Computer Sciences

A neural network learns when it should not be trusted

Increasingly, artificial intelligence systems known as deep learning neural networks are used to inform decisions vital to human health and safety, such as in autonomous driving or medical diagnosis. These networks are good ...

Computer Sciences

When AI is made by AI, results are impressive

(Tech Xplore)—Researchers exploring AI systems are making news and familiarizing the public with terms like reinforcement learning and machine learning. Recent headlines are still making some heads turn in surprise. AI ...

Computer Sciences

How will machine learning change science?

Machine learning has burst onto the scene in the past two decades and will be a defining technology of the future. It is transforming large sectors of society, including healthcare, education, transport, and food and industrial ...

Robotics

Solving the challenges of robotic pizza-making

Imagine a pizza maker working with a ball of dough. She might use a spatula to lift the dough onto a cutting board then use a rolling pin to flatten it into a circle. Easy, right? Not if this pizza maker is a robot.

Computer Sciences

An AI app that can spot deepfake videos of famous people

A pair of researchers, one with Gymnasium of Johannes Kepler, the other with the University of California, Berkley, has developed an artificial intelligence (AI) application capable of determining whether a video clip of ...

Hi Tech & Innovation

Deep-learning system detects human presence by harvesting RF signals

Researchers at Syracuse University in New York have recently developed a system that can detect the presence of humans in a given environment by analyzing ambient radio frequency (RF) signals. This new system, presented in ...

Computer Sciences

A deep learning technique to generate DNS amplification attacks

Deep learning techniques have recently proved to be highly promising for detecting cybersecurity attacks and determining their nature. Concurrently, many cybercriminals have been devising new attacks aimed at interfering ...

page 1 from 10