Goto

Collaborating Authors

Results


Deep Learning on ARM Processors - From Ground Up

#artificialintelligence

All Arm trademarks featured in this course are registered or unregistered trademarks of Arm Limited (or its subsidiaries) in the US or elsewhere. Welcome to the Deep Learning From Ground Up on ARM Processors course. We are going to embark on a very exciting journey together. We are going to learn how to build deep neural networks from scratch on our microcontrollers. We shall begin by learning the basics of deep learning with practical code showing each of the basic building blocks that end up making a giant deep neural network.


Imposing Regulation on Advanced Algorithms

arXiv.org Artificial Intelligence

This book discusses the necessity and perhaps urgency for the regulation of algorithms on which new technologies rely; technologies that have the potential to re-shape human societies. From commerce and farming to medical care and education, it is difficult to find any aspect of our lives that will not be affected by these emerging technologies. At the same time, artificial intelligence, deep learning, machine learning, cognitive computing, blockchain, virtual reality and augmented reality, belong to the fields most likely to affect law and, in particular, administrative law. The book examines universally applicable patterns in administrative decisions and judicial rulings. First, similarities and divergence in behavior among the different cases are identified by analyzing parameters ranging from geographical location and administrative decisions to judicial reasoning and legal basis. As it turns out, in several of the cases presented, sources of general law, such as competition or labor law, are invoked as a legal basis, due to the lack of current specialized legislation. This book also investigates the role and significance of national and indeed supranational regulatory bodies for advanced algorithms and considers ENISA, an EU agency that focuses on network and information security, as an interesting candidate for a European regulator of advanced algorithms. Lastly, it discusses the involvement of representative institutions in algorithmic regulation.


Deep Learning on ARM Processors - From Ground Up

#artificialintelligence

Udemy Coupon - Deep Learning on ARM Processors - From Ground Up, Build Artificial Intelligence Firmware from Scratch on ARM Microcontrollers Created by Bohobiom Engineering, Israel Gbati English [Auto-generated] Students also bought PyTorch: Deep Learning and Artificial Intelligence Complete Guide to TensorFlow for Deep Learning with Python PyTorch for Deep Learning and Computer Vision The Complete Neural Networks Bootcamp: Theory, Applications Deep Learning Prerequisites: Linear Regression in Python Preview this Course GET COUPON CODE Description Arm copyright material reproduced by kind permission of Arm Limited. All Arm trademarks featured in this course are registered or unregistered trademarks of Arm Limited (or its subsidiaries) in the US or elsewhere. Welcome to the Deep Learning From Ground Up on ARM Processors course. We are going to embark on a very exciting journey together. We are going to learn how to build deep neural networks from scratch on our microcontrollers.


Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

arXiv.org Machine Learning

Creating a state-of-the-art deep-learning system requires vast amounts of data, expertise, and hardware, yet research into embedding copyright protection for neural networks has been limited. One of the main methods for achieving such protection involves relying on the susceptibility of neural networks to backdoor attacks, but the robustness of these tactics has been primarily evaluated against pruning, fine-tuning, and model inversion attacks. In this work, we propose a neural network "laundering" algorithm to remove black-box backdoor watermarks from neural networks even when the adversary has no prior knowledge of the structure of the watermark. We are able to effectively remove watermarks used for recent defense or copyright protection mechanisms while achieving test accuracies above 97% and 80% for both MNIST and CIFAR-10, respectively. For all backdoor watermarking methods addressed in this paper, we find that the robustness of the watermark is significantly weaker than the original claims. We also demonstrate the feasibility of our algorithm in more complex tasks as well as in more realistic scenarios where the adversary is able to carry out efficient laundering attacks using less than 1% of the original training set size, demonstrating that existing backdoor watermarks are not sufficient to reach their claims.


A Bayesian algorithm for retrosynthesis

arXiv.org Machine Learning

The identification of synthetic routes that end with a desired product has been an inherently time-consuming process that is largely dependent on expert knowledge regarding a limited fraction of the entire reaction space. At present, emerging machine-learning technologies are overturning the process of retrosynthetic planning. The objective of this study is to discover synthetic routes backwardly from a given desired molecule to commercially available compounds. The problem is reduced to a combinatorial optimization task with the solution space subject to the combinatorial complexity of all possible pairs of purchasable reactants. We address this issue within the framework of Bayesian inference and computation. The workflow consists of two steps: a deep neural network is trained that forwardly predicts a product of the given reactants with a high level of accuracy, following which this forward model is inverted into the backward one via Bayes' law of conditional probability. Using the backward model, a diverse set of highly probable reaction sequences ending with a given synthetic target is exhaustively explored using a Monte Carlo search algorithm. The Bayesian retrosynthesis algorithm could successfully rediscover 80.3% and 50.0% of known synthetic routes of single-step and two-step reactions within top-10 accuracy, respectively, thereby outperforming state-of-the-art algorithms in terms of the overall accuracy. Remarkably, the Monte Carlo method, which was specifically designed for the presence of diverse multiple routes, often revealed a ranked list of hundreds of reaction routes to the same synthetic target. We investigated the potential applicability of such diverse candidates based on expert knowledge from synthetic organic chemistry.


