SlideShare una empresa de Scribd logo
1 de 75
Decentralized AI for the Rest
of Us
Jesus Rodriguez
Chief Scientist
Invector Labs
About Me
• Founder and Chief Scientist at Invector Labs(http://invectorlabs.com )
• Next generation software development on-demand agency
• Focused on deep technologies (AI, blockchain…)
• Speaker, author (https://medium.com/@jrodthoughts)
• Investor, board member on over a dozen deep-tech companies
Agenda
• The challenges of centralized AI
• Decentralizing AI: risks and promises
• Foundational blocks
• Homomorphic Encryption
• GAN cryptography
• Secure multi-party computations
• Federated Learning
• Blockchains/Tokens
• Existing decentralized AI platforms
Some References
• Why Decentralized AI Matters Part I: Economics and Enablers:
https://medium.com/datadriveninvestor/why-decentralized-ai-matters-
part-i-economics-and-enablers-5576aeeb43d1
• Why Decentralized AI Matters Part II: Technological Enablers:
https://medium.com/datadriveninvestor/why-decentralized-ai-matters-
part-ii-technological-enablers-a67e3115312e
• Why Decentralized AI Matters Part III: Platforms:
https://medium.com/datadriveninvestor/why-decentralized-ai-matters-
part-iii-technologies-930c3c9d10d
• AI Has Not One, Not Two, but Many Centralization Problems:
https://hackernoon.com/ai-has-not-one-not-two-but-many-
centralization-problems-a5f0664361ed
•
Decentralized AI: Hype vs. Reality
What does the hype look like?
HYPE
HYPE
HIGH
HYPE
Reality is way simpler…
We Have Hundreds of Millions of Devices
Running AI Models
Decentralized Architectures Are Here to Stay
Lessons from Economics…
The Evolution of Economic Movements
Centralized
Decentralized
Recentralized
The Centralized Nature of AI…
Four Centralization Vectors of AI
Data Models
Training
Regularization-
Optimization
AI
Centralization
Vectors
The Data Centralization Problem
The Model Centralization Problem
The Model Centralization Problem
The Regularization-Optimization Centralization
Problem
Let’s Get Philosophical:
Risks of Centralized AI…
The Risks of Centralized AI
The
Decentralized
Knowledge –
Centralized AI
Friction
The Rich Get
Richer Problem
Risks of
Centralized AI
The
Transparency
Influence
Ratio
The Rich Get Richer Problem
Big Companies Have a
Data Advantage Over
Startups When It Comes
to AI
A Big Company Decides
to Create Different AI
Models Against Their
Proprietary Datasets
AI Models Produce Even
More Proprietary Data
and Intelligence
Decentralized Knowledge vs. Centralized Models
How can we know if
the knowledge of an
AI model is correct?
Knowledge is an
intrinsically
decentralized
activity
But companies
insist on
constraining AI
models to
proprietary datasets
The Transparency/Influence Ratio
AI algorithms are
increasingly
important in our
lives?
But we know very
little about them?
Who trains it?
How was it
trained?
How does it build
knowledge?
Makes sense…
Let’s Decentralize the Whole Thing…
Not so fast…
Challenges to Achieve AI Decentralization
• Can third parties be
correctly incentivized to
contribute to the
knowledge and quality
of an AI model?
• Can the activity and
behavior of an AI model
be transparently
available to all parties
without the need of
trusting a centralized
authority?
• Can models be
distributed and
executed autonomously
across hundreds of
thousands of nodes?
• Can entities train a
model without having
to disclose their data?
The Privacy
Problem
The
Autonomy
Problem
The
Economic
Problem
The
Transparency
Problem
Trends Influencing Decentralized AI…
Data Privacy in Decentralized AI Architectures…
You know….
security and
that stuff
The Challenges
• How to share data with
different parties while
maintaining certain levels
of privacy?
• How to perform
computations over
encrypted data?
• How to become resilient
to privacy attacks in a
decentralized network?
Homomorphic Encryption…
Homomorphic Encryption
• Alice wants workers to assemble
raw materials into jewelry.
• But Alice is worried about theft:
• She wants workers to process
raw materials without having
access.
• Alice puts raw materials in a locked
glovebox.
• Workers assemble jewelry inside
glovebox, using the gloves.
• Alice unlocks the box to get “results.”
A More Practical Example
Alice
Server
(Cloud)
(Input: data x,
secret key sk)
“I want 1) the cloud to process my data
2) even though it is encrypted.”
Encpk[f(x)]
Encpk(x)
function f
f(x)
Run
Eval[ f, Encpk(x) ]
= Encpk[f(x)]
The special sauce! For security
parameter λ, Eval’s running should
be Time(f)∙poly(λ)
This could be
encrypted too.
Delegation: Should cost less for
Alice to encrypt x and decrypt f(x)
than to compute f(x) herself.
Full vs. Partial Homomorphic Encryption
• Given the encryption of two data primitives a and b: E(a) and E(b)
• Partial homomorphic encryption can compute E(a+b) or E(ab) without
knowing a, b, or the private key
• Unpadded RSA https://en.wikipedia.org/wiki/RSA_cryptosystem
• ElGamal https://en.wikipedia.org/wiki/ElGamal_encryption
• Paillier https://en.wikipedia.org/wiki/Paillier_cryptosystem
• Full homomorphic encryption can compute both E(a+b) and E(ab)
• Gentry
• van Dijk-Gentry-Halevi-Vaikuntanathan
Homomorphic Encryption and Decentralized AI
HEnc(Dataset)
HEnc(Results)
Data Scientists
Homomorphic Encryption Today
• Remains mostly a theoretical exercise
• Companies such as IBM and Microsoft have released research
frameworks for partial homomorphic encryption
• HElib https://github.com/shaih/HElib
Adversarial Neural Cryptography…
GAN Cryptography
• Simpler alternative to homomorphic encryption
• Uses generative adversarial neural networks (GANs) to protect
communications between two parties
• The encryption algorithms evolve dynamically with the performance
of the networks
GAN Cryptography
• Alice and Bob are neural networks
trying to communicate securely while
Eve tries to break the communication
• The outputs from Eve (Peve) are
factored in the lost function for both
Alice and Bob
• Alice and Bob both discover new
encryption algorithms that can
defeat the best version of Eve
