aap
Web Technologies Security in the AI Era: A Survey of CDN-Enhanced Defenses
Hosain, Mehrab, Shuvo, Sabbir Alom, Ogbe, Matthew, Mazumder, Md Shah Jalal, Rahman, Yead, Hakim, Md Azizul, Pandey, Anukul
The modern web stack, which is dominated by browser-based applications and API-first backends, now operates under an adversarial equilibrium where automated, AI-assisted attacks evolve continuously. Content Delivery Networks (CDNs) and edge computing place programmable defenses closest to users and bots, making them natural enforcement points for machine-learning (ML) driven inspection, throttling, and isolation. This survey synthesizes the landscape of AI-enhanced defenses deployed at the edge: (i) anomaly- and behavior-based Web Application Firewalls (WAFs) within broader Web Application and API Protection (WAAP), (ii) adaptive DDoS detection and mitigation, (iii) bot management that resists human-mimicry, and (iv) API discovery, positive security modeling, and encrypted-traffic anomaly analysis. We add a systematic survey method, a threat taxonomy mapped to edge-observable signals, evaluation metrics, deployment playbooks, and governance guidance. We conclude with a research agenda spanning XAI, adversarial robustness, and autonomous multi-agent defense. Our findings indicate that edge-centric AI measurably improves time-to-detect and time-to-mitigate while reducing data movement and enhancing compliance, yet introduces new risks around model abuse, poisoning, and governance.
- Europe (0.28)
- North America > United States > Louisiana > Lincoln Parish > Ruston (0.04)
- Asia > Mongolia (0.04)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Services (0.70)
- Government (0.69)
Indeterminacy in Affective Computing: Considering Meaning and Context in Data Collection Practices
Dudzik, Bernd, Hrkalovic, Tiffany Matej, Hao, Chenxu, Raman, Chirag, Tsfasman, Masha
Automatic Affect Prediction (AAP) uses computational analysis of input data such as text, speech, images, and physiological signals to predict various affective phenomena (e.g., emotions or moods). These models are typically constructed using supervised machine-learning algorithms, which rely heavily on labeled training datasets. In this position paper, we posit that all AAP training data are derived from human Affective Interpretation Processes, resulting in a form of Affective Meaning. Research on human affect indicates a form of complexity that is fundamental to such meaning: it can possess what we refer to here broadly as Qualities of Indeterminacy (QIs) - encompassing Subjectivity (meaning depends on who is interpreting), Uncertainty (lack of confidence regarding meanings' correctness), Ambiguity (meaning contains mutually exclusive concepts) and Vagueness (meaning is situated at different levels in a nested hierarchy). Failing to appropriately consider QIs leads to results incapable of meaningful and reliable predictions. Based on this premise, we argue that a crucial step in adequately addressing indeterminacy in AAP is the development of data collection practices for modeling corpora that involve the systematic consideration of 1) a relevant set of QIs and 2) context for the associated interpretation processes. To this end, we are 1) outlining a conceptual model of AIPs and the QIs associated with the meaning these produce and a conceptual structure of relevant context, supporting understanding of its role. Finally, we use our framework for 2) discussing examples of context-sensitivity-related challenges for addressing QIs in data collection setups. We believe our efforts can stimulate a structured discussion of both the role of aspects of indeterminacy and context in research on AAP, informing the development of better practices for data collection and analysis.
- Europe > Netherlands > South Holland > Delft (0.04)
- Europe > Netherlands > North Holland > Amsterdam (0.04)
- North America > United States > Massachusetts > Middlesex County > Cambridge (0.04)
- Research Report (0.50)
- Workflow (0.48)
Constructions Are So Difficult That Even Large Language Models Get Them Right for the Wrong Reasons
Zhou, Shijia, Weissweiler, Leonie, He, Taiqi, Schütze, Hinrich, Mortensen, David R., Levin, Lori
In this paper, we make a contribution that can be understood from two perspectives: from an NLP perspective, we introduce a small challenge dataset for NLI with large lexical overlap, which minimises the possibility of models discerning entailment solely based on token distinctions, and show that GPT-4 and Llama 2 fail it with strong bias. We then create further challenging sub-tasks in an effort to explain this failure. From a Computational Linguistics perspective, we identify a group of constructions with three classes of adjectives which cannot be distinguished by surface features. This enables us to probe for LLM's understanding of these constructions in various ways, and we find that they fail in a variety of ways to distinguish between them, suggesting that they don't adequately represent their meaning or capture the lexical properties of phrasal heads.
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.14)
- North America > United States > Illinois > Cook County > Chicago (0.04)
- Europe > Germany > Bavaria > Upper Bavaria > Munich (0.04)
- (7 more...)