Learning to Make Generalizable and Diverse Predictions for Retrosynthesis

arXiv.org Machine Learning

We propose a new model for making generalizable and diverse retrosynthetic reaction predictions. Given a target compound, the task is to predict the likely chemical reactants to produce the target. This generative task can be framed as a sequence-to-sequence problem by using the SMILES representations of the molecules. Building on top of the popular Transformer architecture, we propose two novel pre-training methods that construct relevant auxiliary tasks (plausible reactions) for our problem. Furthermore, we incorporate a discrete latent variable model into the architecture to encourage the model to produce a diverse set of alternative predictions. On the 50k subset of reaction examples from the United States patent literature (USPTO-50k) benchmark dataset, our model greatly improves performance over the baseline, while also generating predictions that are more diverse.


3 E's of AI: Creating explainable AI - IoT Agenda

#artificialintelligence

Many companies rush to operationalize AI models that are neither understood nor auditable in the race to build predictive models as quickly as possible with open source tools that many users don't fully understand. In my data science organization, we use two techniques -- blockchain and explainable latent features -- that dramatically improve the explainability of the AI models we build. In 2018 I produced a patent application (16/128,359 USA) around using blockchain to ensure that all of the decisions made about a machine learning model, a fundamental component of many AI solutions, are recorded and auditable. My patent describes how to codify analytic and machine learning model development using blockchain technology to associate a chain of entities, work tasks and requirements with a model, including testing and validation checks. The blockchain substantiate a trail of decision-making.


Shotspotter Patent Enables Advancement in Machine Learning Accuracy

#artificialintelligence

ShotSpotter (Nasdaq: SSTI), a gunshot detection, location and forensic analysis provider, announces the U.S. Patent and Trademark Office (USPTO) has granted the company U.S. Patent No. 10,424,048 entitled "Systems and Methods Involving Creation and/or Utilization of Image Mosaics in Classification of Acoustic Events." ShotSpotter's real-time gunshot detection solution uses a two-step process that employs both machine classification and human review. The system can distinguish with high accuracy whether a loud, impulsive sound detected by its acoustic sensors is a gunshot or a non-gunshot incident, such as fireworks, in less than 60 seconds, according to the company. The innovation behind the patent granted to ShotSpotter covers the conversion of multiple features of the audio event into a set of visual displays that are combined into a single image mosaic. This enables the system to leverage deep learning neural networks that typically identify and classify images, not sounds.


Extraction of Complex DNN Models: Real Threat or Boogeyman?

arXiv.org Machine Learning

Recently, machine learning (ML) has introduced advanced solutions to many domains. Since ML models provide business advantage to model owners, protecting intellectual property (IP) of ML models has emerged as an important consideration. Confidentiality of ML models can be protected by exposing them to clients only via prediction APIs. However, model extraction attacks can steal the functionality of ML models using the information leaked to clients through the results returned via the API. In this work, we question whether model extraction is a serious threat to complex, real-life ML models. We evaluate the current state-of-the-art model extraction attack (the Knockoff attack) against complex models. We reproduced and confirm the results in the Knockoff attack paper. But we also show that the performance of this attack can be limited by several factors, including ML model architecture and the granularity of API response. Furthermore, we introduce a defense based on distinguishing queries used for Knockoff attack from benign queries. Despite the limitations of the Knockoff attack, we show that a more realistic adversary can effectively steal complex ML models and evade known defenses.


Toward Artificial Sentience, Significant Futures Work, and more

#artificialintelligence

An autonomous idea-creation system that already has invented patentable concepts has itself now been patented. The U.S. Patent and Trade Office has awarded a patent to Stephen L. Thaler, president and CEO of Imagination Engines Inc., for his Device for the Autonomous Bootstrapping of Unified Sentience (DABUS). Formally, the patent is titled "Electro‐Optical Device and Method for Identifying and Inducing Topological States Formed Among Interconnecting Neural Modules," which Thaler says constitutes a "successor to deep learning and the future of artificial general intelligence." With DABUS, "vast swarms of neural nets join to form chains that encode concepts gleaned from their environment," Thaler said in a press release. "It also teaches the noise‐stimulation of such neural chaining systems to generate derivative concepts from their accumulated experience (i.e., idea formation)."