GAN Cryptography and Decentralized AI
GAN Data
Provider
GAN Data
Scientist
GAN Data
Scientist
GAN
Listener
Enc(Dataset)
GAN Cryptography Today
• Remains mostly an active research area
• Some lightweight implementations like Numerai are available
Secured Multi-Party Computations…
sMPC
• Solves the traditional millionaires’ problem for n-parties
• A group of millionaires, are interested in knowing which of them is
richer without revealing their actual wealth. This problem is analogous
to a more general problem where there are two numbers a and b and
the goal is to solve the inequality without revealing the actual values
of a and b.
• Enable secure computations in a network without a trusted party
sMPC
• A set of parties with private inputs
• Parties wish to jointly compute a function
of their inputs so that certain security
properties (like privacy and correctness)
are preserved
• Properties must be ensured even if some
of the parties maliciously attack the
protocol
• Examples
• Secure elections
• Auctions
• Privacy preserving data mining
sMPC and Decentralized AI
HEnc(Dataset)
HEnc(Results)
Data Scientists
sMPC Cryptography Today
• Several sMPC frameworks and libraries available
• The Enigma blockchain (https://enigma.co/ ) is one of the most
complete and scalable sMPC implementations in the market
Solving Decentralized Learning…
How to
learn
without the
man?
The Challenges
• How to execute machine
learning models on mobile
or IoT devices?
• How to customize a
machine learning model
based on personal data?
• How to improve a
machine learning model
based on executions
across a large number of
devices?
Federated Learning…
Federated Learning
Federated Learning
Federated Learning
Federated Learning
Federated Learning
Federated Learning and Decentralized AI
AI
Execution
Node
AI
Execution
Node
AI
Execution
Node
AI
Execution
Node
Federated
Training
Node
Federated
AI
Training-
Execution
Node
AI
Training-
Execution
Node
AI
Training-
Execution
Node
AI
Training-
Execution
Node
AI
Training-
Execution
Node
Decentralized
Federated Learning Today
• There are several implementations available on TensorFlow Lite
• Google has been testing federated learning on Gboard
https://www.blog.google/products/search/gboard-now-on-android/
A Runtime for Decentralized AI…
How do we
run these
things?
Challenges
• How to train models without a
centralized authority?
• How to use trained models without
trusting a central party?
• How to validate and enforce trust
among the different parties in the
lifecycle of a deep learning model
Blockchains and Smart Contracts…
Blockchains and Smart Contracts
Smart Contracts and Decentralized AI
Data Scientist
(builds and
train model)
Blockchain
Smart
Contract
Blockchain
Smart
ContractCompany
Data Scientist
(tests and
optimizes
model)
Data and Success
Criteria
Blockchain
Smart
Contract
Solving the Incentive Problem…
How to pay
the data
geeks?
Challenges
• How to build incentives for data
scientists training, testing and building
models?
• How to build incentives for parties
contributing datasets?
• How to discourage bad behaviors in
the network?
Tokenized crypto protocols…
Crypto Tokens
Tokenized Decentralized AI
Data Scientist
(builds and
train model)
Blockchain
Smart
Contract
Blockchain
Smart
ContractCompany
Data Scientist
(tests and
optimizes
model)
Data and Success
Criteria
Blockchain
Smart
Contract
Tokens
Tokens
Decentralized AI Platforms…
Awesomeness
SingularityNET
• Network powering Sophia
• DApp Marketplace: The SingularityNET
DApp is the entry-point to discovering
and using AI services on the
SingularityNET Network
• SNET Registry: The SingularityNET
Registry is an open and uncensorable
registry of Organizations, AI Services, and
Type Repositories that are accessible
from within the SingularityNET Network.
• Service Daemon: The Service Daemon
exposes an AI developer's application as
an API that is accessible through the
SingularityNET Network.
OpenMined
• Open source community focused on creating
decentralized AI protocols
• Sonar— A federated learning server running on
the blockchain that handles all campaign requests,
holding Bounty in trust.
• Capsule— A third-party PGP server to generate
public and private keys in order to ensure that
Sonar neural network stays encrypted properly.
• Mine— The individual data repositories of a user.
These are constantly checking Sonar for new
neural nets to contribute to.
• Syft— The library containing Neural Networks that
can be trained in an encrypted state (so that
Miners can’t steal the neural networks that they
download to train).
Algorithmia DanKu
• Created by Algorithmia
• Decentralized protocol for
running machine learning
contests
• Users can publish datasets using
smart contracts
• Models are trained on the
datasets and submitted to the
blockchain
• Other models evaluate the results
and compensate the users
Ocean
• Ocean Protocol is an ecosystem for sharing data
and associated services
• Providers: ​These actors have AI data or services
that they make available in a cryptographically
provable fashion.
• Marketplaces: ​Data/service marketplaces are
typically how providers and consumers interact
with Ocean network, for convenience.
• Data commons interfaces: ​Side-by-side with data
marketplaces that serve priced data are interfaces
for data commons, for free or commons data.
• Keeper: Keepers are responsible for collectively
maintaining the network. Anyone can run an
Ocean keeper node; it’s permissionless.
Participation is open and anonymous.
Summary
• The future of AI is likely to be more decentralized AI
• Achieving decentralized AI requires 3 key building blocks
• A decentralized runtime to execute computations
• Decentralized and scalable learning methods
• Strong privacy protocols for the exchange of data and models
• Blockchains have become catalyzers for the implementation of
decentralized AI architectures
• It’s happening already
Thanks
jr@invectoriq.com
https://medium.com/@jrodthoughts
https://twitter.com/jrdothoughts

