SlideShare a Scribd company logo
1 of 18
Download to read offline
Decentralized
Privacy-Preserving
AI Network
LatticeX
File Servers
“Push” Pub-Sub
PIM’S
Databases
Web sites
Content Portals Search Engines
Enterprise Portals
Evolution of the Web
P2P File-Sharding
Groupware
Marketplaces Auctions Wikis
Weblogs
RSS
E-mail
Conferencing USENET
Social Networks
Community Portals
IM
Artificial Intelligence
Personal Assistants
Intelligent Agents
Semantic Webs
Knowledge Bases
Knowledge Management
Ontologies
Taxonomies
Decentralized Ledger
Privacy-Preserving Computation
Knowledge Networks
Degree of Social Connectivity
Degree
of
Information
Connectivity
Source: Novas Pivack
Enterprise Minds
Group Minds
Lifelogs
“The Relationship Web”
Decentralized Communities
WEB 3.0(Semantic Web)
Connects Knowledge
WEB 2.0(Social Web)
Connects People
WEB1.0(The Web)
Connects Informatiion
WEB X.0(Meta Web)
Connects Intelligence
Semantic Weblogs
Smart Marketplaces
Multi Agent System
PlatON
The Global Brain
Market Capilazation of the Web
1997 2020 2037
Share
of
Global
Market
Cap
0.0%
7.5%
15.0%
22.5%
30.0%
Web 1.0
Green Shoots of E-commerce
Desktop Browser Access
Dedecated Infrastructure
$13 Trillion
$2 Trillion
~$0
$20 Trillion
$30 Trillion
Web 2.0
Social Networks
Mobile always on
Cloud-driver Computation
Web 3.0
AI-driver Networks
Decentralized Data Architecture
Privacy-preserving Computation
17% CAGP
Information Technology Internet Artificial Intelligence Data Souce: ARK INVEST
180
160
140
120
100
80
60
40
20
0
Size And Security of the Global Data
2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025
46%
25%
29%
51%
24%
25%
Requires security unprotected Requires security protected Does not require security Data Source: IDC’s Data Age 2025 Study
Zettabytes
33%
32%
35%
13%
42%
35%
Problems and Solution
Challenges with the current web
l Centralization: The capturing of behavioral data is locked into silos that are
dominated by large players.
l Privacy and security: With the increasing amount of data being captured large
data centers act as honeypots for organized crime.
l Scalability: With larger data sets from billions of connected devices, today’s
client server model is not likely to scale for the next generation web.
Problems of artificial intelligence
l Centralization and De-democratisation:A handful of tech giants have
monopoly control over data, algorithms, and top AI talents, AI has not been
democratized.
l Data abuse and privacy leakage:The centralization of AI opens the door
to all sorts of abuse. Due to privacy leakage and government regulation, there is
not much, and higher quality data for AI model training.
l Expensive training cost: Total AI training costs continue to climb, state-of-
the-art AI training model costs are likely to increase 100-fold, from roughly $1
million today to more than $100 million by 2025.
AI
Blockchain Cryptography
Let us
compute
https://www.platon.network
What is PlatON
Build an infrastructure for autonomous AI agents and their
collaboration, facilitate the emergence of advanced AI, and explore
the path to AGI.
Make the power of AI available to anyone and make AI technology
work better for the public.
AI
A Decentralized Privacy-Preserving AI Network
Web 3.0 to WebX.0
An evolutionary path to AGI
Democratizing Artificial Intelligence
The Privacy-Preserving AI Network
A decentralized and collaborative AI network on
the top layer in which AI agents collaborate at scale,
accomplish complex AI services through group minds.
A privacy-preserving computation overlay network on
top of the underlying blockchain network, which supports
AI-level complex computation, creates a decentralized AI
marketplace by incentivizing more data, algorithms, and
computing power to join through cryptoeconomics.
The underlying trust layer that implements consensus
protocols and smart contracts.
PlatON's Layer1 base protocol is deeply customized for
