Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
Introduction
00:00 • 2min
Axiom and ZK
01:32 • 3min
ZK DSL - Your First Foray Into the ZK Space?
04:02 • 2min
Machine Learning and ZK - What's Your Foray?
05:46 • 3min
How Does Collaboration in Machine Learning Work?
09:13 • 2min
How Did ZK Proofs Come to Be?
10:45 • 2min
ZKML
12:19 • 2min
Is the Cloud Provider Trustless?
13:55 • 2min
The Gold Standard Model Is Not a Cheaper Approximation
15:39 • 2min
Detecting Deep Fakes in Machine Learning
17:24 • 3min
Using a Tested Sensor on a Camera?
20:08 • 2min
Tested Cameras Are the Most Common Form of a Test Camera
22:00 • 2min
ZKML - The Fighting Deep Fix
23:35 • 2min
How to Authenticate Your Biometric Identifier
25:29 • 2min
The Future of Biometric Authentication
27:00 • 2min
Is There a Connection Point?
29:16 • 2min
ZKP
31:34 • 2min
Dating Apps
33:29 • 2min
CKML Combination
35:07 • 2min
Is There a Limitation on the Sets of Transformations?
36:45 • 2min
The Performance Hit From Hashing in DK?
38:30 • 2min
Adapted Nonlinearity in Machine Learning Models?
40:11 • 2min
Is There a Wiggle Room in Machine Learning?
41:45 • 2min
The Challenges of Quantization in Machine Learning on Edge Devices
43:23 • 2min
Using ZKML to Prove Nonlinearity Models
44:56 • 3min
Do You Think We'll Get to a World Where Machine Learning Applications Drive the Library Composition Behavior
47:34 • 2min
Is ZK Moving in a Specific Future?
49:22 • 2min
The Future of ZK or ZKML?
51:11 • 2min
What's Next for Machine Learning?
53:25 • 2min
ZKML - What's Next?
55:08 • 2min