telephone number
4 exotic phishing scams are surging. Here's how to catch them in the act
Despite ever-improving junk mail filters and more sophisticated defense measures, phishing is still one of the biggest threats to cyber security and they're becoming increasingly difficult to recognize. Criminals are using Large Language Models (LLMs) such as ChatGPT to formulate their emails, which results in largely error-free texts with correct grammar and understandable sentence structure. As hackers become more advanced, you'll need to learn new methods to detect them and stay one step ahead of the game. Below we'll share a few ways you can catch them in the act, and hopefully avoid falling prey to their scams. Barracuda Networks draws attention to new phishing emails that attempt to steal access to the paid ChatGPT accounts.
Machine Unlearning of Features and Labels
Warnecke, Alexander, Pirch, Lukas, Wressnegger, Christian, Rieck, Konrad
Removing information from a machine learning model is a non-trivial task that requires to partially revert the training process. This task is unavoidable when sensitive data, such as credit card numbers or passwords, accidentally enter the model and need to be removed afterwards. Recently, different concepts for machine unlearning have been proposed to address this problem. While these approaches are effective in removing individual data points, they do not scale to scenarios where larger groups of features and labels need to be reverted. In this paper, we propose the first method for unlearning features and labels. Our approach builds on the concept of influence functions and realizes unlearning through closed-form updates of model parameters. It enables to adapt the influence of training data on a learning model retrospectively, thereby correcting data leaks and privacy issues. For learning models with strongly convex loss functions, our method provides certified unlearning with theoretical guarantees. For models with non-convex losses, we empirically show that unlearning features and labels is effective and significantly faster than other strategies.
- North America > Canada > Ontario > Toronto (0.14)
- North America > United States > New York (0.04)
- North America > United States > California > San Diego County > San Diego (0.04)
- (2 more...)
Privacy Implications of Retrieval-Based Language Models
Huang, Yangsibo, Gupta, Samyak, Zhong, Zexuan, Li, Kai, Chen, Danqi
Retrieval-based language models (LMs) have demonstrated improved interpretability, factuality, and adaptability compared to their parametric counterparts, by incorporating retrieved text from external datastores. While it is well known that parametric models are prone to leaking private data, it remains unclear how the addition of a retrieval datastore impacts model privacy. In this work, we present the first study of privacy risks in retrieval-based LMs, particularly $k$NN-LMs. Our goal is to explore the optimal design and training procedure in domains where privacy is of concern, aiming to strike a balance between utility and privacy. Crucially, we find that $k$NN-LMs are more susceptible to leaking private information from their private datastore than parametric models. We further explore mitigations of privacy risks. When privacy information is targeted and readily detected in the text, we find that a simple sanitization step would completely eliminate the risks, while decoupling query and key encoders achieves an even better utility-privacy trade-off. Otherwise, we consider strategies of mixing public and private data in both datastore and encoder training. While these methods offer modest improvements, they leave considerable room for future work. Together, our findings provide insights for practitioners to better understand and mitigate privacy risks in retrieval-based LMs. Our code is available at: https://github.com/Princeton-SysML/kNNLM_privacy .
- North America > United States (0.14)
- Oceania > Australia > Victoria > Melbourne (0.04)
- Asia > Middle East > Jordan (0.04)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence > Natural Language (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning (0.46)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks (0.46)
Mastering Machine Learning: A Step-by-Step Guide with MATLAB
Ready to start applying machine learning with MATLAB? Get started with a MATLAB machine learning example presented in an easy-to-follow tutorial format. Get this ebook, download the code, and step through a hands-on machine learning tutorial that helps you master machine learning techniques. The MATLAB machine learning example, a heart sounds classifier, takes you from loading data to deploying a trained model. Try MATLAB, Simulink, and more.
Machine Learning and Deep Learning Q&A
Learn what questions engineers are asking about machine learning and deep learning. Get answers, solutions, and examples about these popular topics. To continue, please disable browser ad blocking for mathworks.com To submit this form, you must accept and agree to our Privacy Policy. We will not sell or rent your personal contact information.
