One of the most well-known framework to create cross-platform apps is Electron. In it you write your app in Javascript or Typescript. This code runs in a node environment and the GUI is displayed in a browser. Like this, the app can be ported easily to different operating systems. Even mobile systems are supported. One (…)
Public and private institutions around the world are facing imminent risk of cyber assault threatening national security, critical assets and business continuity. Now, more than ever, building cyber resilience is an urgent priority for leaders in business and government.
The exclusive gathering will unite CEOs, board members, and government to discuss strategies for overcoming new cyber threats.
The conversation around cyber risk and business resiliency will address cyber security as a strategic business issue as opposed to just an operational one.
Recently, deep neural networks have been applied in many different domains due to their significant performance. However, it has been shown that these models are highly vulnerable to adversarial examples. Adversarial examples are slightly different from the original input but can mislead the target model to generate wrong outputs. Various methods have been proposed to craft these examples in image data. However, these methods are not readily applicable to Natural Language Processing (NLP). In this project, we aim to propose methods to generate adversarial examples for NLP models such as neural machine translation models in different languages. Moreover, through adversarial attacks, we mean to analyze the vulnerability and interpretability of these models.
A fast and efficient blockchain created by the lab of prof. Bryan Ford.
As we all know, writing tests when developing software is very important¹. Indeed, most modern programming environments have frameworks to write and run tests, sometimes even in the standard tooling: pytest for Python, cargo test for Rust, go test for Go, etc. Let’s set aside the actual writing of the tests themselves for a moment, (…)
In response to the COVID-19 disease that has stormed the world since early 2020, many countries launched initiatives seeking to help contact tracing by leveraging the mobile devices people carry with them. The Federal Office of Public Health (FOPH) commissioned the effort for Switzerland, which resulted in the official SwissCovid application and infrastructure. This document (…)
I’m still working on my fledger project. It’s goal is to create a node for a decentralized system directly in the browser. For this I want the following: Works in the browser or with a CLI: have a common codebase but use different network implementations Direct browser to browser communication: use the WebRTC protocol for (…)
The objective of the TMM project is to identify, at an early stage, the risks associated with new technologies and develop solutions to ward off such threats. It also aims to assess existing products and applications to pinpoint vulnerabilities. In that process, artificial intelligence and machine learning will play an important part. The main goal of this project is to automatically identify technology offerings of Swiss companies especially in the cyber security domain. This also includes identifying key stakeholders in these companies, possible patents, published scientific papers.
Lightarti is a mobile library developed in Rust, in collaboration with the SPRING lab at EPFL, the Tor team, and the original Arti library team.
C’est devenu un réflexe: avant de réserver un hôtel ou un restaurant sur Internet, on se précipite sur les avis des utilisateurs pour évaluer la qualité de l’établissement. Si les avis sont élogieux, on réserve dans la foulée. S’ils sont désastreux, on passe son chemin et on réservera le restaurant d’à côté….mais ces avis sont-ils crédibles ? S’agit-il seulement de vrais consommateurs ? Les plateformes de réservation contrôlent-elles la véracité des avis ? La réponse à ces questions est catégorique: absolument pas ! ABE a tenté une expérience spectaculaire qui prouve qu’on peut très facilement manipuler les avis des utilisateurs.
Disco is a framework to implement machine learning algorithms that run in a browser. This allows testing new privacy-preserving decentralized ML algorithms.
The problem Here is a common scenario we have all run into: you need to communicate some piece of secret information, say a password, to another person. Perhaps it’s on-boarding a new colleague, or to allow access for a partner. But you don’t want to compromise this secret by transmitting it over an insecure channel, (…)
The track “AI & Healthcare” aims at bringing together researchers from academia, public health, start-ups and industry to share experiences and best practices, to jointly discuss the potential of AI in the transformation of healthcare towards a trustworthy system with improved patient and society outcomes.
By joining forces, C4DT and IMI aim to offer a track dedicated to societal issues related to information and technology, at the intersection between media and trust in the digital world.
In this track, we explore the role of AI for cybersecurity – its blessing and its curse – and how the private sector, government and academia should collaborate to reduce the threat landscape of AI systems as well as to isolate them with safeguard mechanisms that make it easy to shut down if things start to go wrong.