privacy-preserving AI.
The Stack Of Privacy-Preserving AI Network
PlatON will
l Focus on technologies related to
privacy-preserving AI training,
serving and interoperability.
l Collaborate extensively with the
community to create an ecosystem
of AI computing and services.
Competitive Landscape
Layer Technical Features Application
Layer1 Layer2 Layer3 TPS TTF Privacy-Preserving
Computation
Smart
Contract
AI Model
PlatON ✔ ✔ ✔ 10k 3s Cryptography EVM
WASM
✔
Ethereum ✔ ✔ 10 6m ✗ EVM
eWSM
Cosmos ✔ 1k 6s ✗ ✗
EOS ✔ 4k 163s ✗ WASM
Solana ✔ 50k 1.5s ✗ Rust
Oasis ✔ 1k 6s TEE EVM
eWSM
Enigma ✔ TEE
Arpa ✔ MPC
Phala ✔ TEE
Competitive Advantages
Decentralization
Any user and node can connect to the network permissionless.
Any data, algorithms and computing power can be securely
shared, connected and traded. Anyone can develop and use
artificial intelligence applications.
Low training costs
With blockchain and privacy-preserving computing
technologies, anyone can share data and algorithms in a
secure and frictionless marketplace, truly reducing marginal
costs and drastically reducing training costs.
Privacy-Preserving
Modern cryptography-based privacy-preserving computing
techniques provide a new computing paradigm that makes data
and models available but not visible, allowing privacy to be fully
protected and data rights to be safeguarded.
Low development threshold
Visualize AI model development and debugging, automated machine
learning (AutoML), MLOps simplifies the whole process of managing
AI models from model development, training to deployment, reducing
the development threshold of AI models and improving development
efficiency.
High-performance
High-performance asynchronous BFT consensus is achieved
through optimization methods such as pipeline verification,
parallel verification, and aggregated signatures, and its safety,
liveness, and responsiveness are proven using formal
verification methods.
Regulatable and auditable
All data, variables and processes used in the AI training decision
making process have tamper-evident records that can be tracked and
audited. The use of privacy-preserving technologies allows the use of
data to satisfy regulatory regulations such as the right to be forgotten,
the right to portability, conditional authorization, and minimal
collection.
1
5
6
4
2
3
Complete Decentralized Privacy-Preserving AI stack
Muti Agent System,
Reinforcement Learning
MLOps, AutoML, Feature
Enginnering, No-code AI tools
Resource scheduling, Verifiable
Computation, Parallel Computing,
Proxy Re-encryption
PoS-BFT Consensus, Smart
Contracts, Built-in Privacy-
Preserving Algorithms
Secure Multi-Party Computation,
Federated Learning, TEE
GPU-accelerated Computing,
FPGA-based Hardware
Acceleration
Collaborative AI Network (RosettaMAS)
AI Service Platform (RosettaFlow)
Privacy-Preserving Computation Network (RosettaNet)
Privacy-preserving AI
Framework (Rosetta)
TensorFlow Pytorch
Spark Flink
Blockchain
(PlatON chain)
Smart Contract On-chain
privacy
Consensus
(Giscard)
Economic
Model(PPos)
Hardware Acceleration(GPU/FPGA/ASIC)
Privacy-Preserving AI Liblary (RosettaMLLib)
A Few Lines to Privacy
l Compatible with Tensorflow, switch to
privacy mode in 3 steps:
I. Import Rosetta package
II. Set MPC algorithm
III. Get private input data
l No knowledge of cryptography required for developers
l Adapting common statistical analysis algorithms, machine
learning algorithms and deep learning algorithms to
privacy-preserving algorithms
Privacy-Preserving AI Framework (Rosetta)
Hareware Acceleration
CPU GPU FPGA ASIC
TensorFlow Pytorch Spark Flink
Privacy-Preserving AI Lidlary (RosettaMLLib)
MPC ZKP HE
Federated
Learning
TEE
Mechine Leaning Deep Leaning Statistic
Network
Privacy-Preserving Computation on PlatON
l layer1 has built-in privacy algorithms
(including homomorphic encryption and
zero-knowledge proof) that can be
integrated into smart contracts.