Ford recruits two robot drivers for testing in its 'weather factory'
Ford is using two robotic test drivers – affectionately named Shelby and Miles – to trial its vehicles in extreme temperatures. The robots are conducting tests in environmental conditions that are too treacherous for any human worker to endure. Shelby and Miles can operate at temperatures ranging from -40 F to 176 F (-40 C to 80 C) as well as at extreme altitudes, Ford says. Their robotic legs extend to the accelerator, brake and clutch pedals, with one arm positioned to change gear and the other used to start and stop the engine. The tests are taking place at Ford's secretive'weather factory' in Cologne, Germany – a building the size of a football pitch that's dedicated to R&D work.
- Europe > Germany > North Rhine-Westphalia > Cologne Region > Cologne (0.27)
- North America > United States (0.16)
- Europe > Sweden (0.05)
- Europe > Austria (0.05)
- Transportation > Ground > Road (1.00)
- Health & Medicine (1.00)
Exploratory Data Analysis (Non-Visual)
I get asked many times "How can I do a good Exploratory Data Analysis (EDA) so that I get the necessary information for feature engineering and building machine learning model?" In this and the next post, I hope to get the question answered. I will NOT claim my process is the best but I hope as more people come into the field, they can use my process as a basis for better EDA and build better models. There are two main benefits of doing EDA and these benefits will reap benefits through the model building process. I will discuss EDA in two posts, non-visual (mainly through simple calculations) and visual.
Test-Drive the Classification Learner App
Create and train a machine learning model by running MATLAB right in your browser. To submit this form, you must accept and agree to our Privacy Policy. We will not sell or rent your personal contact information. See our privacy policy for details. You are already signed in to your MathWorks Account.
Big data revolutionises Europe's fight against terrorism
The threat of terrorism has greatly accelerated the exchange of data between European states. Social media has become indispensable, both for investigative purposes and to fight propaganda. The "Fraternity Taskforce", a group of some 20 investigators, has probing into the Paris attacks of 13 November 2015 since late last year. But this team, based at Europol headquarters in The Hague, has no high-tech surveillance equipment or bullet-proof vests. Its main weapon and its biggest resource is data, vast quantities of data. The European police organisation's focus on terrorism has quickly taken off with this investigation.
- Europe > Netherlands > South Holland > The Hague (0.25)
- Europe > France (0.06)
- Information Technology > Communications > Social Media (0.99)
- Information Technology > Artificial Intelligence (0.99)
- Information Technology > Data Science > Data Mining > Big Data (0.40)
Detecting Promotion Campaigns in Community Question Answering
Li, Xin (Tsinghua University) | Liu, Yiqun (Tsinghua University) | Zhang, Min (Tsinghua University) | Ma, Shaoping (Tsinghua University) | Zhu, Xuan (Samsung Research and Development Institute China - Beijing) | Sun, Jiashen (Samsung Research and Development Institute China - Beijing)
With Community Question Answering (CQA) evolving into a quite popular method for information seeking and providing, it also becomes a target for spammers to disseminate promotion campaigns. Although there are a number of quality estimation efforts on the CQA platform, most of these works focus on identifying and reducing low-quality answers, which are mostly generated by impatient or inexperienced answerers. However, a large number of promotion answers appear to provide high-quality information to cheat CQA users in future interactions. Therefore, most existing quality estimation works in CQA may fail to detect these specially designed answers or question-answer pairs. In contrast to these works, we focus on the promotion channels of spammers, which include (shortened) URLs, telephone numbers and social media accounts. Spammers rely on these channels to connect to users to achieve promotion goals so they are irreplaceable for spamming activities. We propose a propagation algorithm to diffuse promotion intents on an "answerer-channel" bipartite graph and detect possible spamming activities. A supervised learning framework is also proposed to identify whether a QA pair is spam based on propagated promotion intents. Experimental results based on more than 6 million entries from a popular Chinese CQA portal show that our approach outperforms a number of existing quality estimation methods for detecting promotion campaigns on both the answer level and QA pair level.