Skip to content

Tauri for cross-platform apps

One of the most well-known framework to create cross-platform apps is Electron. In it you write your app in Javascript or Typescript. This code runs in a node environment and the GUI is displayed in a browser. Like this, the app can be ported easily to different operating systems. Even mobile systems are supported. One (…)

Swiss Post’s digital ambitions continue alongside EPFL

Already involved with EPFL, especially with the Center for Digital Trust (C4DT), the Mobility lab Sion Valais, the EPFL FORUM, the Applied Machine Learning Days and the supervision of master’s degree internships, the Swiss Post is seeking to accelerate the start of collaborations with the entire EPFL ecosystem by joining the EPFL’s one-year acceleration program KNOVA.

ARNO: Adversarial robustness via Knowledge Distillation

State-of-the-art architectures for modulation recognition are typically based on deep learning models. However, recently these models have been shown to be quite vulnerable to very small and carefully crafted perturbations, which pose serious questions in terms of safety, security, or performance guarantees at large. While adversarial training can improve the robustness of the network, there is still a large gap between the performance of the model against clean and perturbed samples. Based on recent experiments, the data used during training could be an important factor in the susceptibility of the models. Thus, the objective of this project is to research the effects of proper data selection, cleaning and preprocessing of the samples used during training on robustness.

Deploying Decentralized, Privacy-Preserving Proximity Tracing

Contact tracing is a time-proven technique for breaking infection chains in epidemics. Public health officials interview those who come in contact with an infectious agent, such as a virus, to identify exposed, potentially infected people. These contacts are notified that they are at risk and should take efforts to avoid infecting others—for example, by going into quarantine, taking a test, wearing a mask continuously, or taking other precautionary measures.

MULAN: Adversarial Attacks in Neural Machine Translation Systems

Recently, deep neural networks have been applied in many different domains due to their significant performance. However, it has been shown that these models are highly vulnerable to adversarial examples. Adversarial examples are slightly different from the original input but can mislead the target model to generate wrong outputs. Various methods have been proposed to craft these examples in image data. However, these methods are not readily applicable to Natural Language Processing (NLP). In this project, we aim to propose methods to generate adversarial examples for NLP models such as neural machine translation models in different languages. Moreover, through adversarial attacks, we mean to analyze the vulnerability and interpretability of these models.

About us

The Center for Digital Trust is an academic-industry alliance of international relevance that facilitates innovation in digital trust services and products. The center brings together 15 industry partners, 43 EPFL laboratories, civil society, and policy actors to collaborate, share insights, and gain early access to trust-building technologies, building on state-of-the-art research at EPFL and beyond. (…)

Pillars & Verticals

C4DT provides its partners access to knowledge and expertise distributed over EPFL’s research labs in the following trust-building technologies pillars. Furthermore, its community builds on 5 application verticals to illustrate how these technologies contribute to solving the challenges of achieving trust in the digital world.

Domains

5 service domains respond to partners’ needs in terms of collaboration and community, education, open-source state-of-the-art prototype showcasing and projects

Omniledger

A fast and efficient blockchain created by the lab of prof. Bryan Ford.

C4DT Conference on Cyberattack Reporting Obligation

The Federal Council described cyberattacks as “a serious threat for Switzerland’s security and economy” and proposed a law for a reporting obligation for cyberattacks on critical infrastructures in its press release of January 12th 2022.

This 1-day conference, organized by C4DT in collaboration with UNIL’s Faculty of Law, Criminal Sciences and Public Administration (FDCA) and Trust Valley, will bring together government, public and private sectors and academia to discuss the proposed reporting obligation. Through case studies of past cyberattacks in Switzerland and simulations of possible critical infrastructure attacks, we aim to raise awareness of the cyber-risks with communal, cantonal and federal authorities, critical infrastructure providers as well as all organisations impacted by this law.

For more information about the event (speakers and agenda) please click below.

test.vim: running tests the easy way

As we all know, writing tests when developing software is very important¹. Indeed, most modern programming environments have frameworks to write and run tests, sometimes even in the standard tooling: pytest for Python, cargo test for Rust, go test for Go, etc. Let’s set aside the actual writing of the tests themselves for a moment, (…)

The SwissCovid App

In response to the COVID-19 disease that has stormed the world since early 2020, many countries launched initiatives seeking to help contact tracing by leveraging the mobile devices people carry with them. The Federal Office of Public Health (FOPH) commissioned the effort for Switzerland, which resulted in the official SwissCovid application and infrastructure. This document (…)

Cross-platform network programming in wasm/libc

I’m still working on my fledger project. It’s goal is to create a node for a decentralized system directly in the browser. For this I want the following: Works in the browser or with a CLI: have a common codebase but use different network implementations Direct browser to browser communication: use the WebRTC protocol for (…)

Technology Monitoring and Management (TMM)

The objective of the TMM project is to identify, at an early stage, the risks associated with new technologies and develop solutions to ward off such threats. It also aims to assess existing products and applications to pinpoint vulnerabilities. In that process, artificial intelligence and machine learning will play an important part. The main goal of this project is to automatically identify technology offerings of Swiss companies especially in the cyber security domain. This also includes identifying key stakeholders in these companies, possible patents, published scientific papers.

Shoup on Proof of History

For a long time I tried to understand what Proof-of-History brings to the table. What is it useful for? What problem does it solve? At the beginning of may 2022, Victor Shoup, who is a renowned cryptographer and currently working at DFinity, took a deep dive into Proof of History. He wrote an opinion paper on (…)

GymInf – Sécurité et Confidentialité

Course given under the GymInf program of swissuniversities by Linus Gasser.

Subjects for the course:

– why your opinion is worth money
– abusive data collection on personal devices
– protecting internet connections using TLS
– usefulness of blockchains for the decentralization of trust
– homomorphic cryptography for secure data sharing
– legislation on security and privacy in Switzerland, Europe, and elsewhere

Disco

Disco is a framework to implement machine learning algorithms that run in a browser. This allows testing new privacy-preserving decentralized ML algorithms.

Magic-Wormhole: communicate a secret easily

The problem Here is a common scenario we have all run into: you need to communicate some piece of secret information, say a password, to another person. Perhaps it’s on-boarding a new colleague, or to allow access for a partner. But you don’t want to compromise this secret by transmitting it over an insecure channel, (…)

Tandem

The Tandem / Monero project is a collaboration with Kudelski. It secures private keys in a privacy-preserving way.

[FR] Deep fakes: «La manipulation des images en période de guerre n’a rien de nouveau»

Il n’aura pas fallu longtemps pour que les deep fakes, ces vidéos inventées de toutes pièces à partir de vidéos publiques par des algorithmes, s’invitent dans la guerre qui oppose la Russie à l’Ukraine depuis l’invasion de cette dernière le 24 février 2022. Le 16 mars dernier, des médias ukrainiens ont été piratés, diffusant une vidéo contrefaite du président ukrainien Volodymyr Zelensky annonçant la capitulation de l’armée ukrainienne. Peu après, c’est une fausse vidéo de Vladimir Poutine annonçant un accord de paix qui était diffusé par des hackers malveillants du camp adverse.

Applied Machine Learning Days – AI & Healthcare

The track “AI & Healthcare” aims at bringing together researchers from academia, public health, start-ups and industry to share experiences and best practices, to jointly discuss the potential of AI in the transformation of healthcare towards a trustworthy system with improved patient and society outcomes.