Goto

Collaborating Authors

Results


Pros And Cons of AI In Manufacturing DataScienceCentral.com

#artificialintelligence

The fourth industrial revolution has been a game-changer, with the global economy's expansion driving the adoption of new technologies across sectors. Manufacturers are using AI software in product design, production, supply chain, and logistics. AI analytics and data are helping in improving product quality and efficiency. Advances in machine learning, artificial intelligence (AI), and Big Data have initiated an algorithm-based era. Today companies are able to automate multiple tasks, cutting down on errors as well as downtime and expenditures associated with them using AI.


C3 AI announces AI cybersecurity grant recipients

#artificialintelligence

Did you miss a session at the Data Summit? Today, C3 AI's CEO Thomas Siebel announced the third group of Digital Transformation Institute (DTI) grant recipients to accelerate the development of artificial intelligence (AI) and machine learning (ML) technologies in hopes to combat emerging threats. As an organization, C3 AI provides enterprises with an AI Application platform they can use to create, deploy, and manage AI applications for use cases like fraud detection, network health, supply network optimization, energy management, and more. The grant was established in March 2020 by C3 AI, Microsoft, and some of the world's leading universities. The goal is to engage the world's top scientists through cash grants to encourage them to conduct research and train practitioners on AI, machine learning, Cloud computing, IoT, big data analytics, organizational behavior, public policy, and ethics.


How Predictive Analytics Can Combat Cybercrime

#artificialintelligence

Defending against cybercrime is a challenging task. Cybercriminals are always discovering new attack methods, so security professionals have to continually adapt and stay vigilant. Predictive analytics can make that a lot easier. Predictive analytics in cybersecurity could help companies with limited security staff stay safe from sophisticated attacks. Here's a closer look at how it works and how it could help defend against cybercriminals.


Technology Ethics in Action: Critical and Interdisciplinary Perspectives

arXiv.org Artificial Intelligence

This special issue interrogates the meaning and impacts of "tech ethics": the embedding of ethics into digital technology research, development, use, and governance. In response to concerns about the social harms associated with digital technologies, many individuals and institutions have articulated the need for a greater emphasis on ethics in digital technology. Yet as more groups embrace the concept of ethics, critical discourses have emerged questioning whose ethics are being centered, whether "ethics" is the appropriate frame for improving technology, and what it means to develop "ethical" technology in practice. This interdisciplinary issue takes up these questions, interrogating the relationships among ethics, technology, and society in action. This special issue engages with the normative and contested notions of ethics itself, how ethics has been integrated with technology across domains, and potential paths forward to support more just and egalitarian technology. Rather than starting from philosophical theories, the authors in this issue orient their articles around the real-world discourses and impacts of tech ethics--i.e., tech ethics in action.


Studying the Robustness of Anti-adversarial Federated Learning Models Detecting Cyberattacks in IoT Spectrum Sensors

arXiv.org Artificial Intelligence

Device fingerprinting combined with Machine and Deep Learning (ML/DL) report promising performance when detecting cyberattacks targeting data managed by resource-constrained spectrum sensors. However, the amount of data needed to train models and the privacy concerns of such scenarios limit the applicability of centralized ML/DL-based approaches. Federated learning (FL) addresses these limitations by creating federated and privacy-preserving models. However, FL is vulnerable to malicious participants, and the impact of adversarial attacks on federated models detecting spectrum sensing data falsification (SSDF) attacks on spectrum sensors has not been studied. To address this challenge, the first contribution of this work is the creation of a novel dataset suitable for FL and modeling the behavior (usage of CPU, memory, or file system, among others) of resource-constrained spectrum sensors affected by different SSDF attacks. The second contribution is a pool of experiments analyzing and comparing the robustness of federated models according to i) three families of spectrum sensors, ii) eight SSDF attacks, iii) four scenarios dealing with unsupervised (anomaly detection) and supervised (binary classification) federated models, iv) up to 33% of malicious participants implementing data and model poisoning attacks, and v) four aggregation functions acting as anti-adversarial mechanisms to increase the models robustness.


