{"672894":{"#nid":"672894","#data":{"type":"event","title":"SCP Faculty Candidate Seminar - Teodora Baluta","body":[{"value":"\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EWho? \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003ETeodora Baluta\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EWhat?\u003C\/span\u003E\u003C\/strong\u003E \u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cem\u003E\u003Cspan\u003ENew Algorithmic Tools for Rigorous Machine Learning Security Analysis\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003Cem\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/em\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EWhen?\u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003E Tuesday, February 27, 2024 @ 11 a.m.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EWhere? \u003C\/span\u003E\u003C\/strong\u003E\u003Cspan\u003ECODA 9th floor Atrium 0920 or virtually on \u003Ca href=\u0022https:\/\/gatech.zoom.us\/webinar\/register\/WN_jZ_l0OYESReDj_UgbURUUQ\u0022\u003EZoom\u003C\/a\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003EWill there be free lunch?\u003C\/strong\u003E \u003Cstrong\u003EYES!\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Ch4\u003EAdditional information\u003C\/h4\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EAbstract: \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003EMachine learning security is an emerging area with many open questions lacking systematic analysis. In this talk, I will present three new algorithmic tools to address this gap: (1) algebraic proofs; (2) causal reasoning; and (3) sound statistical verification. Algebraic proofs provide the first conceptual mechanism to resolve intellectual property disputes over training data. I show that stochastic gradient descent, the de-facto training procedure for modern neural networks, is a collision-resistant computation under precise definitions. These results open up connections to lattices, which are mathematical tools used for cryptography presently. I will also briefly mention my efforts to analyze causes of empirical privacy attacks and defenses using causal models, and to devise statistical verification procedures with \u2018probably approximately correct\u2019 (PAC)-style soundness guarantees.\u003C\/span\u003E\u003C\/span\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EBio: \u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003ETeodora Baluta is a Ph.D. candidate in Computer Science at the National University of Singapore. She enjoys working on security problems that are both algorithmic in nature and practically relevant. She is one of the EECS Rising Stars 2023, a Google PhD Fellow, a Dean\u2019s Graduate Research Excellence Award recipient and a President\u2019s Graduate Fellowship recipient at NUS. She interned at Google Brain working in the Learning for Code team. Her works are published in security (CCS, NDSS), programming languages\/verification conferences (OOPSLA, SAT), and software engineering conferences (ICSE, ESEC\/FSE). More details are available on her webpage: \u003C\/span\u003E\u003Ca href=\u0022https:\/\/teobaluta.github.io\/\u0022 title=\u0022https:\/\/teobaluta.github.io\/\u0022\u003Ehttps:\/\/teobaluta.github.io\/\u003C\/a\u003E\u003Cspan\u003E.\u0026nbsp;\u003C\/span\u003E\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cspan\u003E\u003Cstrong\u003E\u003Cspan\u003EZoom link for Presentation:\u003Cspan\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/strong\u003E\u003C\/span\u003E\u003Ca href=\u0022https:\/\/gatech.zoom.us\/webinar\/register\/WN_jZ_l0OYESReDj_UgbURUUQ\u0022 title=\u0022https:\/\/gatech.zoom.us\/webinar\/register\/WN_jZ_l0OYESReDj_UgbURUUQ\u0022\u003Ehttps:\/\/gatech.zoom.us\/webinar\/register\/WN_jZ_l0OYESReDj_UgbURUUQ\u003C\/a\u003E\u003C\/p\u003E\r\n","summary":"","format":"limited_html"}],"field_subtitle":"","field_summary":[{"value":"\u003Cp\u003EOn \u003Cspan\u003ETuesday, February 27, 2024 @ 11 a.m., \u003C\/span\u003Ethe School of Cybersecurity and Privacy will be hosting \u003Cspan\u003E\u003Cspan\u003ETeodora Baluta\u003C\/span\u003E, a Ph.D. candidate in computer science at the National University of Singapore. Join us for Baluta\u0027s talk, \u003Cem\u003E\u003Cspan\u003ENew Algorithmic Tools for Rigorous Machine Learning Security Analysis\u003C\/span\u003E\u003C\/em\u003E\u003C\/span\u003E\u003Cem\u003E\u003Cspan\u003E\u003Cspan\u003E, \u003C\/span\u003E\u003C\/span\u003E\u003C\/em\u003E\u003Cspan\u003E\u003Cspan\u003Eand grab a free lunch on us! More details below.\u003C\/span\u003E\u003C\/span\u003E\u003C\/p\u003E\r\n","format":"limited_html"}],"field_summary_sentence":[{"value":"On Tuesday, February 27, 2024 @ 11 a.m., the School of Cybersecurity and Privacy will be hosting Teodora Baluta, a Ph.D. candidate in computer science at the National University of Singapore. "}],"uid":"36253","created_gmt":"2024-02-12 20:12:18","changed_gmt":"2024-02-19 11:59:54","author":"John Popham","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2024-02-27T11:00:00-05:00","event_time_end":"2024-02-27T12:00:00-05:00","event_time_end_last":"2024-02-27T12:00:00-05:00","gmt_time_start":"2024-02-27 16:00:00","gmt_time_end":"2024-02-27 17:00:00","gmt_time_end_last":"2024-02-27 17:00:00","rrule":null,"timezone":"America\/New_York"},"location":"CODA 9th floor Atrium 0920","extras":["free_food"],"hg_media":{"673056":{"id":"673056","type":"image","title":"Baluta Talk.jpg","body":null,"created":"1707768759","gmt_created":"2024-02-12 20:12:39","changed":"1707768759","gmt_changed":"2024-02-12 20:12:39","alt":"graphic","file":{"fid":"256407","name":"Baluta Talk.jpg","image_path":"\/sites\/default\/files\/2024\/02\/12\/Baluta%20Talk.jpg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/2024\/02\/12\/Baluta%20Talk.jpg","mime":"image\/jpeg","size":1336918,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/2024\/02\/12\/Baluta%20Talk.jpg?itok=3Mu3zx5u"}}},"media_ids":["673056"],"related_links":[{"url":"https:\/\/gatech.zoom.us\/webinar\/register\/WN_jZ_l0OYESReDj_UgbURUUQ","title":"Virtual Attendance Available Through Zoom (Registration through gatech Zoom account is required)"}],"groups":[{"id":"47223","name":"College of Computing"},{"id":"660367","name":"School of Cybersecurity and Privacy"}],"categories":[],"keywords":[{"id":"193480","name":"Cyber Attack; cyber threats report; cybersecurity; talk; seminar; "}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1795","name":"Seminar\/Lecture\/Colloquium"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"174045","name":"Graduate students"},{"id":"177814","name":"Postdoc"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003ESchool of Cybersecurity and Privacy\u003C\/p\u003E\r\n\r\n\u003Cp\u003Escp@cc.gatech.edu\u003C\/p\u003E\r\n","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}