Más contenido relacionado

La actualidad más candente

New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by BlockchainSlash
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeAhmed Banafa
 
Building blockchain applications using Java
Building blockchain applications using JavaBuilding blockchain applications using Java
Building blockchain applications using JavaSimon Stone
 
Introduction to Blockchain || How blockchain works || Uses of blockchain
Introduction to Blockchain || How blockchain works || Uses of blockchain Introduction to Blockchain || How blockchain works || Uses of blockchain
Introduction to Blockchain || How blockchain works || Uses of blockchain Yogesh Jangir
 
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...Pandora Boxchain
 
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found..."Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...Dataconomy Media
 
Semantic repository of things
Semantic repository of thingsSemantic repository of things
Semantic repository of thingsPratik Desai, PhD
 
Crafting a Knowledge Graph Strategy - What to think about
Crafting a Knowledge Graph Strategy - What to think aboutCrafting a Knowledge Graph Strategy - What to think about
Crafting a Knowledge Graph Strategy - What to think aboutConnected Data World
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsIngo Weber
 
i4Trust Info-Sessions - Edition 1
i4Trust Info-Sessions - Edition 1i4Trust Info-Sessions - Edition 1
i4Trust Info-Sessions - Edition 1FIWARE
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsDr. Nikolaus Lipusch
 
Smart Contracts That Learn
Smart Contracts That LearnSmart Contracts That Learn
Smart Contracts That LearnMike Slinn
 
Rieks Joosten
Rieks JoostenRieks Joosten
Rieks Joostenbcined
 
Wirecloud hamburg kickoff
Wirecloud hamburg kickoffWirecloud hamburg kickoff
Wirecloud hamburg kickoffMiguel Jiménez
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...Veselin Pizurica
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networksChetan Kumar S
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Leonardo De Moura Rocha Lima
 

La actualidad más candente (20)

New Business Models enabled by Blockchain
New Business Models enabled by BlockchainNew Business Models enabled by Blockchain
New Business Models enabled by Blockchain
 
Blockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the HypeBlockchain in 2018 : Beyond the Hype
Blockchain in 2018 : Beyond the Hype
 
Building blockchain applications using Java
Building blockchain applications using JavaBuilding blockchain applications using Java
Building blockchain applications using Java
 
Introduction to Blockchain || How blockchain works || Uses of blockchain
Introduction to Blockchain || How blockchain works || Uses of blockchain Introduction to Blockchain || How blockchain works || Uses of blockchain
Introduction to Blockchain || How blockchain works || Uses of blockchain
 
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
How AI benefits from Blockchain and Game Theory with Scalable Censorship-resi...
 
