Security

Using game theory to model poisoning attack scenarios

Poisoning attacks are among the greatest security threats for machine learning (ML) models. In this type of attack, an adversary tries to control a fraction of the data used to train neural networks and injects malicious ...

Computer Sciences

Encrypting images with chaos

Research published in the International Journal of Information and Computer Security details a way to encode an image using a chaotic cryptosystem that makes it harder for someone to illicitly break the encryption by boosting ...

Robotics

A conceptual framework for modeling human-robot trust

Researchers at Pennsylvania State University, MIT and Georgia Institute of Technology have recently developed a conceptual framework to model the human-robot trust phenomenon. Their framework, outlined in a paper published ...

Computer Sciences

Breakthrough enables perfectly secure digital communications

A group of researchers has achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.

Computer Sciences

Social intelligence is the next frontier for AI, researchers say

Siri and Google Assistant may be able to schedule meetings on request, but they don't have the social understanding to independently prioritize the appointments—yet. According to researchers based in China, artificial intelligence ...

Computer Sciences

Chaos theory provides hints for controlling the weather

Under a project led by the RIKEN Center for Computational Science, researchers have used computer simulations to show that weather phenomena such as sudden downpours could potentially be modified by making small adjustments ...

Robotics

How to help humans understand robots

Scientists who study human-robot interaction often focus on understanding human intentions from a robot's perspective, so the robot learns to cooperate with people more effectively. But human-robot interaction is a two-way ...

Computer Sciences

Researchers offer future 6G network concept

In 6G Cognitive Information Theory: A Mailbox Perspective, published by MDPI in Big Data and Cognitive Computing on October 16, 2021, NIST and international researchers propose a "cognitive" 6G network—significantly enhancing ...

page 5 from 18