The Rule of Law, Democracy and the Future of Europe in the Age of Artificial Intelligence in collaboration with Fondation Jean Monet pour l’Europe and EPFL.
One of the ways public blockchains are touted is that they can replace your bank account. The idea is that you don’t need a central system anymore, but can open any number of accounts, as needed. However, as there is no central place, it is sometimes difficult to know how much money you have left. (…)
Confidential computing is an increasingly popular means to wider Cloud adoption. By offering confidential virtual machines and enclaves, Cloud service providers now host organizations, such as banks and hospitals, that abide by stringent legal requirement with regards to their client’s data confidentiality. Unfortunately, confidential computing solutions depend on bleeding-edge emerging hardware that (1) takes long to roll out at the Cloud scale and (2) as a recent technology, it is bound to frequent changes and potential security vulnerabilities. This proposal leverage existing commodity hardware combined with new programming language and formal method techniques and identify how to provide similar or even more elaborate confidentiality and integrity guarantees than the existing confidential hardware.
As machine learning (ML) models are becoming more complex, there has been a growing interest in making use of decentrally generated data (e.g., from smartphones) and in pooling data from many actors. At the same time, however, privacy concerns about organizations collecting data have risen. As an additional challenge, decentrally generated data is often highly heterogeneous, thus breaking assumptions needed by standard ML models. Here, we propose to “kill two birds with one stone” by developing Invariant Federated Learning, a framework for training ML models without directly collecting data, while not only being robust to, but even benefiting from, heterogeneous data.
Olivier Crochat dirige le Center for Digital Trust, au sein de l’école polytechnique fédérale de Lausanne. Il revient sur le concept de confiance appliquée au monde digital avec un tour d’horizon des questions qui se posent aujourd’hui aux entreprises qui développent des services numériques basés sur la data et l’IA.
En deux ans de pandémie, la Suisse a fait du bon et du moins bon. Les deux épidémiologistes Marcel Salathé et Christian Althaus tirent un premier bilan, et appellent notamment à créer une cellule de crise nationale coordonnant les différents acteurs.
[et_pb_section fb_built=”1″ admin_label=”Hero” _builder_version=”4.7.7″ background_color=”#a0c3d2″ background_color_gradient_direction=”271deg” hover_enabled=”0″ collapsed=”off” sticky_enabled=”0″ custom_padding=”||||false|false”][et_pb_row column_structure=”1_2,1_2″ make_equal=”on” _builder_version=”4.7.7″ background_color=”#0091aa” background_size=”initial” background_position=”top_left” background_repeat=”repeat” width=”100%” max_width=”100%” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_color_all=”rgba(0,0,0,0)” border_style_all=”none” use_custom_width=”on” width_unit=”off” custom_width_percent=”100%” sticky_enabled=”0″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”60px|0px|100px|10%” custom_padding_tablet=”20px|10%|0px|10%” custom_padding_phone=”” custom_padding_last_edited=”on|desktop” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.7.7″ text_font=”Merriweather||on||||||” text_text_color=”rgba(255,255,255,0.5)” text_font_size=”26px” text_line_height=”1.8em” header_font=”||||||||” background_layout=”dark” custom_margin=”||||false|false” animation_style=”slide” animation_direction=”top” animation_intensity_slide=”10%” text_line_height_tablet=”1.8em” text_line_height_last_edited=”off|desktop”]February 7-11th, 2022, online[/et_pb_text][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][/et_pb_column][/et_pb_row][et_pb_row (…)
To promote research and education in cyber-defence, the EPFL and the Cyber-Defence (CYD) Campus have jointly launched the “CYD Fellowships – A Talent Program for Cyber-Defence Research.”
The fifth call for applications is now open with a rolling call for Master Thesis Fellowship applications, and with a deadline of 14 February 2022 (17:00 CEST) for Doctoral and Distinguished Postdoctoral Fellowship applications. Both new applications and resubmissions are strongly encouraged.
For the Travel & Connectivity Week at Expo 2020, the Swiss Pavilion is going to look at the mobility sector from the eyes of digitalisation. Matthias Finger, C4DT affiliated Professor, will be moderating the event.