YoVDO

Adversarial Examples for Proof-of-Learning

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Artificial Intelligence Courses Cybersecurity Courses Machine Learning Courses

Course Description

Overview

Explore the concept of "Adversarial Examples" in the context of Proof-of-Learning in this 21-minute IEEE conference talk. Delve into the research presented by a team from Zhejiang University, including Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, and Kui Ren. Gain insights into how adversarial techniques can be applied to learning verification systems and understand their potential implications for educational technology and cybersecurity.

Syllabus

"Adversarial Examples" for Proof-of-Learning


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Sensor Security
IEEE via YouTube
Tracking Ransomware End-to-end
IEEE via YouTube
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
IEEE via YouTube
Algorithmic Transparency via Quantitative Input Influence - Theory and Experiments with Learning Systems
IEEE via YouTube
Bitcoin Over Tor Isn't a Good Idea
IEEE via YouTube