How to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contractHow to design, code, deploy and execute a smart contract
How to design, code, deploy and execute a smart contract
 
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found..."Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...
"Updates on Semantic Fingerprinting", Francisco Webber, Inventor and Co-Found...
 
Semantic repository of things
Semantic repository of thingsSemantic repository of things
Semantic repository of things
 
Crafting a Knowledge Graph Strategy - What to think about
Crafting a Knowledge Graph Strategy - What to think aboutCrafting a Knowledge Graph Strategy - What to think about
Crafting a Knowledge Graph Strategy - What to think about
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Blockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and ApplicationsBlockchain and BPM - Reflections on Four Years of Research and Applications
Blockchain and BPM - Reflections on Four Years of Research and Applications
 
i4Trust Info-Sessions - Edition 1
i4Trust Info-Sessions - Edition 1i4Trust Info-Sessions - Edition 1
i4Trust Info-Sessions - Edition 1
 
Token Governance in Blockchain Ecosystems
Token Governance in Blockchain EcosystemsToken Governance in Blockchain Ecosystems
Token Governance in Blockchain Ecosystems
 
Smart Contracts That Learn
Smart Contracts That LearnSmart Contracts That Learn
Smart Contracts That Learn
 
Rieks Joosten
Rieks JoostenRieks Joosten
Rieks Joosten
 
Wirecloud hamburg kickoff
Wirecloud hamburg kickoffWirecloud hamburg kickoff
Wirecloud hamburg kickoff
 
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
A Cloud-Based Bayesian Smart Agent Architecture for Internet-of-Things Applic...
 
Applicability of Machine learning in computer networks
Applicability of Machine learning in computer networksApplicability of Machine learning in computer networks
Applicability of Machine learning in computer networks
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]Secure IoT with Blockchain: Fad or Reality? [BOF5490]
Secure IoT with Blockchain: Fad or Reality? [BOF5490]
 

Similar a Decentralized AI for the Rest of Us

Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Diego Oppenheimer
 
Using Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIsUsing Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIsRakuten Group, Inc.
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?Srinath Perera
 
EVAIN Artificial intelligence and semantic annotation: are you serious about it?
EVAIN Artificial intelligence and semantic annotation: are you serious about it?EVAIN Artificial intelligence and semantic annotation: are you serious about it?
EVAIN Artificial intelligence and semantic annotation: are you serious about it?FIAT/IFTA
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...DataScienceConferenc1
 
Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Gladson DSouza
 
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateFintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateHenrique Centieiro
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in ISISACA Riyadh
 
thetoptrendsinartificialintelligence-191016075410.pptx
thetoptrendsinartificialintelligence-191016075410.pptxthetoptrendsinartificialintelligence-191016075410.pptx
thetoptrendsinartificialintelligence-191016075410.pptxArul Jothi Yuvaraja
 
The Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceThe Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceErling Hesselberg
 
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?Dr. Haxel Consult
 
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)Présentation de Bruno Schroder au 20e #mforum (07/12/2016)
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)Agence du Numérique (AdN)
 
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Brocade
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Drapergeetachauhan
 
Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023Hal Speed
 

Similar a Decentralized AI for the Rest of Us (20)

Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
 
Using Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIsUsing Algorithmia to leverage AI and Machine Learning APIs
Using Algorithmia to leverage AI and Machine Learning APIs
 
How would AI shape Future Integrations?
How would AI shape Future Integrations?How would AI shape Future Integrations?
How would AI shape Future Integrations?
 
EVAIN Artificial intelligence and semantic annotation: are you serious about it?
EVAIN Artificial intelligence and semantic annotation: are you serious about it?EVAIN Artificial intelligence and semantic annotation: are you serious about it?
EVAIN Artificial intelligence and semantic annotation: are you serious about it?
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...
[DSC Europe 22] On the Aspects of Artificial Intelligence and Robotic Autonom...
 
Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.Choosing the right Technologies for your next unicorn.
Choosing the right Technologies for your next unicorn.
 
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - XccelerateFintech workshop Part I - Law Society of Hong Kong - Xccelerate
Fintech workshop Part I - Law Society of Hong Kong - Xccelerate
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
influence of AI in IS
influence of AI in ISinfluence of AI in IS
influence of AI in IS
 
thetoptrendsinartificialintelligence-191016075410.pptx
thetoptrendsinartificialintelligence-191016075410.pptxthetoptrendsinartificialintelligence-191016075410.pptx
thetoptrendsinartificialintelligence-191016075410.pptx
 
The Top Trends in Artificial Intelligence
The Top Trends in Artificial IntelligenceThe Top Trends in Artificial Intelligence
The Top Trends in Artificial Intelligence
 
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?
AI-SDV 2021: Nils Newmann - AI – Who is in control and why is that important?
 
