亚洲男人的天堂2018av,欧美草比,久久久久久免费视频精选,国色天香在线看免费,久久久久亚洲av成人片仓井空

Privacy is a key principle for developing ethical AI technologies, but how does including AI technologies in products and services change privacy risks? We constructed a taxonomy of AI privacy risks by analyzing 321 documented AI privacy incidents. We codified how the unique capabilities and requirements of AI technologies described in those incidents generated new privacy risks, exacerbated known ones, or otherwise did not meaningfully alter the risk. We present 12 high-level privacy risks that AI technologies either newly created (e.g., exposure risks from deepfake pornography) or exacerbated (e.g., surveillance risks from collecting training data). One upshot of our work is that incorporating AI technologies into a product can alter the privacy risks it entails. Yet, current privacy-preserving AI/ML methods (e.g., federated learning, differential privacy) only address a subset of the privacy risks arising from the capabilities and data requirements of AI.

相關內容

分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)學(xue)是(shi)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)的(de)(de)(de)實踐和(he)科(ke)學(xue)。Wikipedia類(lei)(lei)(lei)(lei)(lei)別(bie)說明了一(yi)(yi)種分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa),可(ke)以(yi)通(tong)過自(zi)動方式提取(qu)Wikipedia類(lei)(lei)(lei)(lei)(lei)別(bie)的(de)(de)(de)完整分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)。截至2009年(nian),已經證明,可(ke)以(yi)使(shi)用人工(gong)構(gou)(gou)建(jian)的(de)(de)(de)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)(例(li)如(ru)像WordNet這樣的(de)(de)(de)計算詞(ci)典的(de)(de)(de)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa))來改進(jin)和(he)重組Wikipedia類(lei)(lei)(lei)(lei)(lei)別(bie)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)。 從廣義上(shang)講,分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)還適(shi)用于除父(fu)子(zi)層次結構(gou)(gou)以(yi)外(wai)的(de)(de)(de)關系方案,例(li)如(ru)網絡結構(gou)(gou)。然后分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)可(ke)能(neng)包(bao)括有(you)多父(fu)母(mu)的(de)(de)(de)單身孩子(zi),例(li)如(ru),“汽(qi)車”可(ke)能(neng)與(yu)父(fu)母(mu)雙方一(yi)(yi)起(qi)出現“車輛”和(he)“鋼結構(gou)(gou)”;但是(shi)對某些人而言,這僅(jin)意(yi)味著(zhu)“汽(qi)車”是(shi)幾種不同分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)的(de)(de)(de)一(yi)(yi)部分(fen)(fen)(fen)(fen)。分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)也可(ke)能(neng)只是(shi)將事物組織成組,或者(zhe)是(shi)按字母(mu)順序排(pai)列的(de)(de)(de)列表(biao);但是(shi)在這里,術(shu)語詞(ci)匯更(geng)合適(shi)。在知識(shi)管理(li)中的(de)(de)(de)當前用法(fa)中,分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)被認(ren)為比本體論(lun)窄,因為本體論(lun)應用了各種各樣的(de)(de)(de)關系類(lei)(lei)(lei)(lei)(lei)型。 在數學(xue)上(shang),分(fen)(fen)(fen)(fen)層分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)法(fa)是(shi)給定對象(xiang)(xiang)集(ji)的(de)(de)(de)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)樹(shu)結構(gou)(gou)。該結構(gou)(gou)的(de)(de)(de)頂部是(shi)適(shi)用于所有(you)對象(xiang)(xiang)的(de)(de)(de)單個分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei),即根節點。此根下的(de)(de)(de)節點是(shi)更(geng)具(ju)體的(de)(de)(de)分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei),適(shi)用于總分(fen)(fen)(fen)(fen)類(lei)(lei)(lei)(lei)(lei)對象(xiang)(xiang)集(ji)的(de)(de)(de)子(zi)集(ji)。推理(li)的(de)(de)(de)進(jin)展從一(yi)(yi)般到(dao)更(geng)具(ju)體。

