The Fifth Elephant 2020 edition

The Fifth Elephant 2020 edition

On data governance, engineering for data privacy and data science

The ninth edition of The Fifth Elephant will be held in Bangalore on 16 and 17 July 2020.

The Fifth Elephant brings together over one thousand data scientists, ML engineers, data engineers and analysts to discuss:

  1. Data governance
  2. Data privacy and engineering for privacy including engineering for Personal Data Protection (PDP) bill.
  3. Data cleaning, annotation, instrumentation and productionizing data science.
  4. Identifying and handling fraud + data security at scale
  5. Feature engineering and ML platforms.
  6. What it takes to create data-driven cultures in organizations of different scales.

**Event details:

Dates: 16-17 July 2020
Venue: NIMHANS Convention Centre, Dairy Circle, Bangalore

Why you should attend:

  1. Network with peers and practitioners from the data ecosystem.
  2. Share approaches to solving expensive problems such as cleanliness of training data, annotation, model management and versioning data.
  3. Demo your ideas in the demo sessions.
  4. Join Birds of Feather (BOF) sessions to have productive discussions on focussed topics. Or, start your own Birds of Feather (BOF) session.

Contact details:
For more information about The Fifth Elephant, call +91-7676332020 or email sales@hasgeek.com


Hosted by

The Fifth Elephant - known as one of the best data science and Machine Learning conference in Asia - has transitioned into a year-round forum for conversations about data and ML engineering; data science in production; data security and privacy practices. more

upendra singh

@upendrasingh1

Privacy Preserving AI: Protecting User Privacy without Compromising Quality of Service

Submitted Feb 19, 2020

There are a numerous ways in which an “adversary” can exploit a users interaction with an AI based system(for example Recommender Systems!). Let us take three use cases:

  1. Continuious observation of recommendations with some background information makes it possible to infer the individual’s rating or even transaction history, especially for neighborhood-based methods. An adversary can infer the rating history of an active user by creating fake neighbours based on background information.
  2. There are two possible queries for a location-based service: snapshot and continuous queries. A snapshot query is a request submitted once by the user. For example,Where is the closest Tea Shop? A continuous query is submitted at discrete time points by the same user. For example, Continuously send me petrol price coupons as I travel the highway. Both types of queries are prevalent nowadays in location based systems. Adversary can infer the current location (from snapshot query) or the trajectory (from continuous query) of the user.
  3. Like other machine learning models, deep learning models are susceptible to several types of attacks. For example, a centralized collection of photos, speech, and video clips from millions of individuals might meet with privacy risks when shared with others. Learning models can also disclose sensitive information.Potential privacy leaks can stem from malicious inference with the model’s inputs and outputs.

There are many many such potentially exploitative use cases where not only users privacy is being threatened but also can pose danger to the user.

How can we solve privacy problems in our AI applications?

For recommendation based, location based, deep learning based services, Privacy Preserving AI calls for methods that preserve as much as the quality of the desired services, while hindering the undesired tracking/exploitative capacities of those services. We will discuss how we can solve privacy problems in our AI applications.

Outline

Note: Will update this over the next few days and weeks

  1. First we will discuss various kind of threats like reconstruction attacks, model inversion attacks, membership inference attacks, de-anonymization attack.
  2. Various approaches on how to tackle attacks using various techniques like:
    Cryptographic Approaches like Homomorphic Encryption, Garbled Curcuits, Secret Sharing, Secure Processors
    Perturbation Approaches like differential privacy(local and global), dimensionality reduction
    Differential Privacy for Deep Learning, Secure Federated Learning
  3. Encrypted Deep Learning: Building encrypted dataset and generate an encrypted prediction with an encrypted neural network on an encrypted dataset(Hands On Demo!)

Speaker bio

Speaker is a seasoned full stack data scientist with close to 12+ years of experience in data science, machine learning and big data engineering.
Senior Principal Architect - Data Sciences @ Epsilon

Comments

{{ gettext('Login to leave a comment') }}

{{ gettext('Post a comment…') }}
{{ gettext('New comment') }}
{{ formTitle }}

{{ errorMsg }}

{{ gettext('No comments posted yet') }}

Hosted by

The Fifth Elephant - known as one of the best data science and Machine Learning conference in Asia - has transitioned into a year-round forum for conversations about data and ML engineering; data science in production; data security and privacy practices. more