Maya Maimon &
Katya shelenkova

Learning Models Privacy

NEC

Katya

Maya Maimon
& Katya shelenkova

Learning Models Privacy

NEC

Katya

Bio

Maya: Cyber Architect Innovation Coach at NEC Israel Research Center.

 

Leading several research projects in cyber, deep learning and artificial intelligence.

I am doing R&D and algorithms over 15 years in several companies including Microsoft, Samsung, Checkpoint and Intel.

 

My BSc and MSc are in computer sciences from Haifa U, specialized in Neuroscience.

 

Katya is an Innovation Coach at NEC Israel Research Center. She holds a B.Sc. in Mathematics and Informatics and an M.Sc. in Applied Math from the Techion.

Bio

Maya: Cyber Architect Innovation Coach at NEC Israel Research Center.

 

Leading several research projects in cyber, deep learning and artificial intelligence.

I am doing R&D and algorithms over 15 years in several companies including Microsoft, Samsung, Checkpoint and Intel.

 

My BSc and MSc are in computer sciences from Haifa U, specialized in Neuroscience.

 

Katya is an Innovation Coach at NEC Israel Research Center. She holds a B.Sc. in Mathematics and Informatics and an M.Sc. in Applied Math from the Techion.

Abstract

Privacy is a major concern is the modern world. AI solutions often use sensitive data, private conversations, personal images, health data and many more. Several big companies as Amazon, Google and Apple have already reported private data leaks, services were shut down and employees were fired. Another aspect of the problem is future development. Privacy rule, as GDPR, healthcare rule, companies’ secrets can impede the possibility to develop AI solution to various issues.

 

From user perspective, the problem also exists. Imagine any voice command device that can perform specific tasks like play a music or turn on the lights. Usually, all data is being sent to the cloud for analyzation. All our private data!! How do we do it differently? Can we avoid privacy violation as users and developers?

 

In this round table we plan to explain the different privacy aspects and discussed some solutions. Specifically, we will delve into MPC, Multi Party Computation that can compute a function without revealing the inputs. Only random data is being sent for analyses, but the random data is enough for the conclusion. We will also touch differential privacy need and solutions.

Abstract

Privacy is a major concern is the modern world. AI solutions often use sensitive data, private conversations, personal images, health data and many more. Several big companies as Amazon, Google and Apple have already reported private data leaks, services were shut down and employees were fired. Another aspect of the problem is future development. Privacy rule, as GDPR, healthcare rule, companies’ secrets can impede the possibility to develop AI solution to various issues.

 

From user perspective, the problem also exists. Imagine any voice command device that can perform specific tasks like play a music or turn on the lights. Usually, all data is being sent to the cloud for analyzation. All our private data!! How do we do it differently? Can we avoid privacy violation as users and developers?

 

In this round table we plan to explain the different privacy aspects and discussed some solutions. Specifically, we will delve into MPC, Multi Party Computation that can compute a function without revealing the inputs. Only random data is being sent for analyses, but the random data is enough for the conclusion. We will also touch differential privacy need and solutions.

Discussion Points

  • What kind of data is private? We will explore several concrete fields.
  • When do we care about privacy? How does it affect me?
  • Later, we will explain what is multi party computation- MPC. What kind of scenarios can be solved with MPC?
  • If time permits, how data can be leaked? What can be done about it?

Discussion Points

  • What kind of data is private? We will explore several concrete fields.
  • When do we care about privacy? How does it affect me?
  • Later, we will explain what is multi party computation- MPC. What kind of scenarios can be solved with MPC?
  • If time permits, how data can be leaked? What can be done about it?