New Directions in Efficient Privacypreserving Machine Learning
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
ARTIFICIAL INTELLIGENCE and ALGORITHMIC LIABILITY a Technology and Risk Engineering Perspective from Zurich Insurance Group and Microsoft Corp
White Paper ARTIFICIAL INTELLIGENCE AND ALGORITHMIC LIABILITY A technology and risk engineering perspective from Zurich Insurance Group and Microsoft Corp. July 2021 TABLE OF CONTENTS 1. Executive summary 03 This paper introduces the growing notion of AI algorithmic 2. Introduction 05 risk, explores the drivers and A. What is algorithmic risk and why is it so complex? ‘Because the computer says so!’ 05 B. Microsoft and Zurich: Market-leading Cyber Security and Risk Expertise 06 implications of algorithmic liability, and provides practical 3. Algorithmic risk : Intended or not, AI can foster discrimination 07 guidance as to the successful A. Creating bias through intended negative externalities 07 B. Bias as a result of unintended negative externalities 07 mitigation of such risk to enable the ethical and responsible use of 4. Data and design flaws as key triggers of algorithmic liability 08 AI. A. Model input phase 08 B. Model design and development phase 09 C. Model operation and output phase 10 Authors: D. Potential complications can cloud liability, make remedies difficult 11 Zurich Insurance Group 5. How to determine algorithmic liability? 13 Elisabeth Bechtold A. General legal approaches: Caution in a fast-changing field 13 Rui Manuel Melo Da Silva Ferreira B. Challenges and limitations of existing legal approaches 14 C. AI-specific best practice standards and emerging regulation 15 D. New approaches to tackle algorithmic liability risk? 17 Microsoft Corp. Rachel Azafrani 6. Principles and tools to manage algorithmic liability risk 18 A. Tools and methodologies for responsible AI and data usage 18 Christian Bucher B. Governance and principles for responsible AI and data usage 20 Franziska-Juliette Klebôn C. -
NASA Develops Wireless Tile Scanner for Space Shuttle Inspection
August 2007 NASA, Microsoft launch collaboration with immersive photography NASA and Microsoft Corporation a more global view of the launch facil- provided us with some outstanding of Redmond, Wash., have released an ity. The software uses photographs images, and the result is an experience interactive, 3-D photographic collec- from standard digital cameras to that will wow anyone wanting to get a tion of the space shuttle Endeavour construct a 3-D view that can be navi- closer look at NASA’s missions.” preparing for its upcoming mission to gated and explored online. The NASA The NASA collections were created the International Space Station. Endea- images can be viewed at Microsoft’s in collaboration between Microsoft’s vour launched from NASA Kennedy Live Labs at: http://labs.live.com Live Lab, Kennedy and NASA Ames. Space Center in Florida on Aug. 8. “This collaboration with Microsoft “We see potential to use Photo- For the first time, people around gives the public a new way to explore synth for a variety of future mission the world can view hundreds of high and participate in America’s space activities, from inspecting the Interna- resolution photographs of Endeav- program,” said William Gerstenmaier, tional Space Station and the Hubble our, Launch Pad 39A and the Vehicle NASA’s associate administrator for Space Telescope to viewing landing Assembly Building at Kennedy in Space Operations, Washington. “We’re sites on the moon and Mars,” said a unique 3-D viewer. NASA and also looking into using this new tech- Chris C. Kemp, director of Strategic Microsoft’s Live Labs team developed nology to support future missions.” Business Development at Ames. -
Practical Homomorphic Encryption and Cryptanalysis
