disguise
CCCP is Frank-Wolfe in disguise
This paper uncovers a simple but rather surprising connection: it shows that the well-known convex-concave procedure (CCCP) and its generalization to constrained problems are both special cases of the Frank-Wolfe (FW) method. This connection not only provides insight of deep (in our opinion) pedagogical value, but also transfers the recently discovered convergence theory of nonconvex Frank-Wolfe methods immediately to CCCP, closing a long-standing gap in its non-asymptotic convergence theory. We hope the viewpoint uncovered by this paper spurs the transfer of other advances made for FW to both CCCP and its generalizations.
Detecting Content Rating Violations in Android Applications: A Vision-Language Approach
Denipitiyage, D., Silva, B., Seneviratne, S., Seneviratne, A., Chawla, S.
Despite regulatory efforts to establish reliable content-rating guidelines for mobile apps, the process of assigning content ratings in the Google Play Store remains self-regulated by the app developers. There is no straightforward method of verifying developer-assigned content ratings manually due to the overwhelming scale or automatically due to the challenging problem of interpreting textual and visual data and correlating them with content ratings. We propose and evaluate a visionlanguage approach to predict the content ratings of mobile game applications and detect content rating violations, using a dataset of metadata of popular Android games. Our method achieves ~6% better relative accuracy compared to the state-of-the-art CLIP-fine-tuned model in a multi-modal setting. Applying our classifier in the wild, we detected more than 70 possible cases of content rating violations, including nine instances with the 'Teacher Approved' badge. Additionally, our findings indicate that 34.5% of the apps identified by our classifier as violating content ratings were removed from the Play Store. In contrast, the removal rate for correctly classified apps was only 27%. This discrepancy highlights the practical effectiveness of our classifier in identifying apps that are likely to be removed based on user complaints.
- Europe > Switzerland > Zürich > Zürich (0.14)
- Asia > Sri Lanka (0.04)
- Oceania > Australia > New South Wales > Sydney (0.04)
- (8 more...)
- Law (1.00)
- Government (0.87)
- Information Technology > Security & Privacy (0.67)
- Education > Educational Setting (0.46)
Assassins Are Having a Moment. Netflix's Addictive New Hit Captures Their Dangerous Allure.
"I don't kill anyone who doesn't deserve it," says Sam (Ben Whishaw), the self-described "triggerman"--hit man--in the new Netflix spy thriller Black Doves. Sam, like the series' other main character, Helen (not her real name, played by Keira Knightley), works for Black Doves' eponymous organization. They are spies, more or less, but spies for hire, and when you get right down to it, most of Sam's gigs seem to be carrying out hits for drug dealers. Sam isn't the only hit man featured in a sleek, starry TV thriller this winter. On Peacock, Eddie Redmayne plays Alex in a new adaptation of Frederick Forsyth's 1971 novel The Day of the Jackal.
- Media > Television (0.61)
- Media > Film (0.61)
- Information Technology > Services (0.61)
Fears workplace affairs could be exposed as Slack flaw gives hackers access to private channels
Hackers have developed a'difficult to trace' new method to exploit AI tools inside workplace messaging app Slack -- tricking its chatbot into sending malware. The popular collaboration platform has gained prominence for facilitating quick communications between coworkers, with some linking it to a new age of'micro-cheating' and office affairs. The cybersecurity team within Slack's research program said Tuesday that they had patched the issue on the same day outside experts first reported the flaw to them. But the vulnerability, which lets hackers disguise malicious code inside uploaded documents and Google Drive files, highlights the growing risks posed by'artificial intelligence' that lacks the'street smarts' to deal with unscrupulous user requests. While the independent security researcher who first discovered the new flaw praised Slack for its diligent response, they went public with news of the AI's vulnerability'so that users could turn off the necessary settings to decrease their exposure.'
Disguised Copyright Infringement of Latent Diffusion Models
Lu, Yiwei, Yang, Matthew Y. R., Liu, Zuoqiu, Kamath, Gautam, Yu, Yaoliang
Copyright infringement may occur when a generative model produces samples substantially similar to some copyrighted data that it had access to during the training phase. The notion of access usually refers to including copyrighted samples directly in the training dataset, which one may inspect to identify an infringement. We argue that such visual auditing largely overlooks a concealed copyright infringement, where one constructs a disguise that looks drastically different from the copyrighted sample yet still induces the effect of training Latent Diffusion Models on it. Such disguises only require indirect access to the copyrighted material and cannot be visually distinguished, thus easily circumventing the current auditing tools. In this paper, we provide a better understanding of such disguised copyright infringement by uncovering the disguises generation algorithm, the revelation of the disguises, and importantly, how to detect them to augment the existing toolbox. Additionally, we introduce a broader notion of acknowledgment for comprehending such indirect access. Our code is available at https://github.com/watml/disguised_copyright_infringement.