知識薈萃

精品入門(men)和進階教程(cheng)、論文和代碼整理等

更多

查看相(xiang)關VIP內(nei)容、論文(wen)、資訊等

Numerous open-source and commercial malware detectors are available. However, their efficacy is threatened by new adversarial attacks, whereby malware attempts to evade detection, e.g., by performing feature-space manipulation. In this work, we propose an explainability-guided and model-agnostic testing framework for robustness of malware detectors when confronted with adversarial attacks. The framework introduces the concept of Accrued Malicious Magnitude (AMM) to identify which malware features could be manipulated to maximize the likelihood of evading detection. We then use this framework to test several state-of-the-art malware detectors' abilities to detect manipulated malware. We find that (i) commercial antivirus engines are vulnerable to AMM-guided test cases; (ii) the ability of a manipulated malware generated using one detector to evade detection by another detector (i.e., transferability) depends on the overlap of features with large AMM values between the different detectors; and (iii) AMM values effectively measure the fragility of features (i.e., capability of feature-space manipulation to flip the prediction results) and explain the robustness of malware detectors facing evasion attacks. Our findings shed light on the limitations of current malware detectors, as well as how they can be improved.

Developing socially competent robots requires tight integration of robotics, computer vision, speech processing, and web technologies. We present the Socially-interactive Robot Software platform (SROS), an open-source framework addressing this need through a modular layered architecture. SROS bridges the Robot Operating System (ROS) layer for mobility with web and Android interface layers using standard messaging and APIs. Specialized perceptual and interactive skills are implemented as ROS services for reusable deployment on any robot. This facilitates rapid prototyping of collaborative behaviors that synchronize perception with physical actuation. We experimentally validated core SROS technologies including computer vision, speech processing, and GPT2 autocomplete speech implemented as plug-and-play ROS services. Modularity is demonstrated through the successful integration of an additional ROS package, without changes to hardware or software platforms. The capabilities enabled confirm SROS's effectiveness in developing socially interactive robots through synchronized cross-domain interaction. Through demonstrations showing synchronized multimodal behaviors on an example platform, we illustrate how the SROS architectural approach addresses shortcomings of previous work by lowering barriers for researchers to advance the state-of-the-art in adaptive, collaborative customizable human-robot systems through novel applications integrating perceptual and social abilities.

Microservices are increasingly used in modern applications, leading to a growing need for effective service composition solutions. However, we argue that traditional API-centric composition mechanisms (e.g., RPC, REST, and Pub/Sub) hamper the modularity of microservices. These mechanisms introduce rigid code-level coupling, scatter composition logic, and hinder visibility into cross-service data exchanges. Ultimately, these limitations complicate the maintenance and evolution of microservice-based applications. In response, we propose a rethinking of service composition and present Knactor, a new data-centric composition framework to restore the modularity that microservices were intended to offer. Knactor decouples service composition from service development, allowing composition to be implemented as explicit data exchanges among multiple services. Our initial case study suggests that Knactor simplifies service composition and creates new opportunities for optimizations.

We argue that transaction ordering techniques for capturing Maximal Extractable Value (MEV) in blockchains where fees can influence the execution sequence do not directly apply to blockchains where execution order is determined based on transactions' arrival times. The First-Come-First-Served (FCFS) nature of such blockchains can yield different optimization strategies for MEV searchers, requiring further study. This paper explores the applicability of MEV extraction techniques from fee-based blockchains on an FCFS blockchain such as Algorand. Our results reveal similarities to recent trends on fee-based blockchains like Ethereum, with most arbitrages occurring through backruns on pending transactions in the network. However, we attribute the outcomes to different underlying reasons. While we do not observe any latency optimizations between specific searchers and block proposers, we discuss that this is due to searchers adopting similar strategies and Algorand's relay-based network infrastructure. We finally propose a novel strategy for searchers through Batch Transaction Issuance, leading the network to congestion and enabling frontrunning-based ordering techniques.

As artificial intelligence (AI) models continue to scale up, they are becoming more capable and integrated into various forms of decision-making systems. For models involved in moral decision-making, also known as artificial moral agents (AMA), interpretability provides a way to trust and understand the agent's internal reasoning mechanisms for effective use and error correction. In this paper, we provide an overview of this rapidly-evolving sub-field of AI interpretability, introduce the concept of the Minimum Level of Interpretability (MLI) and recommend an MLI for various types of agents, to aid their safe deployment in real-world settings.

Knowledge graph embedding (KGE) is a increasingly popular technique that aims to represent entities and relations of knowledge graphs into low-dimensional semantic spaces for a wide spectrum of applications such as link prediction, knowledge reasoning and knowledge completion. In this paper, we provide a systematic review of existing KGE techniques based on representation spaces. Particularly, we build a fine-grained classification to categorise the models based on three mathematical perspectives of the representation spaces: (1) Algebraic perspective, (2) Geometric perspective, and (3) Analytical perspective. We introduce the rigorous definitions of fundamental mathematical spaces before diving into KGE models and their mathematical properties. We further discuss different KGE methods over the three categories, as well as summarise how spatial advantages work over different embedding needs. By collating the experimental results from downstream tasks, we also explore the advantages of mathematical space in different scenarios and the reasons behind them. We further state some promising research directions from a representation space perspective, with which we hope to inspire researchers to design their KGE models as well as their related applications with more consideration of their mathematical space properties.