IoT and AI
 IoT and AI IoT and AI
IoT and AI
 
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)Présentation de Bruno Schroder au 20e #mforum (07/12/2016)
Présentation de Bruno Schroder au 20e #mforum (07/12/2016)
 
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
Recent Advances in Machine Learning: Bringing a New Level of Intelligence to ...
 
Decentralized AI Draper
Decentralized AI   DraperDecentralized AI   Draper
Decentralized AI Draper
 
Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023Teaching Machine Learning with Physical Computing - July 2023
Teaching Machine Learning with Physical Computing - July 2023
 
The Future is Here
The Future is HereThe Future is Here
The Future is Here
 

Más de Jesus Rodriguez

The Emergence of DeFi Micro-Primitives
The Emergence of DeFi Micro-PrimitivesThe Emergence of DeFi Micro-Primitives
The Emergence of DeFi Micro-PrimitivesJesus Rodriguez
 
ChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxJesus Rodriguez
 
DeFi Opportunities and Challenges in the Current Crypto Market
DeFi Opportunities and Challenges in the Current Crypto MarketDeFi Opportunities and Challenges in the Current Crypto Market
DeFi Opportunities and Challenges in the Current Crypto MarketJesus Rodriguez
 
The Polygon Blockchain by the Numbers
The Polygon Blockchain by the NumbersThe Polygon Blockchain by the Numbers
The Polygon Blockchain by the NumbersJesus Rodriguez
 
Social Analytics for Cryptocurrencies
Social Analytics for Cryptocurrencies Social Analytics for Cryptocurrencies
Social Analytics for Cryptocurrencies Jesus Rodriguez
 
DeFi Quant Yield-Generating Strategies
DeFi Quant Yield-Generating StrategiesDeFi Quant Yield-Generating Strategies
DeFi Quant Yield-Generating StrategiesJesus Rodriguez
 
High Frequency Trading and DeFi
High Frequency Trading and DeFiHigh Frequency Trading and DeFi
High Frequency Trading and DeFiJesus Rodriguez
 
Simple DeFi Analytics Any Crypto-Investor Should Know About
Simple DeFi Analytics Any Crypto-Investor Should Know About Simple DeFi Analytics Any Crypto-Investor Should Know About
Simple DeFi Analytics Any Crypto-Investor Should Know About Jesus Rodriguez
 
15 Minutes of DeFi Analytics
15 Minutes of DeFi Analytics15 Minutes of DeFi Analytics
15 Minutes of DeFi AnalyticsJesus Rodriguez
 
DeFi Trading Strategies: Opportunities and Challenges
DeFi Trading Strategies: Opportunities and ChallengesDeFi Trading Strategies: Opportunities and Challenges
DeFi Trading Strategies: Opportunities and ChallengesJesus Rodriguez
 
Practical Crypto Asset Predictions rev
Practical Crypto Asset Predictions revPractical Crypto Asset Predictions rev
Practical Crypto Asset Predictions revJesus Rodriguez
 
Better Technical Analysis with Blockchain Indicators
Better Technical Analysis with Blockchain IndicatorsBetter Technical Analysis with Blockchain Indicators
Better Technical Analysis with Blockchain IndicatorsJesus Rodriguez
 
Price Predictions for Cryptocurrencies
Price Predictions for CryptocurrenciesPrice Predictions for Cryptocurrencies
Price Predictions for CryptocurrenciesJesus Rodriguez
 
Fascinating Metrics and Analytics About Cryptocurrencies
Fascinating Metrics and Analytics About CryptocurrenciesFascinating Metrics and Analytics About Cryptocurrencies
Fascinating Metrics and Analytics About CryptocurrenciesJesus Rodriguez
 
Price PRedictions for Crypto-Assets Using Deep Learning
Price PRedictions for Crypto-Assets Using Deep LearningPrice PRedictions for Crypto-Assets Using Deep Learning
Price PRedictions for Crypto-Assets Using Deep LearningJesus Rodriguez
 
Demystifying Centralized Crypto Exchanges using Data Science
Demystifying Centralized Crypto Exchanges using Data ScienceDemystifying Centralized Crypto Exchanges using Data Science
Demystifying Centralized Crypto Exchanges using Data ScienceJesus Rodriguez
 
Crypto assets are a data science heaven rev
Crypto assets are a data science heaven revCrypto assets are a data science heaven rev
Crypto assets are a data science heaven revJesus Rodriguez
 
Implementing Machine Learning in the Real World
Implementing Machine Learning in the Real WorldImplementing Machine Learning in the Real World
Implementing Machine Learning in the Real WorldJesus Rodriguez
 

Más de Jesus Rodriguez (20)

