Skip to content

Commit d6d2d2e

Browse files
Sync events
1 parent 4cee4b6 commit d6d2d2e

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

data/events.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3043,8 +3043,8 @@
30433043
},
30443044
{
30453045
"id": "f25-wk5-lab",
3046-
"title": "Cyber Lab: Rethinking AI Security from the System Point of View by Professor Tian",
3047-
"description": "Come to our 3rd week of Cyber Lab where Professor Tian will give a talk about modern security 🔒 research 🔬 going on, including in the field of AI!\n\nArtificial-intelligence applications are no longer confined to discrete models running in isolation.\nWith the advancement of GenAI, the AI applications are end-to-end systems that ingest live\ndata, invoke complex toolchains, and operate inside intertwined virtual and physical\nenvironments. Yet most security guidance still targets individual components, leaving systemic\nblind spots that adversaries eagerly exploit. This talk focuses on AI system security beyond\nmodel-centric hardening. In particular, I will discuss two main points: secure the entire pipeline\nof AI supply chain, and secure AI’s interactions with cyber and physical environments.\n\nMore information about Professor Tian: https://www.ytian.info/",
3046+
"title": "Cyber Lab: Rethinking AI Security from the System Point of View by Professor Yuan Tian",
3047+
"description": "Come to our 3rd week of Cyber Lab where Professor Tian will give a talk about modern security 🔒 research 🔬 going on, including in the field of AI!\n\nArtificial-intelligence applications are no longer confined to discrete models running in isolation.\nWith the advancement of GenAI, the AI applications are end-to-end systems that ingest live\ndata, invoke complex toolchains, and operate inside intertwined virtual and physical\nenvironments. Yet most security guidance still targets individual components, leaving systemic\nblind spots that adversaries eagerly exploit. This talk focuses on AI system security beyond\nmodel-centric hardening. In particular, I will discuss two main points: secure the entire pipeline\nof AI supply chain, and secure AI’s interactions with cyber and physical environments.\n\nMore information about Professor Yuan Tian: https://www.ytian.info/",
30483048
"location": "Boelter 4760",
30493049
"start": 1761786012971,
30503050
"end": 1761793212971,

0 commit comments

Comments
 (0)