<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>UNI FR</provider_name><provider_url>https://www.uni.lu/fr</provider_url><author_name>UNI FR</author_name><author_url>https://www.uni.lu/fr</author_url><title>Privacy &amp; Security for Artificial Intelligence</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="iuSqcnEK4V"&gt;&lt;a href="https://www.uni.lu/fr/events/privacy-security-for-artificial-intelligence/"&gt;Privacy &amp; Security for Artificial Intelligence&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.uni.lu/fr/events/privacy-security-for-artificial-intelligence/embed/#?secret=iuSqcnEK4V" width="600" height="338" title="&#xAB;&#xA0;Privacy &amp; Security for Artificial Intelligence&#xA0;&#xBB; &#x2014; UNI FR" data-secret="iuSqcnEK4V" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(c,d){"use strict";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(/[^a-zA-Z0-9]/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),n=d.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),o=new RegExp("^https?:$","i"),l=0;l&lt;n.length;l++)n[l].style.display="none";for(l=0;l&lt;i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute("style"),"height"===t.message){if(1e3&lt;(s=parseInt(t.value,10)))s=1e3;else if(~~s&lt;200)s=200;r.height=s}if("link"===t.message)if(s=d.createElement("a"),a=d.createElement("a"),s.href=r.getAttribute("src"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener("message",c.wp.receiveEmbedMessage,!1),d.addEventListener("DOMContentLoaded",t,!1),c.addEventListener("load",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf("MSIE 10"),a=!!navigator.userAgent.match(/Trident.*rv:11\./),i=d.querySelectorAll("iframe.wp-embedded-content"),n=0;n&lt;i.length;n++){if(!(r=(t=i[n]).getAttribute("data-secret")))r=Math.random().toString(36).substr(2,10),t.src+="#?secret="+r,t.setAttribute("data-secret",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute("security"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:"ready",secret:r},"*")}}}}(window,document);
&lt;/script&gt;
</html><thumbnail_url>https://www.uni.lu/wp-content/uploads/sites/11/2026/03/03120045/UNIV_SM-Profile_1600x1600px-scaled.jpg</thumbnail_url><thumbnail_width>2560</thumbnail_width><thumbnail_height>2560</thumbnail_height><description>The rise of cloud computing technology led to a paradigm shift in technological services that enabled enterprises to delegate their data analytics tasks to third party (cloud) servers.&#xA0;Machine&#xA0;learning as a&#xA0;service (MLaaS) provides stakeholders&#xA0;with&#xA0;the ease to perform machine learning tasks on a cloud platform.&#xA0;The&#xA0;advantage of outsourcing these computationally-intensive operations unfortunately comes with high cost in terms of&#xA0;privacy exposures. The goal is therefore to come up with customised&#xA0;machine learning&#xA0;algorithms&#xA0;that would,&#xA0;by design,&#xA0;preserve the privacy of the processed data. Advanced cryptographic techniques,&#xA0;such as fully homomorphic encryption or secure multi-party computation,&#xA0;enable the execution of some operations over encrypted data and therefore can be considered as potential candidates for these algorithms.&#xA0;However, these incur high computational and/or communication costs for some operations.&#xA0;During this online event, Prof. Melek&#xA0;&#xD6;nen,&#xA0;associate&#xA0;professor in the Digital Security Department at EURECOM (Sophia-Antipolis, France),&#xA0;will analyse the tension between&#xA0;machine learning&#xA0;techniques and relevant cryptographic tools.&#xA0;Furthermore, she will give an&#xA0;overview existing solutions addressing both privacy and security.Join the event by following this link:&#xA0;https://unilu.webex.com/unilu/j.php?MTID=ma76ec8727da2e913fd139157cd0e833b&#xA0;(event password:&#xA0;4M5sTM9iPvW, from phones:&#xA0;46578694)</description></oembed>