l Layer 2 provides secure multi-party
computing protocols for privacy-preserving
training of AI models, and the trained
models can be deployed to Layer 3.
Decetralized Resource Management
Blockchain
Resource Publish Resource Discovery
Computing
Market
Data
Market
Algorithm
Market
Economic
lncentive
Supervision
Audit
Resource Scheduling Resource Location
RELOAD Overlay Network
DID(Decentralized ldentity)
Zero-Knowlage Proof Library
EVM Visual Machine WASM Visual Machine
Data
Provider
Data
Provider
Data Area
Computing
Node
Computation Area
MPC
Protocol
Proxy
Re-Encyption
AI Network
Secret
Share
Both on-chain and off-chain
data privacy are supported:
Computing
Node
Computing
Node
Data Node
Data Node
Data Node
AutoML
Privacy-Preserving AI Service Platform
Available out of the box
1. Drag-and-drop model orchestration and visual debugging
2. One-stop machine learning, end-to-end training process
automation
3. MLOps pipeline automation, continuous training and
deployment
4. Data visualization cockpit
5. One-click Docker deployment, support cloud and local
deployment
Security Compliance
1. Complete mathematical and cryptographic proofs
2. Strict authentication and authorization
management
3. Compatible with both international open source
and Chinese commercial secret systems
4. Blockchain depository audit
5. Secure visualization cockpit
Flexible Extensions
1. Plug-in support for extended algorithms, data
sources, authentication and authorization
2. support for security multi-party computation, federal
learning, TEE and other privacy-preserving
computation algorithm
3. Support SQL, Python and other high-level
languages
Feature Enginnering
Model Selection
Hyper-parameter Optimization
Visualization
Modeling
Data
Sources Pre-Processing
Multi-party
Deployment
Joint Training
Joint Prediction
Model Monitor
Data and
Algorithm
Marketplace
Discovery
Trading
Evaluation
Joint
model
Continuous Training and Deployment
Privacy-preserving
Computation Network
Application Ecosystem
Marketing/Advertising
User Portrait
Customer Match
Intelligent City
Intelligent
Manufacturing
Intelligent
Transportation
Intelligent
Building
DeFi
Model Oracle
Privacy-Preserving Dex
DeFi Credit
Biologic
Drug Screening
Clinical Trials
Target Discovery
Finance
Anti-fraud
Risk Control
PlatON
DeFi
Research Team and Results
World-leading research team
We have established a research funding for privacy-preserving computation and have a large pool of
top cryptographic talent, including professors and PhDs from major universities in China and the U.S.
Research results
Our research team has been conducting and publishing exploratory and in-depth research in the
fields of cryptography, Internet of Things, human intelligence, as well as economics and governance.
l Papers
l LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction, In ACM CCS, 2020
l Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup, In PKC, 2021
l Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning, In USENIX
Security, 2021
l Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time, In eprint 2020/1247
l zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy, In eprint 2021/673
l Open-source privacy-preserving AI framework Rosetta
Research grants and project collaborations
We regularly fund academic research and conferences on cryptography and privacy-preserving
computation, and we collaborate deeply with various projects and research groups.
l Conferences: Crypto, Eurocrypt, Asiacrypt, CCS, AsiaCCS, IDASH, etc.
l Project in Ethereum: MPC implementation of Proof of Custody in Eth 2.0
ROADMAP
2018.05
2020.02
New Baley
World Testnet
2020.10
2021.04
PlatON Mainnet
2021.10
Privacy-Preserving Dex
Privacy-preserving
Computing Network
2022.04
Artificial Intelligence
Marketplace
Forerunner
Network Alaya
Baley World Testnet
2022.12
Collaborative
AI Network
AI
THANK YOU
Decentralized Privacy-Preserving AI Network
Let us compute

