Section Start End
Introduction 1:30 1:45
Confidential Computation 1:45 2:20
Coffee Break 2:20 2:30
Differential Privacy and Federated Learning 2:30 3:00
Trusted Execution Environments (Demo) 3:00 3:20
Evaluating Machine Unlearning 3:20 3:30
Panel 3:30 4:00