The Rule of Law, Democracy and the Future of Europe in the Age of Artificial Intelligence
The Rule of Law, Democracy and the Future of Europe in the Age of Artificial Intelligence in collaboration with Fondation Jean Monet pour l’Europe and EPFL.
The Rule of Law, Democracy and the Future of Europe in the Age of Artificial Intelligence in collaboration with Fondation Jean Monet pour l’Europe and EPFL.
One of the ways public blockchains are touted is that they can replace your bank account. The idea is that you don’t need a central system anymore, but can open any number of accounts, as needed. However, as there is no central place, it is sometimes difficult to know how much money you have left. (…)
Confidential computing is an increasingly popular means to wider Cloud adoption. By offering confidential virtual machines and enclaves, Cloud service providers now host organizations, such as banks and hospitals, that abide by stringent legal requirement with regards to their client’s data confidentiality. Unfortunately, confidential computing solutions depend on bleeding-edge emerging hardware that (1) takes long to roll out at the Cloud scale and (2) as a recent technology, it is bound to frequent changes and potential security vulnerabilities. This proposal leverage existing commodity hardware combined with new programming language and formal method techniques and identify how to provide similar or even more elaborate confidentiality and integrity guarantees than the existing confidential hardware.
As machine learning (ML) models are becoming more complex, there has been a growing interest in making use of decentrally generated data (e.g., from smartphones) and in pooling data from many actors. At the same time, however, privacy concerns about organizations collecting data have risen. As an additional challenge, decentrally generated data is often highly heterogeneous, thus breaking assumptions needed by standard ML models. Here, we propose to “kill two birds with one stone” by developing Invariant Federated Learning, a framework for training ML models without directly collecting data, while not only being robust to, but even benefiting from, heterogeneous data.
Olivier Crochat dirige le Center for Digital Trust, au sein de l’école polytechnique fédérale de Lausanne. Il revient sur le concept de confiance appliquée au monde digital avec un tour d’horizon des questions qui se posent aujourd’hui aux entreprises qui développent des services numériques basés sur la data et l’IA.
En deux ans de pandémie, la Suisse a fait du bon et du moins bon. Les deux épidémiologistes Marcel Salathé et Christian Althaus tirent un premier bilan, et appellent notamment à créer une cellule de crise nationale coordonnant les différents acteurs.
[et_pb_section fb_built=”1″ admin_label=”Hero” _builder_version=”4.7.7″ background_color=”#a0c3d2″ background_color_gradient_direction=”271deg” hover_enabled=”0″ collapsed=”off” sticky_enabled=”0″ custom_padding=”||||false|false”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.7″ background_color=”#0091aa” background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” max_width=”100%” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_color_all=”rgba(0,0,0,0)” border_style_all=”none” use_custom_width=”on” width_unit=”off” custom_width_percent=”100%” sticky_enabled=”0″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”60px|0px|100px|10%” custom_padding_tablet=”20px|10%|0px|10%” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.7″ text_font=”Merriweather||on||||||” text_text_color=”rgba(255,255,255,0.5)” text_font_size=”26px” text_line_height=”1.8em” header_font=”||||||||” background_layout=”dark” custom_margin=”||||false|false” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”10%” text_line_height_tablet=”1.8em” text_line_height_last_edited=”off|desktop”]February 7-11th, 2022, online[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][/et_pb_row][et_pb_row (…)
To promote research and education in cyber-defence, the EPFL and the Cyber-Defence (CYD) Campus have jointly launched the “CYD Fellowships – A Talent Program for Cyber-Defence Research.”
The fifth call for applications is now open with a rolling call for Master Thesis Fellowship applications, and with a deadline of 14 February 2022 (17:00 CEST) for Doctoral and Distinguished Postdoctoral Fellowship applications. Both new applications and resubmissions are strongly encouraged.
For the Travel & Connectivity Week at Expo 2020, the Swiss Pavilion is going to look at the mobility sector from the eyes of digitalisation. Matthias Finger, C4DT affiliated Professor, will be moderating the event.
Some years ago, I was thinking that by directly look at code difference, I could estimate how faster it would run. I would reflect about complexity or how a given loop will be waay faster by precomputing some values. And of course, it is never that simple. Cache locality, threads synchronization and lock contention are (…)
I propose a new tool to characterize the resolution of uncertainty around FOMC press conferences. It relies on the construction of a measure capturing the level of discussion complexity between the Fed Chair and reporters during the Q&A sessions. I show that complex discussions are associated with higher equity returns and a drop in realized volatility. The method creates an attention score by quantifying how much the Chair needs to rely on reading internal documents to be able to answer a question. This is accomplished by building a novel dataset of video images of the press conferences and leveraging recent deep learning algorithms from computer vision. This alternative data provides new information on nonverbal communication that cannot be extracted from the widely analyzed FOMC transcripts. This paper can be seen as a proof of concept that certain videos contain valuable information for the study of financial markets.