Practical Homomorphic Encryption and Cryptanalysis Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften (Dr. rer. nat.) an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum vorgelegt von Dipl. Ing. Matthias Minihold unter der Betreuung von Prof. Dr. Alexander May Bochum April 2019 First reviewer: Prof. Dr. Alexander May Second reviewer: Prof. Dr. Gregor Leander Date of oral examination (Defense): 3rd May 2019 Author's declaration The work presented in this thesis is the result of original research carried out by the candidate, partly in collaboration with others, whilst enrolled in and carried out in accordance with the requirements of the Department of Mathematics at Ruhr-University Bochum as a candidate for the degree of doctor rerum naturalium (Dr. rer. nat.). Except where indicated by reference in the text, the work is the candidates own work and has not been submitted for any other degree or award in any other university or educational establishment. Views expressed in this dissertation are those of the author. Place, Date Signature Chapter 1 Abstract My thesis on Practical Homomorphic Encryption and Cryptanalysis, is dedicated to efficient homomor- phic constructions, underlying primitives, and their practical security vetted by cryptanalytic methods. The wide-spread RSA cryptosystem serves as an early (partially) homomorphic example of a public- key encryption scheme, whose security reduction leads to problems believed to be have lower solution- complexity on average than nowadays fully homomorphic encryption schemes are based on. The reader goes on a journey towards designing a practical fully homomorphic encryption scheme, and one exemplary application of growing importance: privacy-preserving use of machine learning. -
Information Guide
INFORMATION GUIDE 7 ALL-PRO 7 NFL MVP LAMAR JACKSON 2018 - 1ST ROUND (32ND PICK) RONNIE STANLEY 2016 - 1ST ROUND (6TH PICK) 2020 BALTIMORE DRAFT PICKS FIRST 28TH SECOND 55TH (VIA ATL.) SECOND 60TH THIRD 92ND THIRD 106TH (COMP) FOURTH 129TH (VIA NE) FOURTH 143RD (COMP) 7 ALL-PRO MARLON HUMPHREY FIFTH 170TH (VIA MIN.) SEVENTH 225TH (VIA NYJ) 2017 - 1ST ROUND (16TH PICK) 2020 RAVENS DRAFT GUIDE “[The Draft] is the lifeblood of this Ozzie Newsome organization, and we take it very Executive Vice President seriously. We try to make it a science, 25th Season w/ Ravens we really do. But in the end, it’s probably more of an art than a science. There’s a lot of nuance involved. It’s Joe Hortiz a big-picture thing. It’s a lot of bits and Director of Player Personnel pieces of information. It’s gut instinct. 23rd Season w/ Ravens It’s experience, which I think is really, really important.” Eric DeCosta George Kokinis Executive VP & General Manager Director of Player Personnel 25th Season w/ Ravens, 2nd as EVP/GM 24th Season w/ Ravens Pat Moriarty Brandon Berning Bobby Vega “Q” Attenoukon Sarah Mallepalle Sr. VP of Football Operations MW/SW Area Scout East Area Scout Player Personnel Assistant Player Personnel Analyst Vincent Newsome David Blackburn Kevin Weidl Patrick McDonough Derrick Yam Sr. Player Personnel Exec. West Area Scout SE/SW Area Scout Player Personnel Assistant Quantitative Analyst Nick Matteo Joey Cleary Corey Frazier Chas Stallard Director of Football Admin. Northeast Area Scout Pro Scout Player Personnel Assistant David McDonald Dwaune Jones Patrick Williams Jenn Werner Dir. -
Homomorphic Encryption Library
Ludwig-Maximilians-Universit¨at Munchen¨ Prof. Dr. D. Kranzlmuller,¨ Dr. N. gentschen Felde Data Science & Ethics { Microsoft SEAL { Exercise 1: Library for Matrix Operations Microsoft's Simple Encrypted Arithmetic Library (SEAL)1 is a publicly available homomorphic encryption library. It can be found and downloaded at http://sealcrypto.codeplex.com/. Implement a library 13b MS-SEAL.h supporting matrix operations using homomorphic encryption on basis of the MS SEAL. due date: 01.07.2018 (EOB) no. of students: 2 deliverables: 1. Implemenatation (including source code(s)) 2. Documentation (max. 10 pages) 3. Presentation (10 { max. 15 minutes) 13b MS-SEAL.h #i n c l u d e <f l o a t . h> #i n c l u d e <s t d b o o l . h> typedef struct f double ∗ e n t r i e s ; unsigned int width; unsigned int height; g matrix ; /∗ Initialize new matrix: − reserve memory only ∗/ matrix initMatrix(unsigned int width, unsigned int height); /∗ Initialize new matrix: − reserve memory − set any value to 0 ∗/ matrix initMatrixZero(unsigned int width, unsigned int height); /∗ Initialize new matrix: − reserve memory − set any value to random number ∗/ matrix initMatrixRand(unsigned int width, unsigned int height); 1https://www.microsoft.com/en-us/research/publication/simple-encrypted-arithmetic-library-seal-v2-0/# 1 /∗ copy a matrix and return its copy ∗/ matrix copyMatrix(matrix toCopy); /∗ destroy matrix − f r e e memory − set any remaining value to NULL ∗/ void freeMatrix(matrix toDestroy); /∗ return entry at position (xPos, yPos), DBL MAX in case of error -
