Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 22: Line 22:
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.graphistry.com/ graphistry.com]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 
* [http://www.nextgov.com/emerging-tech/2018/12/iarpa-trying-keep-adversaries-corrupting-ai-tools/153419/ Intelligence Advanced Research Projects Activity (IARPA)Is Trying Keep Adversaries From Corrupting AI Tools ... Could cyber adversaries be training the government’s artificial intelligence tools to fail? | Jack Corrigan - Nextgov]
 +
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
  

Revision as of 11:13, 12 January 2019