The Emergence of DeFi Micro-Primitives
The Emergence of DeFi Micro-PrimitivesThe Emergence of DeFi Micro-Primitives
The Emergence of DeFi Micro-Primitives
 
ChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptxChatGPT, Foundation Models and Web3.pptx
ChatGPT, Foundation Models and Web3.pptx
 
DeFi Opportunities and Challenges in the Current Crypto Market
DeFi Opportunities and Challenges in the Current Crypto MarketDeFi Opportunities and Challenges in the Current Crypto Market
DeFi Opportunities and Challenges in the Current Crypto Market
 
MEV Deep Dive .pptx
MEV Deep Dive .pptxMEV Deep Dive .pptx
MEV Deep Dive .pptx
 
Quant in Crypto Land
Quant in Crypto LandQuant in Crypto Land
Quant in Crypto Land
 
The Polygon Blockchain by the Numbers
The Polygon Blockchain by the NumbersThe Polygon Blockchain by the Numbers
The Polygon Blockchain by the Numbers
 
Social Analytics for Cryptocurrencies
Social Analytics for Cryptocurrencies Social Analytics for Cryptocurrencies
Social Analytics for Cryptocurrencies
 
DeFi Quant Yield-Generating Strategies
DeFi Quant Yield-Generating StrategiesDeFi Quant Yield-Generating Strategies
DeFi Quant Yield-Generating Strategies
 
High Frequency Trading and DeFi
High Frequency Trading and DeFiHigh Frequency Trading and DeFi
High Frequency Trading and DeFi
 
Simple DeFi Analytics Any Crypto-Investor Should Know About
Simple DeFi Analytics Any Crypto-Investor Should Know About Simple DeFi Analytics Any Crypto-Investor Should Know About
Simple DeFi Analytics Any Crypto-Investor Should Know About
 
15 Minutes of DeFi Analytics
15 Minutes of DeFi Analytics15 Minutes of DeFi Analytics
15 Minutes of DeFi Analytics
 
DeFi Trading Strategies: Opportunities and Challenges
DeFi Trading Strategies: Opportunities and ChallengesDeFi Trading Strategies: Opportunities and Challenges
DeFi Trading Strategies: Opportunities and Challenges
 
Practical Crypto Asset Predictions rev
Practical Crypto Asset Predictions revPractical Crypto Asset Predictions rev
Practical Crypto Asset Predictions rev
 
Better Technical Analysis with Blockchain Indicators
Better Technical Analysis with Blockchain IndicatorsBetter Technical Analysis with Blockchain Indicators
Better Technical Analysis with Blockchain Indicators
 
Price Predictions for Cryptocurrencies
Price Predictions for CryptocurrenciesPrice Predictions for Cryptocurrencies
Price Predictions for Cryptocurrencies
 
Fascinating Metrics and Analytics About Cryptocurrencies
Fascinating Metrics and Analytics About CryptocurrenciesFascinating Metrics and Analytics About Cryptocurrencies
Fascinating Metrics and Analytics About Cryptocurrencies
 
Price PRedictions for Crypto-Assets Using Deep Learning
Price PRedictions for Crypto-Assets Using Deep LearningPrice PRedictions for Crypto-Assets Using Deep Learning
Price PRedictions for Crypto-Assets Using Deep Learning
 
Demystifying Centralized Crypto Exchanges using Data Science
Demystifying Centralized Crypto Exchanges using Data ScienceDemystifying Centralized Crypto Exchanges using Data Science
Demystifying Centralized Crypto Exchanges using Data Science
 
Crypto assets are a data science heaven rev
Crypto assets are a data science heaven revCrypto assets are a data science heaven rev
Crypto assets are a data science heaven rev
 
Implementing Machine Learning in the Real World
Implementing Machine Learning in the Real WorldImplementing Machine Learning in the Real World
Implementing Machine Learning in the Real World
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

