There a Trade-Off Between Privacy and Robustness?
50:38 • 4min
Is Stable Diffusion a Better Model Than Dolly?
55:04 • 3min
Can Peer Review Be Fixed by Using More Anomaly Motivated Models?
58:22 • 2min
Does It Make for More Striking Results?
59:55 • 4min
Impactful Science
01:03:58 • 3min