- North America > United States (0.28)
- Europe > Austria > Vienna (0.14)
- North America > Canada > Ontario > Waterloo Region > Waterloo (0.04)
- (2 more...)
Does A.I. Reduce Medical Racism, or Disguise It?
The promise of artificial intelligence in medicine is that it can reduce the influence of human error and bias in health care. But there's growing concern that A.I. in medicine –as in other fields– can reflect the biases and lack of diversity among its creators. And that can have life threatening consequences for African American patients. On today's episode of A Word, Jason Johnson is joined by Margo Snipe, a health reporter for CapitalB News. They discuss how A.I. can sometimes fuel medical racism, and reasons to hope that it can change.
- Health & Medicine (1.00)
- Law > Civil Rights & Constitutional Law (0.69)
- Information Technology > Artificial Intelligence > Applied AI (0.71)
- Information Technology > Communications > Mobile (0.49)
Plagiarism and AI Assistance Misuse in Web Programming: Unfair Benefits and Characteristics
Karnalim, Oscar, Toba, Hapnes, Johan, Meliana Christianti, Handoyo, Erico Darmawan, Setiawan, Yehezkiel David, Luwia, Josephine Alvina
In programming education, plagiarism and misuse of artificial intelligence (AI) assistance are emerging issues. However, not many relevant studies are focused on web programming. We plan to develop automated tools to help instructors identify both misconducts. To fully understand the issues, we conducted a controlled experiment to observe the unfair benefits and the characteristics. We compared student performance in completing web programming tasks independently, with a submission to plagiarize, and with the help of AI assistance (ChatGPT). Our study shows that students who are involved in such misconducts get comparable test marks with less completion time. Plagiarized submissions are similar to the independent ones except in trivial aspects such as color and identifier names. AI-assisted submissions are more complex, making them less readable. Students believe AI assistance could be useful given proper acknowledgment of the use, although they are not convinced with readability and correctness of the solutions.
- Asia > Indonesia > Java > West Java > Bandung (0.06)
- North America > United States > California > Santa Clara County > Palo Alto (0.04)
- Asia > Macao (0.04)
- Information Technology > Software > Programming Languages (1.00)
- Information Technology > Artificial Intelligence > Natural Language > Large Language Model (0.52)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.52)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.52)
Faked Speech Detection with Zero Knowledge
Ajmi, Sahar Al, Hayat, Khizar, Obaidi, Alaa M. Al, Kumar, Naresh, Najmuldeen, Munaf, Magnier, Baptiste
Audio is one of the most used ways of human communication, but at the same time it can be easily misused to trick people. With the revolution of AI, the related technologies are now accessible to almost everyone thus making it simple for the criminals to commit crimes and forgeries. In this work, we introduce a neural network method to develop a classifier that will blindly classify an input audio as real or mimicked; the word 'blindly' refers to the ability to detect mimicked audio without references or real sources. The proposed model was trained on a set of important features extracted from a large dataset of audios to get a classifier that was tested on the same set of features from different audios. The data was extracted from two raw datasets, especially composed for this work; an all English dataset and a mixed dataset (Arabic plus English). These datasets have been made available, in raw form, through GitHub for the use of the research community at https://github.com/SaSs7/Dataset. For the purpose of comparison, the audios were also classified through human inspection with the subjects being the native speakers. The ensued results were interesting and exhibited formidable accuracy.
- North America > United States > New York > New York County > New York City (0.04)
- Europe > France > Occitanie > Hérault > Montpellier (0.04)
- Asia > Middle East > Oman > Ad Dakhiliyah Governorate > Nizwa (0.04)
- (2 more...)
- Research Report (1.00)
- Instructional Material > Course Syllabus & Notes (0.46)
- Information Technology > Security & Privacy (0.93)
- Health & Medicine (0.68)
- Information Technology > Artificial Intelligence > Machine Learning > Performance Analysis > Accuracy (1.00)
- Information Technology > Artificial Intelligence > Speech > Speech Recognition (0.94)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks > Deep Learning (0.68)
Catherine Lacey's Provocative Novel in Disguise
The first thing that you notice about Catherine Lacey's new novel is the lack of a determiner. Nouns float, unhooked from any article. I found myself habitually inserting "The" in the title when the book came up in conversation, that brief sound of specificity, the most common word in the English language and the most wishful. Darkness lifts to reveal a second, nested title page, for a slightly different book: "Biography of X," by C. M. Lucca. Both title pages mention the same publisher, Farrar, Straus & Giroux.
- North America > United States > New York (0.05)
- North America > United States > Montana > Missoula County > Missoula (0.05)
- North America > United States > Mississippi (0.05)
- (3 more...)