When we use AI for evil. threat categories. #EuroCyberWeek pic.twitter.com/0rmm66GZ7b— π»πππ πΊπ (@lcsuarezt) 19 novembre 2018
Showing posts with label 2018. Show all posts
Showing posts with label 2018. Show all posts
Monday, 19 November 2018
AI for evil. #EuroCyberWeek
C&ESAR 2018, day 1
During this week, Rennes will be hosting the European Cyber Week. This is a great opportunity for communication service providers (CSP), manufacturers, industry players and end users to meet and present current research activities about Artificial Intelligence and cyber security.
Opening speeches stressed on the importance on AI for defense, since each day networks and services experience attacks, not only from external actors, but from inside our networks. The idea is not only to disrupt service, but to steal data, jeopardizing research and intellectual property. This constitutes the rise of adversarial AI, and to react to this menace, it is necessary to enhance our understanding and usage of generative adversarial networks.
Other interesting topic is about "opening the black box" in order to have an explanatory AI, which has the goal of explaining the reasoning of the decisions taken by AI. This is important to gain confidence of users and to speed up the adoption of these techniques in various use cases.
Some other topics that caught my attention:
Opening speeches stressed on the importance on AI for defense, since each day networks and services experience attacks, not only from external actors, but from inside our networks. The idea is not only to disrupt service, but to steal data, jeopardizing research and intellectual property. This constitutes the rise of adversarial AI, and to react to this menace, it is necessary to enhance our understanding and usage of generative adversarial networks.
Other interesting topic is about "opening the black box" in order to have an explanatory AI, which has the goal of explaining the reasoning of the decisions taken by AI. This is important to gain confidence of users and to speed up the adoption of these techniques in various use cases.
Some other topics that caught my attention:
- The diverse malicious AI techniques to break cyber-security, such as data poisoning. This in order to induce errors on the machine learning model.
- The bias problem, which most of the times has its source of the training data and leads to erroneous decisions at the end of the AI process.
- The usage of different frameworks to have behavioral analysis, very useful to detect deviation of usual usage patterns of an entity. This helps to detect compromised entities our users that deviate or abuse of privileges.
I hope day 2 brings new insights and interesting approaches to better understand AI and its challenges.
Thursday, 1 February 2018
From the Deloitte TMT Predictions session (II)
Now I see that it makes perfect sense that #5G focuses on eMBB: it can use the design concepts of #4G to deliver service and it can leverage on its security features (which work ~well~ enough). Security must be adapted and enhanced for the other 5G use cases.
— π»πππ πΊπ (@lcsuarezt) 1 fΓ©vrier 2018
Tuesday, 19 December 2017
Global Predictions 2018: interesting view about smartphone usage
I came up with Deloitte's Global Predictions 2018. I found two interesting views about smartphone usage, that may seem counter-intuitive, but I believe that are true. See the images below.
At the end, all technology will be perceived as a part of us. I think that the important message is to use it for good: provide added value to the life of people, to empower them to make dreams come true and enhance the quality of living.
At the end, all technology will be perceived as a part of us. I think that the important message is to use it for good: provide added value to the life of people, to empower them to make dreams come true and enhance the quality of living.
Subscribe to:
Posts (Atom)