More Related Content

What's hot

Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Dataconomy Media
 
Pouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryPouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryDataWorks Summit
 
Jan van der Vegt. Challenges faced with machine learning in practice
Jan van der Vegt. Challenges faced with machine learning in practiceJan van der Vegt. Challenges faced with machine learning in practice
Jan van der Vegt. Challenges faced with machine learning in practiceLviv Startup Club
 
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...Databricks
 
Simplifying Cloud Architectures with Data Virtualization
Simplifying Cloud Architectures with Data VirtualizationSimplifying Cloud Architectures with Data Virtualization
Simplifying Cloud Architectures with Data VirtualizationDenodo
 
InfoSphere BigInsights - Analytics power for Hadoop - field experience
InfoSphere BigInsights - Analytics power for Hadoop - field experienceInfoSphere BigInsights - Analytics power for Hadoop - field experience
InfoSphere BigInsights - Analytics power for Hadoop - field experienceWilfried Hoge
 
Tag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformTag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformSanjay Padhi, Ph.D
 
Extending Data Lake using the Lambda Architecture June 2015
Extending Data Lake using the Lambda Architecture June 2015Extending Data Lake using the Lambda Architecture June 2015
Extending Data Lake using the Lambda Architecture June 2015DataWorks Summit
 
Ibm big data ibm marriage of hadoop and data warehousing
Ibm big dataibm marriage of hadoop and data warehousingIbm big dataibm marriage of hadoop and data warehousing
Ibm big data ibm marriage of hadoop and data warehousing DataWorks Summit
 
Microservices Patterns with GoldenGate
Microservices Patterns with GoldenGateMicroservices Patterns with GoldenGate
Microservices Patterns with GoldenGateJeffrey T. Pollock
 
Cloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionCloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionDenodo
 
The Curse of the Data Lake Monster
The Curse of the Data Lake MonsterThe Curse of the Data Lake Monster
The Curse of the Data Lake MonsterThoughtworks
 
Marketing Digital Command Center
Marketing Digital Command CenterMarketing Digital Command Center
Marketing Digital Command CenterDataWorks Summit
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Why do the majority of Data Science projects never make it to production?
Why do the majority of Data Science projects never make it to production?Why do the majority of Data Science projects never make it to production?
Why do the majority of Data Science projects never make it to production?Itai Yaffe
 
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Databricks
 

What's hot (20)

Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
Sören Eickhoff, Informatica GmbH, "Informatica Intelligent Data Lake – Self S...
 
Pouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy IndustryPouring the Foundation: Data Management in the Energy Industry
Pouring the Foundation: Data Management in the Energy Industry
 
Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics Hybrid Cloud Strategy for Big Data and Analytics
Hybrid Cloud Strategy for Big Data and Analytics
 
Jan van der Vegt. Challenges faced with machine learning in practice
Jan van der Vegt. Challenges faced with machine learning in practiceJan van der Vegt. Challenges faced with machine learning in practice
Jan van der Vegt. Challenges faced with machine learning in practice
 
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...
Databricks Whitelabel: Making Petabyte Scale Data Consumable to All Our Custo...
 
Simplifying Cloud Architectures with Data Virtualization
Simplifying Cloud Architectures with Data VirtualizationSimplifying Cloud Architectures with Data Virtualization
Simplifying Cloud Architectures with Data Virtualization
 
Capgemini Insights and Data
Capgemini Insights and Data Capgemini Insights and Data
Capgemini Insights and Data
 
InfoSphere BigInsights - Analytics power for Hadoop - field experience
InfoSphere BigInsights - Analytics power for Hadoop - field experienceInfoSphere BigInsights - Analytics power for Hadoop - field experience
InfoSphere BigInsights - Analytics power for Hadoop - field experience
 
Tag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh PlatformTag.bio: Self Service Data Mesh Platform
Tag.bio: Self Service Data Mesh Platform
 
Extending Data Lake using the Lambda Architecture June 2015
Extending Data Lake using the Lambda Architecture June 2015Extending Data Lake using the Lambda Architecture June 2015
Extending Data Lake using the Lambda Architecture June 2015
 
Big Data Application Architectures - IoT
Big Data Application Architectures - IoTBig Data Application Architectures - IoT
Big Data Application Architectures - IoT
 
