Polynomial Time Cryptanalytic Extraction of Neural Network Models
Offered By: BIMSA via YouTube
Course Description
Overview
Explore a groundbreaking lecture on the cryptanalytic extraction of neural network models presented by renowned cryptographer Adi Shamir at ICBS2024. Delve into the critical issue of protecting deep neural networks (DNNs) from theft and parameter extraction. Learn about the historical context of this problem, including Charles Fefferman's 1994 findings and the Crypto'20 algorithm by Carlini, Jagielski, and Mironov. Discover Shamir's innovative techniques that enable the extraction of ReLU-based DNN parameters with high precision using both polynomial queries and time. Witness the practical application of this method on a full-sized neural network for CIFAR10 dataset classification, comparing the efficiency of the new approach to previous methods. Gain insights into the implications of this advancement for DNN security and the broader field of cryptography in this hour-long talk from the Beijing Institute of Mathematical Sciences and Applications (BIMSA).
Syllabus
Adi Shamir: Title: Polynomial Time Cryptanalytic Extraction of Neural Network Models #ICBS2024
Taught by
BIMSA
Related Courses
Internetwork SecurityIndian Institute of Technology, Kharagpur via Swayam Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera Cryptography and Information Theory
University of Colorado System via Coursera Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam An Introduction to Cryptography
Coventry University via FutureLearn