Bell
ICE chief warns AI technology could lead to safety risks for agents: 'Fringe organizations'
Acting ICE Director Todd Lyons explains how far-left groups are using'reverse technology' to reveal the identities of federal immigration officers. Far-left organizations could be using artificial intelligence and other technology to reveal the identity of Immigration and Customs Enforcement agents, acting ICE Director Todd Lyons told Fox News Digital in an interview. Lyons' remarks come as Democrats in Congress recently proposed the VISIBLE Act, which would require clear identification of ICE agents and prevent masking of federal immigration authorities in public-facing circumstances. "If legislation passes to try to unmask ICE agents, they are not allowed to wear them, it runs the risk of agitators, different groups, you know, these fringe organizations using reverse technology, AI, to try to dox their families, try to get their identity, their home addresses," Lyons said of the reaction from agents on the ground. "We've heard elected officials say there shouldn't be any rest for ICE agents or their families. "So they're definitely concerned about that.
- North America > United States > California > Los Angeles County > Los Angeles (0.09)
- North America > United States > Texas (0.06)
- North America > United States > New York (0.05)
- (4 more...)
Automated User Story Generation with Test Case Specification Using Large Language Model
Modern Software Engineering era is moving fast with the assistance of artificial intelligence (AI), especially Large Language Models (LLM). Researchers have already started automating many parts of the software development workflow. Requirements Engineering (RE) is a crucial phase that begins the software development cycle through multiple discussions on a proposed scope of work documented in different forms. RE phase ends with a list of user-stories for each unit task identified through discussions and usually these are created and tracked on a project management tool such as Jira, AzurDev etc. In this research we developed a tool "GeneUS" using GPT-4.0 to automatically create user stories from requirements document which is the outcome of the RE phase. The output is provided in JSON format leaving the possibilities open for downstream integration to the popular project management tools. Analyzing requirements documents takes significant effort and multiple meetings with stakeholders. We believe, automating this process will certainly reduce additional load off the software engineers, and increase the productivity since they will be able to utilize their time on other prioritized tasks.
- North America > Canada > Quebec > Montreal (0.14)
- North America > United States > California > Los Angeles County > Bell (0.04)
- North America > Canada > Saskatchewan > Saskatoon (0.04)
- Europe > Sweden > Vaestra Goetaland > Gothenburg (0.04)
- Questionnaire & Opinion Survey (0.94)
- Research Report > New Finding (0.46)
Building the Intent Landscape of Real-World Conversational Corpora with Extractive Question-Answering Transformers
Corbeil, Jean-Philippe, Li, Mia Taige, Ghavidel, Hadi Abdi
For companies with customer service, mapping intents inside their conversational data is crucial in building applications based on natural language understanding (NLU). Nevertheless, there is no established automated technique to gather the intents from noisy online chats or voice transcripts. Simple clustering approaches are not suited to intent-sparse dialogues. To solve this intent-landscape task, we propose an unsupervised pipeline that extracts the intents and the taxonomy of intents from real-world dialogues. Our pipeline mines intent-span candidates with an extractive Question-Answering Electra model and leverages sentence embeddings to apply a low-level density clustering followed by a top-level hierarchical clustering. Our results demonstrate the generalization ability of an ELECTRA large model fine-tuned on the SQuAD2 dataset to understand dialogues. With the right prompting question, this model achieves a rate of linguistic validation on intent spans beyond 85%. We furthermore reconstructed the intent schemes of five domains from the MultiDoGo dataset with an average recall of 94.3%.
- North America > Canada (0.04)
- North America > United States > Texas (0.04)
- North America > United States > New York (0.04)
- (6 more...)
DDoSDet: An approach to Detect DDoS attacks using Neural Networks
Rangapur, Aman, Kanakam, Tarun, Jubilson, Ajith
This modern world is suffering from issues regarding cybersecurity and privacy. It is truly difficult and economically unfeasible to create and maintain such systems, as well as to assure that both the network and the accompanying systems are not vulnerable to threats and assaults. Over the last several decades, there has been a surge in the number of illegal acts in networks, in addition to an increase in devious and malicious contentAhamad and Aljumah [2015]. When an individual or an organization intentionally and maliciously attempts to enter the information system of another individual or organization, this is referred to as a cyberattack. While most assaults have an economic aim, various recent operations have included data destruction as a goal. Cybersecurity is the need of today's time. Cybersecurity can be defined as the protection of systems, networks, and data within cyberspacewha.
- Asia > Japan > Honshū > Kansai > Kyoto Prefecture > Kyoto (0.05)
- Asia > India > Andhra Pradesh (0.05)
- North America > Canada (0.04)
- (2 more...)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)