mostviewed
- 
	
			AI SecurityBatch Exploration Attacks on Streamed Data ModelsBatch exploration attacks are a class of cyber attacks where adversaries systematically query or probe streamed machine learning models to… Read More »
- 
	
			AI SecurityHow Model Inversion Attacks Compromise AI SystemsA model inversion attack aims to reverse-engineer a target machine learning model to infer sensitive information about its training data.… Read More »
- 
	
			AI SecurityWhen AI Trusts False Data: Exploring Data Spoofing’s Impact on SecurityData spoofing is the intentional manipulation, fabrication, or misrepresentation of data with the aim of deceiving systems into making incorrect… Read More »
- 
	
			AI SecurityThe Dark Art of Model Stealing: What You Need to KnowModel stealing, also known as model extraction, is the practice of reverse engineering a machine learning model owned by a… Read More »
- 
	
			My PerspectivesThe Quantum Computing ThreatAdvances in quantum technology are accelerating currently, though the field of scientific study dates back to the late 1990s. Along… Read More »
- 
	
			My PerspectivesAI and 5G: AI at the 5G Core – A Double-Edged SwordThe combination of AI and 5G presents many data challenges. These relate to the quality, quantity, storage, processing and privacy… Read More »
- 
	
			My PerspectivesAI and 5G – Getting Smart About AI and 5G in CanadaIf Canada wants to succeed with its AI-focused innovation agenda, it should also be at the forefront of 5G deployment,… Read More »
- 
	
			AI SecurityRisks of AI – Meeting the Ghost in the MachineBecause it demands so much manpower, cybersecurity has already benefited from AI and automation to improve threat prevention, detection and… Read More »
- 
	
			My PerspectivesDigital Double Helix: Why the Fates of 5G and AI are IntertwinedIn the same way that starlings connect to form a dynamic organism greater than themselves, so IoT, 5G and AI… Read More »
- 
	
			AI DisinformationAI-Exacerbated Disinformation and Threats to DemocracyRecent events have confirmed that the cyber realm can be used to disrupt democracies as surely as it can destabilize… Read More »
- 
	
			AI SecurityAdaptive Attacks: Learning to Evade Machine Learning-Based IDSAttackers, often employing techniques like model querying, can gather valuable information regarding the target model’s structure, parameters, and learned features,… Read More »
- 
	
			My PerspectivesAI Is Neither the End of Civilization nor the Beginning of NirvanaWhere AI, robots, IoT and the so-called Fourth Industrial Revolution are taking us, and how we should prepare for it… Read More »
- 
	
			My PerspectivesAI’s Coming Impact on the EconomyAI is likely to spread across more and more industries. The efficiencies it will bring will likely result in greater… Read More »
- 
	
			My PerspectivesAI and The Great Workforce Skill Set ShiftWhether AI and the technologies it enables will reach their full potential depends on the workforce that will work alongside… Read More »
- 
	
			My PerspectivesThree Views of Artificial Intelligence (AI) FutureIf you’ve read the many predictions about the future of AI, you’ve likely found them to be wildly different. They… Read More »
 
 
 
 
 
 
 
 
 
 
 
 
 
 
