mostviewed
-
AI Security
Batch Exploration Attacks on Streamed Data Models
Batch exploration attacks are a class of cyber attacks where adversaries systematically query or probe streamed machine learning models to…
Read More » -
AI Security
How Model Inversion Attacks Compromise AI Systems
A model inversion attack aims to reverse-engineer a target machine learning model to infer sensitive information about its training data.…
Read More » -
AI Security
When AI Trusts False Data: Exploring Data Spoofing’s Impact on Security
Data spoofing is the intentional manipulation, fabrication, or misrepresentation of data with the aim of deceiving systems into making incorrect…
Read More » -
AI Security
The Dark Art of Model Stealing: What You Need to Know
Model stealing, also known as model extraction, is the practice of reverse engineering a machine learning model owned by a…
Read More » -
My Perspectives
The Quantum Computing Threat
Advances in quantum technology are accelerating currently, though the field of scientific study dates back to the late 1990s. Along…
Read More » -
My Perspectives
AI and 5G: AI at the 5G Core – A Double-Edged Sword
The combination of AI and 5G presents many data challenges. These relate to the quality, quantity, storage, processing and privacy…
Read More » -
My Perspectives
AI and 5G – Getting Smart About AI and 5G in Canada
If Canada wants to succeed with its AI-focused innovation agenda, it should also be at the forefront of 5G deployment,…
Read More » -
AI Security
Risks of AI – Meeting the Ghost in the Machine
Because it demands so much manpower, cybersecurity has already benefited from AI and automation to improve threat prevention, detection and…
Read More » -
My Perspectives
Digital Double Helix: Why the Fates of 5G and AI are Intertwined
In the same way that starlings connect to form a dynamic organism greater than themselves, so IoT, 5G and AI…
Read More » -
AI Disinformation
AI-Exacerbated Disinformation and Threats to Democracy
Recent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize…
Read More » -
AI Security
Adaptive Attacks: Learning to Evade Machine Learning-Based IDS
Attackers, often employing techniques like model querying, can gather valuable information regarding the target model’s structure, parameters, and learned features,…
Read More » -
My Perspectives
AI Is Neither the End of Civilization nor the Beginning of Nirvana
Where AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how we should prepare for it…
Read More » -
My Perspectives
AI’s Coming Impact on the Economy
AI is likely to spread across more and more industries. The efficiencies it will bring will likely result in greater…
Read More » -
My Perspectives
AI and The Great Workforce Skill Set Shift
Whether AI and the technologies it enables will reach their full potential depends on the workforce that will work alongside…
Read More » -
My Perspectives
Three Views of Artificial Intelligence (AI) Future
If you’ve read the many predictions about the future of AI, you’ve likely found them to be wildly different. They…
Read More »