Mario Fritz is a faculty member at the CISPA Helmholtz Center for Information Security, an honorary professor at Saarland University, and a fellow of the European Laboratory for Learning and Intelligent Systems (ELLIS). Until 2018, he led a research group at the Max Planck Institute for Computer Science. Previously, he was a PostDoc at the International Computer Science Institute (ICSI) and UC Berkeley after receiving his PhD from TU Darmstadt and studying computer science at FAU Erlangen-Nuremberg. His research focuses on trustworthy artificial intelligence, especially at the intersection of information security and machine learning. He is Associate Editor of the journal "IEEE Transactions on Pattern Analysis and Machine Intelligence (TPAMI)," coordinates the Helmholtz project "Trustworthy Federated Data Analytics," and has published over 100 scientific articles - 80 of them in top conferences and journals.
USENIX
32nd USENIX Security Symposium32nd USENIX Security Symposium
USENIX-Security
USENIX SecurityUSENIX Security
NeurIPS
Proceedings of Machine Learning ResearchThirty-sixth Conference on Neural Information Processing Systems
USENIX-Security
USENIX Security Symposium (USENIX Security)USENIX Security Symposium (USENIX Security), 2022.
ICML
Proceedings of the 39th International Conference on Machine LearningInternational Conference on Machine Learning (ICML)
CVPR
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)Conference on Computer Vision and Pattern Recognition
CVPR
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)Conference on Computer Vision and Pattern Recognition
ICLR
International Conference on Learning RepresentationsThe Tenth International Conference on Learning Representations
ICLR
International Conference on Learning RepresentationsThe Tenth International Conference on Learning Representations
UNSPECIFIED
Proceedings of the Conference on Health, Inference, and LearningConference on Health, Inference, and Learning
Trustworthy Machine Learning
Machine learning has made great advances over the past year and many techniques have found their ways into applications. This leads to an increasing demand of techniques that not only perform well - but are also "trustworthy".
Trustworthiness includes:
- Interpretability of the prediction
- Robustness against changes to the input, which occur naturally or with malicious intend
- Privacy preserving machine learning (e.g. when dealing with sensitive data such as in health applications)
- Fairness
- ...
As a proseminar’s primary purpose is to learn presentation skills, the seminar will feature two presentations from each student.
In the first half of the semester, we will have presentations of two topics each week. After each presentation, fellow students and lecturers will provide feedback on how to improve the presentation. This general feedback must then be taken into account for the second half of the semester, where again each student will present.
The first presentations will count towards 30% of the overall grade, the second presentation will count towards 70% of the overall grade. Attendance in the proseminar meetings is mandatory. At most one session can be skipped, after that you need to bring a doctor’s note to excuse your absence.
Machine Learning in Cyber Security
Recent advances in Machine Learning has lead to near (or beyond) human-level performance in many tasks - autonomous driving, voice assistance, playing a variety of games. In terms of privacy and security, this is a double-edged sword. ML techniques can be used to efficiently detect and prevent attacks (e.g., intrusion detection). However, their deployment to many real-world sensitive systems (e.g., self-driving cars, the cloud) also makes them susceptible to numerous attacks, such as introducing imperceptible perturbations in inputs and forcing ML systems behave in unintended ways.
The course explores in-depth both of these sides to Machine Learning and Cyber Security. The content addresses the following areas:
While we do a brief recap in the beginning, the course requires knowledge on Machine Learning.
Date for lecture: Tuesdays noon to 2pm.
Date for exercise: Fridays 2pm to 4pm
Due to the size of the course - the lecture will start in an online format until further notice.
The course requires prior knowledge on Machine Learning.
Once you have registered - please find internal information and schedule and links here (under construction).
Proseminar: Trustworthy Machine Learning
Machine learning has made great advances over the past year and many techniques have found their ways into applications. This leads to an increasing demand of techniques that not only perform well - but are also "trustworthy".
Lecture: High Level Computer Vision
This course will cover essential techniques for high-level computer vision. These techniques facilitate semantic interpretation of visual data, as it is required for a broad range of applications like robotics, driver assistance, multi-media retrieval, surveillance etc.
Lecture: Machine Learning in Cybersecurity
Recent advances in Machine Learning has lead to near (or beyond) human-level performance in many tasks - autonomous driving, voice assistance, playing a variety of games.