Face recognition technology has advanced significantly in recent years due largely to the availability of large and increasingly complex training datasets for use in deep learning models. These datasets, however, typically comprise images scraped from news sites or social media platforms and, therefore, have limited utility in more advanced security, forensics, and military applications. These applications require lower resolution, longer ranges, and elevated viewpoints. To meet these critical needs, we collected and curated the first and second subsets of a large multi-modal biometric dataset designed for use in the research and development (R&D) of biometric recognition technologies under extremely challenging conditions. Thus far, the dataset includes more than 350,000 still images and over 1,300 hours of video footage of approximately 1,000 subjects. To collect this data, we used Nikon DSLR cameras, a variety of commercial surveillance cameras, specialized long-rage R&D cameras, and Group 1 and Group 2 UAV platforms. The goal is to support the development of algorithms capable of accurately recognizing people at ranges up to 1,000 m and from high angles of elevation. These advances will include improvements to the state of the art in face recognition and will support new research in the area of whole-body recognition using methods based on gait and anthropometry. This paper describes methods used to collect and curate the dataset, and the dataset's characteristics at the current stage.

In pace with developments in the research field of artificial intelligence, knowledge graphs (KGs) have attracted a surge of interest from both academia and industry. As a representation of semantic relations between entities, KGs have proven to be particularly relevant for natural language processing (NLP), experiencing a rapid spread and wide adoption within recent years. Given the increasing amount of research work in this area, several KG-related approaches have been surveyed in the NLP research community. However, a comprehensive study that categorizes established topics and reviews the maturity of individual research streams remains absent to this day. Contributing to closing this gap, we systematically analyzed 507 papers from the literature on KGs in NLP. Our survey encompasses a multifaceted review of tasks, research types, and contributions. As a result, we present a structured overview of the research landscape, provide a taxonomy of tasks, summarize our findings, and highlight directions for future work.

Current deep learning research is dominated by benchmark evaluation. A method is regarded as favorable if it empirically performs well on the dedicated test set. This mentality is seamlessly reflected in the resurfacing area of continual learning, where consecutively arriving sets of benchmark data are investigated. The core challenge is framed as protecting previously acquired representations from being catastrophically forgotten due to the iterative parameter updates. However, comparison of individual methods is nevertheless treated in isolation from real world application and typically judged by monitoring accumulated test set performance. The closed world assumption remains predominant. It is assumed that during deployment a model is guaranteed to encounter data that stems from the same distribution as used for training. This poses a massive challenge as neural networks are well known to provide overconfident false predictions on unknown instances and break down in the face of corrupted data. In this work we argue that notable lessons from open set recognition, the identification of statistically deviating data outside of the observed dataset, and the adjacent field of active learning, where data is incrementally queried such that the expected performance gain is maximized, are frequently overlooked in the deep learning era. Based on these forgotten lessons, we propose a consolidated view to bridge continual learning, active learning and open set recognition in deep neural networks. Our results show that this not only benefits each individual paradigm, but highlights the natural synergies in a common framework. We empirically demonstrate improvements when alleviating catastrophic forgetting, querying data in active learning, selecting task orders, while exhibiting robust open world application where previously proposed methods fail.

Aspect based sentiment analysis (ABSA) can provide more detailed information than general sentiment analysis, because it aims to predict the sentiment polarities of the given aspects or entities in text. We summarize previous approaches into two subtasks: aspect-category sentiment analysis (ACSA) and aspect-term sentiment analysis (ATSA). Most previous approaches employ long short-term memory and attention mechanisms to predict the sentiment polarity of the concerned targets, which are often complicated and need more training time. We propose a model based on convolutional neural networks and gating mechanisms, which is more accurate and efficient. First, the novel Gated Tanh-ReLU Units can selectively output the sentiment features according to the given aspect or entity. The architecture is much simpler than attention layer used in the existing models. Second, the computations of our model could be easily parallelized during training, because convolutional layers do not have time dependency as in LSTM layers, and gating units also work independently. The experiments on SemEval datasets demonstrate the efficiency and effectiveness of our models.

北京阿比特科技有限公司