Decentralized AI for the Rest of Us

  • 1. Decentralized AI for the Rest of Us Jesus Rodriguez Chief Scientist Invector Labs
  • 2. About Me • Founder and Chief Scientist at Invector Labs(http://invectorlabs.com ) • Next generation software development on-demand agency • Focused on deep technologies (AI, blockchain…) • Speaker, author (https://medium.com/@jrodthoughts) • Investor, board member on over a dozen deep-tech companies
  • 3. Agenda • The challenges of centralized AI • Decentralizing AI: risks and promises • Foundational blocks • Homomorphic Encryption • GAN cryptography • Secure multi-party computations • Federated Learning • Blockchains/Tokens • Existing decentralized AI platforms
  • 4. Some References • Why Decentralized AI Matters Part I: Economics and Enablers: https://medium.com/datadriveninvestor/why-decentralized-ai-matters- part-i-economics-and-enablers-5576aeeb43d1 • Why Decentralized AI Matters Part II: Technological Enablers: https://medium.com/datadriveninvestor/why-decentralized-ai-matters- part-ii-technological-enablers-a67e3115312e • Why Decentralized AI Matters Part III: Platforms: https://medium.com/datadriveninvestor/why-decentralized-ai-matters- part-iii-technologies-930c3c9d10d • AI Has Not One, Not Two, but Many Centralization Problems: https://hackernoon.com/ai-has-not-one-not-two-but-many- centralization-problems-a5f0664361ed •
  • 6. What does the hype look like?
  • 10. Reality is way simpler…
  • 11. We Have Hundreds of Millions of Devices Running AI Models
  • 14. The Evolution of Economic Movements Centralized Decentralized Recentralized
  • 16. Four Centralization Vectors of AI Data Models Training Regularization- Optimization AI Centralization Vectors
  • 21. Let’s Get Philosophical: Risks of Centralized AI…
  • 22. The Risks of Centralized AI The Decentralized Knowledge – Centralized AI Friction The Rich Get Richer Problem Risks of Centralized AI The Transparency Influence Ratio
  • 23. The Rich Get Richer Problem Big Companies Have a Data Advantage Over Startups When It Comes to AI A Big Company Decides to Create Different AI Models Against Their Proprietary Datasets AI Models Produce Even More Proprietary Data and Intelligence
  • 24. Decentralized Knowledge vs. Centralized Models How can we know if the knowledge of an AI model is correct? Knowledge is an intrinsically decentralized activity But companies insist on constraining AI models to proprietary datasets
  • 25. The Transparency/Influence Ratio AI algorithms are increasingly important in our lives? But we know very little about them? Who trains it? How was it trained? How does it build knowledge?
  • 28. Challenges to Achieve AI Decentralization • Can third parties be correctly incentivized to contribute to the knowledge and quality of an AI model? • Can the activity and behavior of an AI model be transparently available to all parties without the need of trusting a centralized authority? • Can models be distributed and executed autonomously across hundreds of thousands of nodes? • Can entities train a model without having to disclose their data? The Privacy Problem The Autonomy Problem The Economic Problem The Transparency Problem
  • 30. Data Privacy in Decentralized AI Architectures… You know…. security and that stuff
  • 31. The Challenges • How to share data with different parties while maintaining certain levels of privacy? • How to perform computations over encrypted data? • How to become resilient to privacy attacks in a decentralized network?
  • 33. Homomorphic Encryption • Alice wants workers to assemble raw materials into jewelry. • But Alice is worried about theft: • She wants workers to process raw materials without having access. • Alice puts raw materials in a locked glovebox. • Workers assemble jewelry inside glovebox, using the gloves. • Alice unlocks the box to get “results.”
  • 34. A More Practical Example Alice Server (Cloud) (Input: data x, secret key sk) “I want 1) the cloud to process my data 2) even though it is encrypted.” Encpk[f(x)] Encpk(x) function f f(x) Run Eval[ f, Encpk(x) ] = Encpk[f(x)] The special sauce! For security parameter λ, Eval’s running should be Time(f)∙poly(λ) This could be encrypted too. Delegation: Should cost less for Alice to encrypt x and decrypt f(x) than to compute f(x) herself.
  • 35. Full vs. Partial Homomorphic Encryption • Given the encryption of two data primitives a and b: E(a) and E(b) • Partial homomorphic encryption can compute E(a+b) or E(ab) without knowing a, b, or the private key • Unpadded RSA https://en.wikipedia.org/wiki/RSA_cryptosystem • ElGamal https://en.wikipedia.org/wiki/ElGamal_encryption • Paillier https://en.wikipedia.org/wiki/Paillier_cryptosystem • Full homomorphic encryption can compute both E(a+b) and E(ab) • Gentry • van Dijk-Gentry-Halevi-Vaikuntanathan
  • 36. Homomorphic Encryption and Decentralized AI HEnc(Dataset) HEnc(Results) Data Scientists
  • 37. Homomorphic Encryption Today • Remains mostly a theoretical exercise • Companies such as IBM and Microsoft have released research frameworks for partial homomorphic encryption • HElib https://github.com/shaih/HElib
  • 39. GAN Cryptography • Simpler alternative to homomorphic encryption • Uses generative adversarial neural networks (GANs) to protect communications between two parties • The encryption algorithms evolve dynamically with the performance of the networks
  • 40. GAN Cryptography • Alice and Bob are neural networks trying to communicate securely while Eve tries to break the communication • The outputs from Eve (Peve) are factored in the lost function for both Alice and Bob • Alice and Bob both discover new encryption algorithms that can defeat the best version of Eve
