{"version":"1.0","provider_name":"UNI FR","provider_url":"https:\/\/www.uni.lu\/fr","author_name":"UNI FR","author_url":"https:\/\/www.uni.lu\/fr","title":"Privacy &amp; Security for Artificial Intelligence","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"bvKfnS7F1T\"><a href=\"https:\/\/www.uni.lu\/fr\/events\/privacy-security-for-artificial-intelligence\/\">Privacy &amp; Security for Artificial Intelligence<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.uni.lu\/fr\/events\/privacy-security-for-artificial-intelligence\/embed\/#?secret=bvKfnS7F1T\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Privacy &amp; Security for Artificial Intelligence\u00a0\u00bb &#8212; UNI FR\" data-secret=\"bvKfnS7F1T\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/www.uni.lu\/wp-content\/uploads\/sites\/11\/2026\/03\/03120045\/UNIV_SM-Profile_1600x1600px-scaled.jpg","thumbnail_width":2560,"thumbnail_height":2560,"description":"The rise of cloud computing technology led to a paradigm shift in technological services that enabled enterprises to delegate their data analytics tasks to third party (cloud) servers.\u00a0Machine\u00a0learning as a\u00a0service (MLaaS) provides stakeholders\u00a0with\u00a0the ease to perform machine learning tasks on a cloud platform.\u00a0The\u00a0advantage of outsourcing these computationally-intensive operations unfortunately comes with high cost in terms of\u00a0privacy exposures. The goal is therefore to come up with customised\u00a0machine learning\u00a0algorithms\u00a0that would,\u00a0by design,\u00a0preserve the privacy of the processed data. Advanced cryptographic techniques,\u00a0such as fully homomorphic encryption or secure multi-party computation,\u00a0enable the execution of some operations over encrypted data and therefore can be considered as potential candidates for these algorithms.\u00a0However, these incur high computational and\/or communication costs for some operations.\u00a0During this online event, Prof. Melek\u00a0\u00d6nen,\u00a0associate\u00a0professor in the Digital Security Department at EURECOM (Sophia-Antipolis, France),\u00a0will analyse the tension between\u00a0machine learning\u00a0techniques and relevant cryptographic tools.\u00a0Furthermore, she will give an\u00a0overview existing solutions addressing both privacy and security.Join the event by following this link:\u00a0https:\/\/unilu.webex.com\/unilu\/j.php?MTID=ma76ec8727da2e913fd139157cd0e833b\u00a0(event password:\u00a04M5sTM9iPvW, from phones:\u00a046578694)"}