Global Big Data Conference

#artificialintelligence

Artificial intelligence (AI) technology has become a critical disruptor in almost every industry and banking is no exception. The introduction of AI in banking apps and services has made the sector more customer-centric and technologically relevant. AI-based systems can help banks reduce costs by increasing productivity and making decisions based on information unfathomable to a human agent. Also, intelligent algorithms are able to spot anomalies and fraudulent information in a matter of seconds. A report by Business Insider suggests that nearly 80% of banks are aware of the potential benefits that AI presents to their sector.


Video Intelligence as a component of a Global Security system

arXiv.org Artificial Intelligence

This paper describes the evolution of our research from video analytics to a global security system with focus on the video surveillance component. Indeed video surveillance has evolved from a commodity security tool up to the most efficient way of tracking perpetrators when terrorism hits our modern urban centers. As number of cameras soars, one could expect the system to leverage the huge amount of data carried through the video streams to provide fast access to video evidences, actionable intelligence for monitoring real-time events and enabling predictive capacities to assist operators in their surveillance tasks. This research explores a hybrid platform for video intelligence capture, automated data extraction, supervised Machine Learning for intelligently assisted urban video surveillance; Extension to other components of a global security system are discussed. Applying Knowledge Management principles in this research helps with deep problem understanding and facilitates the implementation of efficient information and experience sharing decision support systems providing assistance to people on the field as well as in operations centers. The originality of this work is also the creation of "common" human-machine and machine to machine language and a security ontology.


Systems Challenges for Trustworthy Embodied Systems

arXiv.org Artificial Intelligence

A new generation of increasingly autonomous and self-learning systems, which we call embodied systems, is about to be developed. When deploying these systems into a real-life context we face various engineering challenges, as it is crucial to coordinate the behavior of embodied systems in a beneficial manner, ensure their compatibility with our human-centered social values, and design verifiably safe and reliable human-machine interaction. We are arguing that raditional systems engineering is coming to a climacteric from embedded to embodied systems, and with assuring the trustworthiness of dynamic federations of situationally aware, intent-driven, explorative, ever-evolving, largely non-predictable, and increasingly autonomous embodied systems in uncertain, complex, and unpredictable real-world contexts. We are also identifying a number of urgent systems challenges for trustworthy embodied systems, including robust and human-centric AI, cognitive architectures, uncertainty quantification, trustworthy self-integration, and continual analysis and assurance.


Essentials

#artificialintelligence

Discover the essential news about Mitre ATT&CK.


Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

arXiv.org Artificial Intelligence

The malware has been being one of the most damaging threats to computers that span across multiple operating systems and various file formats. To defend against the ever-increasing and ever-evolving threats of malware, tremendous efforts have been made to propose a variety of malware detection methods that attempt to effectively and efficiently detect malware. Recent studies have shown that, on the one hand, existing ML and DL enable the superior detection of newly emerging and previously unseen malware. However, on the other hand, ML and DL models are inherently vulnerable to adversarial attacks in the form of adversarial examples, which are maliciously generated by slightly and carefully perturbing the legitimate inputs to confuse the targeted models. Basically, adversarial attacks are initially extensively studied in the domain of computer vision, and some quickly expanded to other domains, including NLP, speech recognition and even malware detection. In this paper, we focus on malware with the file format of portable executable (PE) in the family of Windows operating systems, namely Windows PE malware, as a representative case to study the adversarial attack methods in such adversarial settings. To be specific, we start by first outlining the general learning framework of Windows PE malware detection based on ML/DL and subsequently highlighting three unique challenges of performing adversarial attacks in the context of PE malware. We then conduct a comprehensive and systematic review to categorize the state-of-the-art adversarial attacks against PE malware detection, as well as corresponding defenses to increase the robustness of PE malware detection. We conclude the paper by first presenting other related attacks against Windows PE malware detection beyond the adversarial attacks and then shedding light on future research directions and opportunities.