Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/7d/37/63/7d37639c-843b-e6ce-9fdb-2fe4ec33a4e7/mza_11927325629991683758.jpg/600x600bb.jpg
EDGE AI POD
EDGE AI FOUNDATION
74 episodes
2 days ago
"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...
Show more...
Technology
RSS
All content for EDGE AI POD is the property of EDGE AI FOUNDATION and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/7d/37/63/7d37639c-843b-e6ce-9fdb-2fe4ec33a4e7/mza_11927325629991683758.jpg/600x600bb.jpg
Stochastic Training for Side-Channel Resilient AI
EDGE AI POD
18 minutes
3 months ago
Stochastic Training for Side-Channel Resilient AI
Protecting valuable AI models from theft is becoming a critical concern as more computation moves to edge devices. This fascinating exploration reveals how sophisticated attackers can extract proprietary neural networks directly from hardware through side-channel attacks - not as theoretical possibilities, but as practical demonstrations on devices from major manufacturers including Nvidia, ARM, NXP, and Google's Coral TPUs. The speakers present a novel approach to safeguarding existing hard...
EDGE AI POD
"Do you trust your AI models? Honestly, I don't trust them. We should not trust them." These powerful words from STMicroelectronics' Mounia Kharbouche perfectly capture the security challenge facing the edge AI world today. As organizations rush to deploy AI workloads at the edge, a complex security landscape emerges that demands careful navigation. This fascinating panel discussion dives deep into the three major threat vectors organizations must prepare for: algorithmic attacks that m...