Arxiv:2102.00319V1 [Cs.CR] 30 Jan 2021
Efficient CNN Building Blocks for Encrypted Data Nayna Jain1,4, Karthik Nandakumar2, Nalini Ratha3, Sharath Pankanti5, Uttam Kumar 1 1 Center for Data Sciences, International Institute of Information Technology, Bangalore 2 Mohamed Bin Zayed University of Artificial Intelligence 3 University at Buffalo, SUNY 4 IBM Systems 5 Microsoft [email protected], [email protected], [email protected]/[email protected], [email protected], [email protected] Abstract Model Owner Model Architecture 푴 Machine learning on encrypted data can address the concerns Homomorphically Encrypted Model Model Parameters 퐸(휽) related to privacy and legality of sharing sensitive data with Encryption untrustworthy service providers, while leveraging their re- Parameters 휽 sources to facilitate extraction of valuable insights from oth- End-User Public Key Homomorphically Encrypted Cloud erwise non-shareable data. Fully Homomorphic Encryption Test Data {퐸(퐱 )}푇 Test Data 푖 푖=1 FHE Computations Service 푇 Encryption (FHE) is a promising technique to enable machine learning {퐱푖}푖=1 퐸 y푖 = 푴(퐸 x푖 , 퐸(휽)) Provider and inferencing while providing strict guarantees against in- Inference 푇 Decryption formation leakage. Since deep convolutional neural networks {푦푖}푖=1 Homomorphically Encrypted Inference Results {퐸(y )}푇 (CNNs) have become the machine learning tool of choice Private Key 푖 푖=1 in several applications, several attempts have been made to harness CNNs to extract insights from encrypted data. How- ever, existing works focus only on ensuring data security Figure 1: In a conventional Machine Learning as a Ser- and ignore security of model parameters. They also report vice (MLaaS) scenario, both the data and model parameters high level implementations without providing rigorous anal- are unencrypted. -
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks
Applications of Reinforcement Learning to Routing and Virtualization in Computer Networks by Soroush Haeri B. Eng., Multimedia University, Malaysia, 2010 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the School of Engineering Science Faculty of Applied Science © Soroush Haeri 2016 SIMON FRASER UNIVERSITY Spring 2016 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced without authorization under the conditions for “Fair Dealing.” Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Abstract Computer networks and reinforcement learning algorithms have substantially advanced over the past decade. The Internet is a complex collection of inter-connected networks with a numerous of inter-operable technologies and protocols. Current trend to decouple the network intelligence from the network devices enabled by Software-Defined Networking (SDN) provides a centralized implementation of network intelligence. This offers great computational power and memory to network logic processing units where the network intelligence is implemented. Hence, reinforcement learning algorithms viable options for addressing a variety of computer networking challenges. In this dissertation, we propose two applications of reinforcement learning algorithms in computer networks. We first investigate the applications of reinforcement learning for deflection routing in buffer- less networks. Deflection routing is employed to ameliorate packet loss caused by contention in buffer-less architectures such as optical burst-switched (OBS) networks. We present a framework that introduces intelligence to deflection routing (iDef). -
MP2ML: a Mixed-Protocol Machine Learning Framework for Private Inference∗ (Full Version)
MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference∗ (Full Version) Fabian Boemer Rosario Cammarota Daniel Demmler [email protected] [email protected] [email protected] Intel AI Intel Labs hamburg.de San Diego, California, USA San Diego, California, USA University of Hamburg Hamburg, Germany Thomas Schneider Hossein Yalame [email protected] [email protected] darmstadt.de TU Darmstadt TU Darmstadt Darmstadt, Germany Darmstadt, Germany ABSTRACT 1 INTRODUCTION Privacy-preserving machine learning (PPML) has many applica- Several practical services have emerged that use machine learn- tions, from medical image evaluation and anomaly detection to ing (ML) algorithms to categorize and classify large amounts of financial analysis. nGraph-HE (Boemer et al., Computing Fron- sensitive data ranging from medical diagnosis to financial eval- tiers’19) enables data scientists to perform private inference of deep uation [14, 66]. However, to benefit from these services, current learning (DL) models trained using popular frameworks such as solutions require disclosing private data, such as biometric, financial TensorFlow. nGraph-HE computes linear layers using the CKKS ho- or location information. momorphic encryption (HE) scheme (Cheon et al., ASIACRYPT’17), As a result, there is an inherent contradiction between utility and relies on a client-aided model to compute non-polynomial acti- and privacy: ML requires data to operate, while privacy necessitates vation functions, such as MaxPool and ReLU, where intermediate keeping sensitive information private [70]. Therefore, one of the feature maps are sent to the data owner to compute activation func- most important challenges in using ML services is helping data tions in the clear. -
Modernization of Digital Enterprises Ai at the Core
MODERNIZATION OF DIGITAL ENTERPRISES AI AT THE CORE From Models to Outcomes Hardik Tiwari, Prateek Das Humankind has always been fascinated by the ability of machines to learn Movies, Books, Art Thomas Bayes conceptualized Bayes Mathematicians and Scientists envisioned Theorem in 1763 the possibilities of predicting outcomes Alan Turing Arthur Samuel The world started imagining what if machines are Coined the term Wrote the first smarter “Turing Test” in Machine Learning 1950 code in 1952 And now we live in a present in which humans and intelligent systems are bound together in a symbiotic autonomy Smart Reply Apr 1, 2009: An April Fool’s Day joke Nov 5, 2015: Launched real product Feb 1, 2016: >10% of mobile Inbox replies AI permeates our daily lives — from search engines to ride-share schedulers to ever needful digital personal assistants Received a reminder about Confluence from Google Checked route on maps Booked a cab on Uber Received a location update for Taj Taking notes on Evernote Took a selfie for Instagram AI has reached a stage where intelligent systems have bettered the humans at times Face Recognition Human AI/ Machine 97.5% 97.7% Lip reading 41.3% 57.9% Pneumonia Detection 75.3% 75.9% And now AI technologies have become pervasive in every industry BFSI $25B Estimated revenue from AI products & Top Brands services in 2025 Fraud Detection Automated Cognitive RPA Uses automated analysis to help Trading identify clients best positioned for follow-on equity offerings. Chatbots Robo- Portfolio Advisors ~5M Management Potential jobs to be Loan/ Risk impacted in US by Insurance Management 2025 Credit underwriting Scoring Personalized Added AI enhancements to its Financial mobile banking app, which will give Scaleof disruption Products users personalized insights into ~10,000 their finances. -
Smithsonian Institution Fiscal Year 2021 Budget Justification to Congress
