Computer Sciences

Deep learning networks prefer the human voice—just like us

The digital revolution is built on a foundation of invisible 1s and 0s called bits. As decades pass, and more and more of the world's information and knowledge morph into streams of 1s and 0s, the notion that computers prefer ...

Internet

Inferring what we share by how we share

It's getting harder for people to decipher real information from fake information online. But patterns in the ways in which information is spread over the internet—say, from user to user on a social media network—may ...

Consumer & Gadgets

Research: Millions of smart devices vulnerable to hacking

Researchers at a cybersecurity firm say they have identified vulnerabilities in software widely used by millions of connected devices—flaws that could be exploited by hackers to penetrate business and home computer networks ...

Computer Sciences

A neural network learns when it should not be trusted

Increasingly, artificial intelligence systems known as deep learning neural networks are used to inform decisions vital to human health and safety, such as in autonomous driving or medical diagnosis. These networks are good ...

Security

DNS cache poisoning ready for a comeback

Agroup led by UC Riverside computer security researchers unveiled discovery of a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks this week at the 2020 ACM SIGSAC Conference on ...

page 8 from 20