Not too long ago, it was considered state of the art research to make a computer distinguish cats vs dogs. Now image classification is 'Hello World' of Machine Learning (ML), something one can implement in just a few lines of code using TensorFlow.
Topic: Machine Learning (ML)
Google's search engine will now better understand your confusing search queries, the company said Friday. Google said it's updating the tool to improve analysis of natural language. The idea is to let people type in queries that reflect how they speak in real life, instead of entering a string of keywords they think the software is more likely to understand.
Researchers have demonstrated a new algorithm for detecting so-called deepfake images-those altered imperceptibly by AI systems, potentially for nefarious purposes. Initial tests of the algorithm picked out phony from undoctored images down to the individual pixel level with between 71 and 95 percent accuracy, depending on the sample data set used. The
The Federal Bureau of Investigation (FBI) and Immigration and Customs Enforcement (ICE) are exploiting state DMV records for facial recognition data without the knowledge or permission of drivers.
The U.S. intelligence community's research arm wants to train algorithms to track people across sprawling video surveillance networks, and it needs more data to do it.
Large data volumes (aka “big data”) coupled with the use of new technologies can greatly increase the amount of Personally Identifiable Information (PII) data collected by an organization. Correspondingly, there has been an escalation of security breaches involving PII data which has contributed to the loss of millions of records over the past few years. The
In a paper that will be presented at the renowned IEEE Symposium on Security and Privacy in San Francisco this May, a group from Prof. Ben Zhao and Prof. Heather Zheng's SAND Lab describe the first generalized defense against these backdoor attacks in neural networks.
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. This edition of the
Cryptography is an integral part of a cybersecurity professional’s toolkit. It is used for Confidentiality, Integrity, Non-repudiation and more. Cryptosystems are the cornerstone for securing communication, data and information systems globally and are deeply embedded in most technologies. Cryptography is integral to hordes of applications where people
This article discusses how to apply security log monitoring capabilities for Amazon Web Services (AWS) Infrastructure as a Service (IaaS) cloud environments. It will provide an overview of AWS CloudTrail and CloudWatch Logs, which can be stored and mined for suspicious events. Security teams implementing AWS solutions will benefit from applying security