Moving Forward by Moving Backward: Embedding Action Impact over Action Semantics
Zeng, Kuo-Hao, Weihs, Luca, Mottaghi, Roozbeh, Farhadi, Ali
A common assumption when training embodied agents is that the impact of taking an action is stable; for instance, executing the "move ahead" action will always move the agent forward by a fixed distance, perhaps with some small amount of actuator-induced noise. This assumption is limiting; an agent may encounter settings that dramatically alter the impact of actions: a move ahead action on a wet floor may send the agent twice as far as it expects and using the same action with a broken wheel might transform the expected translation into a rotation. Instead of relying that the impact of an action stably reflects its pre-defined semantic meaning, we propose to model the impact of actions on-the-fly using latent embeddings. We evaluate our AAP on two challenging visual navigation tasks in the AI2-THOR and Habitat environments and show that our AAP is highly performant even when faced, at inference-time with missing actions and, previously unseen, perturbed action space. Moreover, we observe significant improvement in robustness against these actions when evaluating in real-world scenarios. Humans show a remarkable capacity for planning when faced with substantially constrained or augmented means by which they may interact with their environment. For instance, a human who begins to walk on ice will readily shorten their stride to prevent slipping. Likewise, a human will spare little mental effort in deciding to exert more force to lift their hand when it is weighed down by groceries. Even in these mundane tasks, we see that the effect of a humans' actions can have significantly different outcomes depending on the setting: there is no predefined one-to-one mapping between actions and their impact. The same is true for embodied agents where something as simple as attempting to moving forward can result in radically different outcomes depending on the load the agent carries, the presence of surface debris, and the maintenance level of the agent's actuators (e.g., are any wheels broken?). We call this the action-stability assumption (AS assumption).
Scalable Attribution of Adversarial Attacks via Multi-Task Learning
Guo, Zhongyi, Han, Keji, Ge, Yao, Ji, Wei, Li, Yun
Deep neural networks (DNNs) can be easily fooled by adversarial attacks during inference phase when attackers add imperceptible perturbations to original examples, i.e., adversarial examples. Many works focus on adversarial detection and adversarial training to defend against adversarial attacks. However, few works explore the tool-chains behind adversarial examples, which can help defenders to seize the clues about the originator of the attack, their goals, and provide insight into the most effective defense algorithm against corresponding attacks. With such a gap, it is necessary to develop techniques that can recognize tool-chains that are leveraged to generate the adversarial examples, which is called Adversarial Attribution Problem (AAP). In this paper, AAP is defined as the recognition of three signatures, i.e., {\em attack algorithm}, {\em victim model} and {\em hyperparameter}. Current works transfer AAP into single label classification task and ignore the relationship between these signatures. The former will meet combination explosion problem as the number of signatures is increasing. The latter dictates that we cannot treat AAP simply as a single task problem. We first conduct some experiments to validate the attributability of adversarial examples. Furthermore, we propose a multi-task learning framework named Multi-Task Adversarial Attribution (MTAA) to recognize the three signatures simultaneously. MTAA contains perturbation extraction module, adversarial-only extraction module and classification and regression module. It takes the relationship between attack algorithm and corresponding hyperparameter into account and uses the uncertainty weighted loss to adjust the weights of three recognition tasks. The experimental results on MNIST and ImageNet show the feasibility and scalability of the proposed framework as well as its effectiveness in dealing with false alarms.
- North America > United States (0.14)
- Asia > China > Jiangsu Province > Nanjing (0.05)
Datacentric analysis to reduce pedestrians accidents: A case study in Colombia
Puentes, Michael, Novoa, Diana, Nivia, John Delgado, Hernández, Carlos Barrios, Carrillo, Oscar, Mouël, Frédéric Le
Since 2012, in a case-study in Bucaramanga-Colombia, 179 pedestrians died in car accidents, and another 2873 pedestrians were injured. Each day, at least one passerby is involved in a tragedy. Knowing the causes to decrease accidents is crucial, and using system-dynamics to reproduce the collisions' events is critical to prevent further accidents. This work implements simulations to save lives by reducing the city's accidental rate and suggesting new safety policies to implement. Simulation's inputs are video recordings in some areas of the city. Deep Learning analysis of the images results in the segmentation of the different objects in the scene, and an interaction model identifies the primary reasons which prevail in the pedestrians or vehicles' behaviours. The first and most efficient safety policy to implement - validated by our simulations - would be to build speed bumps in specific places before the crossings reducing the accident rate by 80%.
- South America > Colombia > Santander Department > Bucaramanga (0.26)
- South America > Colombia > Bogotá D.C. > Bogotá (0.05)
- Europe > France (0.04)
- (9 more...)
- Transportation > Ground > Road (1.00)
- Transportation > Infrastructure & Services (0.95)
Invacio Invest ICO – We are working to resolve some of the world's most complex and recalcitrant problems using our original distributed artificial intelligence systems
The following Agreement is split into two elements: (i) a "Subscription Agreement" relating to the sale of Invacio Tokens (Block-chain Tokens), referred to as'Coins' or'Invacio Coins'; and (ii), a second element relating to the'Gifting' of Invacio Holdings (UK) Ltd C-Class Stock ("Class C Shares", "Class C" or "C shares") allocations via their current Offshore Holding Corporation Invacio (AAP) Holdings Ltd, The Share Gifting is Equity in the the Main UK Limited Company, by William J D West, CEO of Invacio, thus it's holding companies and subsidiaries, Enterprises or Ventures are included in the Gifting as full assets of Invacio Holdings (UK) Ltd . Invacio Holdings (UK) Ltd and its subsidiaries Invacio (AAP) Holdings Ltd and Invacio Holdings (HK) Ltd, or any Offshore Holding Company, Subsidiary or Enterprise that will be utilised to administered and to allow funds as well as coins to be collected and distributed in full accordance with the regulations of all relevant jurisdictions.