Audrey Tang

Zero knowledge proofs, fully homomorphic encryptions, split learning, if you have to use deep learning, and things like that that are provably private or provably secrecy keeping. Differential privacy is a good example.

鍵盤快捷鍵Keyboard shortcuts

j 下一段next speechk 上一段previous speech