Ibm big data ibm marriage of hadoop and data warehousing
Ibm big dataibm marriage of hadoop and data warehousingIbm big dataibm marriage of hadoop and data warehousing
Ibm big data ibm marriage of hadoop and data warehousing
 
Microservices Patterns with GoldenGate
Microservices Patterns with GoldenGateMicroservices Patterns with GoldenGate
Microservices Patterns with GoldenGate
 
Cloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service OptionCloud Modernization and Data as a Service Option
Cloud Modernization and Data as a Service Option
 
The Curse of the Data Lake Monster
The Curse of the Data Lake MonsterThe Curse of the Data Lake Monster
The Curse of the Data Lake Monster
 
Marketing Digital Command Center
Marketing Digital Command CenterMarketing Digital Command Center
Marketing Digital Command Center
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Why do the majority of Data Science projects never make it to production?
Why do the majority of Data Science projects never make it to production?Why do the majority of Data Science projects never make it to production?
Why do the majority of Data Science projects never make it to production?
 
451 Research Impact Report
451 Research Impact Report451 Research Impact Report
451 Research Impact Report
 
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
Data Mesh in Practice: How Europe’s Leading Online Platform for Fashion Goes ...
 

Similar to Privacy-Preserving AI Network - PlatON 2.0

Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?101 Blockchains
 
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0Intelligent Web: Unveiling the AI-Driven Future of Web 3.0
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0Liveplex
 
Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Den Reymer
 
5 Best AI Crypto Coins That Are Trending Nowadays.pdf
5 Best AI Crypto Coins That Are Trending Nowadays.pdf5 Best AI Crypto Coins That Are Trending Nowadays.pdf
5 Best AI Crypto Coins That Are Trending Nowadays.pdfcoingabbar
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with IntelAmazon Web Services
 
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdf
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdfleewayhertz.com-AI in web3 How AI manifests in the world of web3.pdf
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdfKristiLBurns
 
Service oriented converged network accelerating digital transformation
Service oriented converged network accelerating digital transformationService oriented converged network accelerating digital transformation
Service oriented converged network accelerating digital transformationHuawei Technologies
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Gokul Alex
 
Modern trends in Technology.pptx
Modern trends in Technology.pptxModern trends in Technology.pptx
Modern trends in Technology.pptxkerrolallwood
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfMahdi_Fahmideh
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom WebinarBill Wong
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industryAgitAjey
 

Similar to Privacy-Preserving AI Network - PlatON 2.0 (20)

Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?Blockchain and AI - A Perfect Combination?
Blockchain and AI - A Perfect Combination?
 
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0Intelligent Web: Unveiling the AI-Driven Future of Web 3.0
Intelligent Web: Unveiling the AI-Driven Future of Web 3.0
 
Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018
 
5 Best AI Crypto Coins That Are Trending Nowadays.pdf
5 Best AI Crypto Coins That Are Trending Nowadays.pdf5 Best AI Crypto Coins That Are Trending Nowadays.pdf
5 Best AI Crypto Coins That Are Trending Nowadays.pdf
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
 
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdf
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdfleewayhertz.com-AI in web3 How AI manifests in the world of web3.pdf
leewayhertz.com-AI in web3 How AI manifests in the world of web3.pdf
 
Service oriented converged network accelerating digital transformation
Service oriented converged network accelerating digital transformationService oriented converged network accelerating digital transformation
Service oriented converged network accelerating digital transformation
 
E2matrix
E2matrixE2matrix
E2matrix
 
Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies Decentralised AI through Distributed Ledger Technologies
Decentralised AI through Distributed Ledger Technologies
 
Modern trends in Technology.pptx
Modern trends in Technology.pptxModern trends in Technology.pptx
Modern trends in Technology.pptx
 
iot
iotiot
iot
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
Emerging Technologies 3.0
Emerging Technologies 3.0Emerging Technologies 3.0
Emerging Technologies 3.0
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Emerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdfEmerging Technologies 3.0.pdf
Emerging Technologies 3.0.pdf
 
Emerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdfEmerging Technologies 33.0.pdf
Emerging Technologies 33.0.pdf
 
Dell AI Telecom Webinar
Dell AI Telecom WebinarDell AI Telecom Webinar
Dell AI Telecom Webinar
 
eMsecure
eMsecureeMsecure
eMsecure
 
Top five emerging technology in industry
Top five emerging technology in industryTop five emerging technology in industry
Top five emerging technology in industry
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 

Recently uploaded

dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxTanveerAhmed817946
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknowmakika9823
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...Suhani Kapoor
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 

Recently uploaded (20)

Decoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in ActionDecoding Loan Approval: Predictive Modeling in Action
Decoding Loan Approval: Predictive Modeling in Action
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Digi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptxDigi Khata Problem along complete plan.pptx
Digi Khata Problem along complete plan.pptx
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service LucknowAminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
Aminabad Call Girl Agent 9548273370 , Call Girls Service Lucknow
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
VIP High Class Call Girls Bikaner Anushka 8250192130 Independent Escort Servi...
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 

Privacy-Preserving AI Network - PlatON 2.0

  • 2. File Servers “Push” Pub-Sub PIM’S Databases Web sites Content Portals Search Engines Enterprise Portals Evolution of the Web P2P File-Sharding Groupware Marketplaces Auctions Wikis Weblogs RSS E-mail Conferencing USENET Social Networks Community Portals IM Artificial Intelligence Personal Assistants Intelligent Agents Semantic Webs Knowledge Bases Knowledge Management Ontologies Taxonomies Decentralized Ledger Privacy-Preserving Computation Knowledge Networks Degree of Social Connectivity Degree of Information Connectivity Source: Novas Pivack Enterprise Minds Group Minds Lifelogs “The Relationship Web” Decentralized Communities WEB 3.0(Semantic Web) Connects Knowledge WEB 2.0(Social Web) Connects People WEB1.0(The Web) Connects Informatiion WEB X.0(Meta Web) Connects Intelligence Semantic Weblogs Smart Marketplaces Multi Agent System PlatON The Global Brain
  • 3. Market Capilazation of the Web 1997 2020 2037 Share of Global Market Cap 0.0% 7.5% 15.0% 22.5% 30.0% Web 1.0 Green Shoots of E-commerce Desktop Browser Access Dedecated Infrastructure $13 Trillion $2 Trillion ~$0 $20 Trillion $30 Trillion Web 2.0 Social Networks Mobile always on Cloud-driver Computation Web 3.0 AI-driver Networks Decentralized Data Architecture Privacy-preserving Computation 17% CAGP Information Technology Internet Artificial Intelligence Data Souce: ARK INVEST
  • 4. 180 160 140 120 100 80 60 40 20 0 Size And Security of the Global Data 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 46% 25% 29% 51% 24% 25% Requires security unprotected Requires security protected Does not require security Data Source: IDC’s Data Age 2025 Study Zettabytes 33% 32% 35% 13% 42% 35%
  • 5. Problems and Solution Challenges with the current web l Centralization: The capturing of behavioral data is locked into silos that are dominated by large players. l Privacy and security: With the increasing amount of data being captured large data centers act as honeypots for organized crime. l Scalability: With larger data sets from billions of connected devices, today’s client server model is not likely to scale for the next generation web. Problems of artificial intelligence l Centralization and De-democratisation:A handful of tech giants have monopoly control over data, algorithms, and top AI talents, AI has not been democratized. l Data abuse and privacy leakage:The centralization of AI opens the door to all sorts of abuse. Due to privacy leakage and government regulation, there is not much, and higher quality data for AI model training. l Expensive training cost: Total AI training costs continue to climb, state-of- the-art AI training model costs are likely to increase 100-fold, from roughly $1 million today to more than $100 million by 2025. AI Blockchain Cryptography