We develop a methodology for detecting asset bubbles using a neural network. We rely on the theory of local martingales in continuous-time and use a deep network to estimate the diffusion coefficient of the price process more accurately than the current estimator, obtaining an improved detection of bubbles. We show the outperformance of our algorithm over the existing statistical method in a laboratory created with simulated data. We then apply the network classification to real data and build a zero net exposure trading strategy that exploits the risky arbitrage emanating from the presence of bubbles in the US equity market from 2006 to 2008. The profitability of the strategy provides an estimation of the economical magnitude of bubbles as well as support for the theoretical assumptions relied on.
We’re currently using OmniLedger for logging in to our Matrix-chat and to the c4dt.org website as users. This is explained in more details here: CAS-login for OmniLedger Account management in OmniLedger C4DT partner login Matrix on Mobile There were two elements missing: Automatic signup — in the current signup process, the C4DT admin team needs (…)
This C4DT partner workshop will take place online and is by invitation only.
For all C4DT partners: Please send us an email if you are interested in participating. This workshop is limited to 20 participants. We still have few “screens” open.
In this report we consider several real-life scenarios that may provoke causal research questions. As we introduce concepts in causal inference, we reference these case studies and other examples to clarify ideas and provide examples of how researchers are approaching topics using clear causal thinking.
The DEDIS team created a first version of the onChain secrets implementation using its skipchain blockchain. This implementation allows a client to store encrypted documents on a public but permissioned blockchain and to change the access rights to those documents after they have been written to the blockchain. The first implementation has been extensively tested by ByzGen and is ready to be used in a PoC demo.
This project aims at increasing its performance and stability, and make it production-ready. Further, it will add a more realistic testing platform that will allow to check the validity of new functionality in a real-world setting and find regressions before they are pushed to the stable repository.
This work aims at creating a Proof of Concept of storing and managing data on a blockchain. This work answers the following two use-cases: (i) compliant storage, transfer and access management of (personal) sensitive data and (ii) compliant cross-border or cross-jurisdiction data sharing.
DEDIS brings to the table a permissioned blockchain and distributed ledger using a fast catch up mechanism that allows for very fast processing of the requests, while staying secure. It also includes a novel approach to encryption and decryption, where no central point of failure can let the documents be published to outsiders (Calypso). Swiss Re brings to the table interesting use cases which will require DEDIS to extend Calypso to implement data location policies.
In this collaboration (structured in two projects) we develop an automated tool to flag messages sent by planes which are suspicious of using weak encryption mechanisms. We mainly focus on detecting the use of classical ciphers like substitution and transposition ciphers. The tool flags messages and identifies the family of ciphers. We also aim to develop automated decryption techniques for the weakest ciphers.
On my path of moving lab’s code to more human friendly program, I usually write some CLIs, to ease configuration and deployment. When developing the client, I want to test it, and see how complex it is to use it. The best language to express that is a shell as it is probably how the (…)
To serve the 80 million forcibly-displaced people around the globe, direct cash assistance is gaining acceptance. ICRC’s beneficiaries often do not have, or do not want, the ATM cards or mobile wallets normally used to spend or withdraw cash digitally, because issuers would subject them to privacy-invasive identity verification and potential screening against sanctions and counterterrorism watchlists. On top of that, existing solutions increase the risk of data leaks or surveillance induced by the many third parties having access to the data generated in the transactions. The proposed research focuses on the identity, account, and wallet management challenges in the design of a humanitarian cryptocurrency or token intended to address the above problems. This project is funded by Science and Technology for Humanitarian Action Challenges (HAC).
Modulation recognition state-of-the-art architectures use deep learning models. These models are vulnerable to adversarial perturbations, which are imperceptible additive noise crafted to induce misclassification, posing serious questions in terms of safety, security, or performance guarantees at large. One of the best ways to make the model robust is to use adversarial learning, in which the model is fine-tuned with these adversarial perturbations. However, this method has several drawbacks. It is computationally costly, has convergence instabilities and it does not protect against multiple types of corruptions at the same time. The objective of this project is to develop improved and effective adversarial training solutions that tackle these drawbacks.
EPFL Campus Lecture with Marietje Schaake, President of CyberPeace Institute.
Many popular cloud applications collect enormous amounts of information on their users. […] Raising awareness of the issue, and providing ways to reduce it, is a worthy goal.
Encryption provides a solution to security risks, but its flipside is that it can hinder law enforcement investigations. A new technology called client-side scanning (CSS) would enable targeted information to be revealed through on-device analysis, without weakening encryption or providing decryption keys. However, an international group of experts, including EPFL, has now released a report raising the alert, arguing that CSS neither ensures crime prevention nor prevents unwarranted surveillance.