Smithsonian Institution Fiscal Year 2021 Budget Justification to Congress February 2020 SMITHSONIAN INSTITUTION (SI) Fiscal Year 2021 Budget Request to Congress TABLE OF CONTENTS INTRODUCTION Overview .................................................................................................... 1 FY 2021 Budget Request Summary ........................................................... 5 SALARIES AND EXPENSES Summary of FY 2021 Changes and Unit Detail ........................................ 11 Fixed Costs Salary and Related Costs ................................................................... 14 Utilities, Rent, Communications, and Other ........................................ 16 Summary of Program Changes ................................................................ 19 No-Year Funding and Object-Class Breakout .......................................... 23 Federal Resource Summary by Performance/Program Category ............ 24 MUSEUMS AND RESEARCH CENTERS Enhanced Research Initiatives ........................................................... 26 National Air and Space Museum ........................................................ 28 Smithsonian Astrophysical Observatory ............................................ 36 Major Scientific Instrumentation .......................................................... 41 National Museum of Natural History ................................................... 47 National Zoological Park ..................................................................... 55 Smithsonian Environmental -
DELPHI: a Cryptographic Inference Service for Neural Networks Pratyush Mishra Ryan Lehmkuhl Akshayaram Srinivasan Wenting Zheng Raluca Ada Popa
DELPHI: A Cryptographic Inference Service for Neural Networks Pratyush Mishra Ryan Lehmkuhl Akshayaram Srinivasan Wenting Zheng Raluca Ada Popa UC Berkeley Abstract Many companies provide neural network prediction services Cloud to users for a wide range of applications. However, current Client Cryptographic Protocol prediction systems compromise one party’s privacy: either Data NN Model the user has to send sensitive inputs to the service provider for Prediction classification, or the service provider must store its proprietary neural networks on the user’s device. The former harms the personal privacy of the user, while the latter reveals the service Figure 1: Cryptographic neural network inference. The lock indi- cates data provided in encrypted form. provider’s proprietary model. We design, implement, and evaluate DELPHI, a secure pre- tion over (convolutional) neural networks [Gil+16; Moh+17; diction system that allows two parties to execute neural net- Liu+17a; Juv+18] by utilizing specialized secure multi-party work inference without revealing either party’s data. DELPHI computation (MPC) [Yao86; Gol+87]. At a high level, these approaches the problem by simultaneously co-designing cryp- protocols proceed by encrypting the user’s input and the ser- tography and machine learning. We first design a hybrid cryp- vice provider’s neural network, and then tailor techniques for tographic protocol that improves upon the communication computing over encrypted data (like homomorphic encryption and computation costs over prior work. Second, we develop a or secret sharing) to run inference over the user’s input. At the planner that automatically generates neural network architec- end of the protocol execution, the intended party(-ies) learn ture configurations that navigate the performance-accuracy the inference result; neither party learns anything else about trade-offs of our hybrid protocol. -
Patents and Standards : a Modern Framework for IPR-Based Standardisation
Patents and standards : a modern framework for IPR-based standardisation Citation for published version (APA): Bekkers, R. N. A., Birkman, L., Canoy, M. S., De Bas, P., Lemstra, W., Ménière, Y., Sainz, I., Gorp, van, N., Voogt, B., Zeldenrust, R., Nomaler, Z. O., Baron, J., Pohlmann, T., Martinelli, A., Smits, J. M., & Verbeek, A. (2014). Patents and standards : a modern framework for IPR-based standardisation. European Commission. https://doi.org/10.2769/90861 DOI: 10.2769/90861 Document status and date: Published: 01/01/2014 Document Version: Publisher’s PDF, also known as Version of Record (includes final page, issue and volume numbers) Please check the document version of this publication: • A submitted manuscript is the version of the article upon submission and before peer-review. There can be important differences between the submitted version and the official published version of record. People interested in the research are advised to contact the author for the final version of the publication, or visit the DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research.