  • 6. Let us compute https://www.platon.network What is PlatON Build an infrastructure for autonomous AI agents and their collaboration, facilitate the emergence of advanced AI, and explore the path to AGI. Make the power of AI available to anyone and make AI technology work better for the public. AI A Decentralized Privacy-Preserving AI Network Web 3.0 to WebX.0 An evolutionary path to AGI Democratizing Artificial Intelligence
  • 7. The Privacy-Preserving AI Network A decentralized and collaborative AI network on the top layer in which AI agents collaborate at scale, accomplish complex AI services through group minds. A privacy-preserving computation overlay network on top of the underlying blockchain network, which supports AI-level complex computation, creates a decentralized AI marketplace by incentivizing more data, algorithms, and computing power to join through cryptoeconomics. The underlying trust layer that implements consensus protocols and smart contracts. PlatON's Layer1 base protocol is deeply customized for privacy-preserving AI.
  • 8. The Stack Of Privacy-Preserving AI Network PlatON will l Focus on technologies related to privacy-preserving AI training, serving and interoperability. l Collaborate extensively with the community to create an ecosystem of AI computing and services.
  • 9. Competitive Landscape Layer Technical Features Application Layer1 Layer2 Layer3 TPS TTF Privacy-Preserving Computation Smart Contract AI Model PlatON ✔ ✔ ✔ 10k 3s Cryptography EVM WASM ✔ Ethereum ✔ ✔ 10 6m ✗ EVM eWSM Cosmos ✔ 1k 6s ✗ ✗ EOS ✔ 4k 163s ✗ WASM Solana ✔ 50k 1.5s ✗ Rust Oasis ✔ 1k 6s TEE EVM eWSM Enigma ✔ TEE Arpa ✔ MPC Phala ✔ TEE
  • 10. Competitive Advantages Decentralization Any user and node can connect to the network permissionless. Any data, algorithms and computing power can be securely shared, connected and traded. Anyone can develop and use artificial intelligence applications. Low training costs With blockchain and privacy-preserving computing technologies, anyone can share data and algorithms in a secure and frictionless marketplace, truly reducing marginal costs and drastically reducing training costs. Privacy-Preserving Modern cryptography-based privacy-preserving computing techniques provide a new computing paradigm that makes data and models available but not visible, allowing privacy to be fully protected and data rights to be safeguarded. Low development threshold Visualize AI model development and debugging, automated machine learning (AutoML), MLOps simplifies the whole process of managing AI models from model development, training to deployment, reducing the development threshold of AI models and improving development efficiency. High-performance High-performance asynchronous BFT consensus is achieved through optimization methods such as pipeline verification, parallel verification, and aggregated signatures, and its safety, liveness, and responsiveness are proven using formal verification methods. Regulatable and auditable All data, variables and processes used in the AI training decision making process have tamper-evident records that can be tracked and audited. The use of privacy-preserving technologies allows the use of data to satisfy regulatory regulations such as the right to be forgotten, the right to portability, conditional authorization, and minimal collection. 1 5 6 4 2 3
  • 11. Complete Decentralized Privacy-Preserving AI stack Muti Agent System, Reinforcement Learning MLOps, AutoML, Feature Enginnering, No-code AI tools Resource scheduling, Verifiable Computation, Parallel Computing, Proxy Re-encryption PoS-BFT Consensus, Smart Contracts, Built-in Privacy- Preserving Algorithms Secure Multi-Party Computation, Federated Learning, TEE GPU-accelerated Computing, FPGA-based Hardware Acceleration Collaborative AI Network (RosettaMAS) AI Service Platform (RosettaFlow) Privacy-Preserving Computation Network (RosettaNet) Privacy-preserving AI Framework (Rosetta) TensorFlow Pytorch Spark Flink Blockchain (PlatON chain) Smart Contract On-chain privacy Consensus (Giscard) Economic Model(PPos) Hardware Acceleration(GPU/FPGA/ASIC) Privacy-Preserving AI Liblary (RosettaMLLib)
  • 12. A Few Lines to Privacy l Compatible with Tensorflow, switch to privacy mode in 3 steps: I. Import Rosetta package II. Set MPC algorithm III. Get private input data l No knowledge of cryptography required for developers l Adapting common statistical analysis algorithms, machine learning algorithms and deep learning algorithms to privacy-preserving algorithms Privacy-Preserving AI Framework (Rosetta) Hareware Acceleration CPU GPU FPGA ASIC TensorFlow Pytorch Spark Flink Privacy-Preserving AI Lidlary (RosettaMLLib) MPC ZKP HE Federated Learning TEE Mechine Leaning Deep Leaning Statistic Network