  • 41. GAN Cryptography and Decentralized AI GAN Data Provider GAN Data Scientist GAN Data Scientist GAN Listener Enc(Dataset)
  • 42. GAN Cryptography Today • Remains mostly an active research area • Some lightweight implementations like Numerai are available
  • 44. sMPC • Solves the traditional millionaires’ problem for n-parties • A group of millionaires, are interested in knowing which of them is richer without revealing their actual wealth. This problem is analogous to a more general problem where there are two numbers a and b and the goal is to solve the inequality without revealing the actual values of a and b. • Enable secure computations in a network without a trusted party
  • 45. sMPC • A set of parties with private inputs • Parties wish to jointly compute a function of their inputs so that certain security properties (like privacy and correctness) are preserved • Properties must be ensured even if some of the parties maliciously attack the protocol • Examples • Secure elections • Auctions • Privacy preserving data mining
  • 46. sMPC and Decentralized AI HEnc(Dataset) HEnc(Results) Data Scientists
  • 47. sMPC Cryptography Today • Several sMPC frameworks and libraries available • The Enigma blockchain (https://enigma.co/ ) is one of the most complete and scalable sMPC implementations in the market
  • 48. Solving Decentralized Learning… How to learn without the man?
  • 49. The Challenges • How to execute machine learning models on mobile or IoT devices? • How to customize a machine learning model based on personal data? • How to improve a machine learning model based on executions across a large number of devices?
  • 56. Federated Learning and Decentralized AI AI Execution Node AI Execution Node AI Execution Node AI Execution Node Federated Training Node Federated AI Training- Execution Node AI Training- Execution Node AI Training- Execution Node AI Training- Execution Node AI Training- Execution Node Decentralized
  • 57. Federated Learning Today • There are several implementations available on TensorFlow Lite • Google has been testing federated learning on Gboard https://www.blog.google/products/search/gboard-now-on-android/
  • 58. A Runtime for Decentralized AI… How do we run these things?
  • 59. Challenges • How to train models without a centralized authority? • How to use trained models without trusting a central party? • How to validate and enforce trust among the different parties in the lifecycle of a deep learning model
  • 60. Blockchains and Smart Contracts…
  • 62. Smart Contracts and Decentralized AI Data Scientist (builds and train model) Blockchain Smart Contract Blockchain Smart ContractCompany Data Scientist (tests and optimizes model) Data and Success Criteria Blockchain Smart Contract
  • 63. Solving the Incentive Problem… How to pay the data geeks?
  • 64. Challenges • How to build incentives for data scientists training, testing and building models? • How to build incentives for parties contributing datasets? • How to discourage bad behaviors in the network?
  • 67. Tokenized Decentralized AI Data Scientist (builds and train model) Blockchain Smart Contract Blockchain Smart ContractCompany Data Scientist (tests and optimizes model) Data and Success Criteria Blockchain Smart Contract Tokens Tokens
  • 68.
  • 70. SingularityNET • Network powering Sophia • DApp Marketplace: The SingularityNET DApp is the entry-point to discovering and using AI services on the SingularityNET Network • SNET Registry: The SingularityNET Registry is an open and uncensorable registry of Organizations, AI Services, and Type Repositories that are accessible from within the SingularityNET Network. • Service Daemon: The Service Daemon exposes an AI developer's application as an API that is accessible through the SingularityNET Network.
  • 71. OpenMined • Open source community focused on creating decentralized AI protocols • Sonar— A federated learning server running on the blockchain that handles all campaign requests, holding Bounty in trust. • Capsule— A third-party PGP server to generate public and private keys in order to ensure that Sonar neural network stays encrypted properly. • Mine— The individual data repositories of a user. These are constantly checking Sonar for new neural nets to contribute to. • Syft— The library containing Neural Networks that can be trained in an encrypted state (so that Miners can’t steal the neural networks that they download to train).
  • 72. Algorithmia DanKu • Created by Algorithmia • Decentralized protocol for running machine learning contests • Users can publish datasets using smart contracts • Models are trained on the datasets and submitted to the blockchain • Other models evaluate the results and compensate the users
  • 73. Ocean • Ocean Protocol is an ecosystem for sharing data and associated services • Providers: ​These actors have AI data or services that they make available in a cryptographically provable fashion. • Marketplaces: ​Data/service marketplaces are typically how providers and consumers interact with Ocean network, for convenience. • Data commons interfaces: ​Side-by-side with data marketplaces that serve priced data are interfaces for data commons, for free or commons data. • Keeper: Keepers are responsible for collectively maintaining the network. Anyone can run an Ocean keeper node; it’s permissionless. Participation is open and anonymous.
  • 74. Summary • The future of AI is likely to be more decentralized AI • Achieving decentralized AI requires 3 key building blocks • A decentralized runtime to execute computations • Decentralized and scalable learning methods • Strong privacy protocols for the exchange of data and models • Blockchains have become catalyzers for the implementation of decentralized AI architectures • It’s happening already