Internet

How to spot a cyberbot—five tips to keep your device safe

You may know nothing about it, but your phone—or your laptop or tablet—could be taken over by someone else who has found their way in through a back door. They could have infected your device with malware to make it a ...

Computer Sciences

Protecting computer vision from adversarial attacks

Advances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision. From autonomous drones and self-driving cars to medical ...

Engineering

New imager microchip helps devices bring hidden objects to light

Researchers from The University of Texas at Dallas and Oklahoma State University have developed an innovative terahertz imager microchip that can enable devices to detect objects and create images through obstacles that include ...

Machine learning & AI

Q&A: How to make AI systems learn better

Artificial intelligence systems are smart. They can recognize patterns better than humans, for example. Yet humans are still very much needed. How can you better steer those AI systems? LIACS lecturer Jan van Rijn wrote a ...

Software

CT analysis of concrete beams

Concrete's properties as a material have made it an essential part of today's construction methods. Alongside its many advantages, however, this universal favorite has its share of drawbacks—the most prominent being that ...

Internet

Building a template for the future 6G network

Traditional networks are unable to keep up with the demands of modern computing, such as cutting-edge computation and bandwidth-demanding services like video analytics and cybersecurity. In recent years, there has been a ...

page 1 from 3