  • 13. Privacy-Preserving Computation on PlatON l layer1 has built-in privacy algorithms (including homomorphic encryption and zero-knowledge proof) that can be integrated into smart contracts. l Layer 2 provides secure multi-party computing protocols for privacy-preserving training of AI models, and the trained models can be deployed to Layer 3. Decetralized Resource Management Blockchain Resource Publish Resource Discovery Computing Market Data Market Algorithm Market Economic lncentive Supervision Audit Resource Scheduling Resource Location RELOAD Overlay Network DID(Decentralized ldentity) Zero-Knowlage Proof Library EVM Visual Machine WASM Visual Machine Data Provider Data Provider Data Area Computing Node Computation Area MPC Protocol Proxy Re-Encyption AI Network Secret Share Both on-chain and off-chain data privacy are supported: Computing Node Computing Node Data Node Data Node Data Node
  • 14. AutoML Privacy-Preserving AI Service Platform Available out of the box 1. Drag-and-drop model orchestration and visual debugging 2. One-stop machine learning, end-to-end training process automation 3. MLOps pipeline automation, continuous training and deployment 4. Data visualization cockpit 5. One-click Docker deployment, support cloud and local deployment Security Compliance 1. Complete mathematical and cryptographic proofs 2. Strict authentication and authorization management 3. Compatible with both international open source and Chinese commercial secret systems 4. Blockchain depository audit 5. Secure visualization cockpit Flexible Extensions 1. Plug-in support for extended algorithms, data sources, authentication and authorization 2. support for security multi-party computation, federal learning, TEE and other privacy-preserving computation algorithm 3. Support SQL, Python and other high-level languages Feature Enginnering Model Selection Hyper-parameter Optimization Visualization Modeling Data Sources Pre-Processing Multi-party Deployment Joint Training Joint Prediction Model Monitor Data and Algorithm Marketplace Discovery Trading Evaluation Joint model Continuous Training and Deployment Privacy-preserving Computation Network
  • 15. Application Ecosystem Marketing/Advertising User Portrait Customer Match Intelligent City Intelligent Manufacturing Intelligent Transportation Intelligent Building DeFi Model Oracle Privacy-Preserving Dex DeFi Credit Biologic Drug Screening Clinical Trials Target Discovery Finance Anti-fraud Risk Control PlatON DeFi
  • 16. Research Team and Results World-leading research team We have established a research funding for privacy-preserving computation and have a large pool of top cryptographic talent, including professors and PhDs from major universities in China and the U.S. Research results Our research team has been conducting and publishing exploratory and in-depth research in the fields of cryptography, Internet of Things, human intelligence, as well as economics and governance. l Papers l LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction, In ACM CCS, 2020 l Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup, In PKC, 2021 l Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning, In USENIX Security, 2021 l Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time, In eprint 2020/1247 l zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy, In eprint 2021/673 l Open-source privacy-preserving AI framework Rosetta Research grants and project collaborations We regularly fund academic research and conferences on cryptography and privacy-preserving computation, and we collaborate deeply with various projects and research groups. l Conferences: Crypto, Eurocrypt, Asiacrypt, CCS, AsiaCCS, IDASH, etc. l Project in Ethereum: MPC implementation of Proof of Custody in Eth 2.0
  • 17. ROADMAP 2018.05 2020.02 New Baley World Testnet 2020.10 2021.04 PlatON Mainnet 2021.10 Privacy-Preserving Dex Privacy-preserving Computing Network 2022.04 Artificial Intelligence Marketplace Forerunner Network Alaya Baley World Testnet 2022.12 Collaborative AI Network AI
  • 18. THANK YOU Decentralized Privacy-Preserving AI Network Let us compute