Difference between revisions of "Cybersecurity"

From
Jump to: navigation, search
Line 24: Line 24:
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
 
** [http://www.fbo.gov/index.php?s=opportunity&mode=form&id=93e7534a60d62bc7c44d810c5ea0fdee&tab=core&_cview=0 TrojAI - Office of the Director of National Intelligence Office: Intelligence Advanced Research Projects Activity FedBizOpps.gov] predict whether AI systems have been corrupted through so-called “Trojan attacks.”
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
* Adversarial Attacks on [[Graph Convolutional Network (GCN), Graph Neural Networks (Graph Nets), Geometric Deep Learning]]  
 
  
 
<youtube>cjo_u_yT2wQ</youtube>
 
<youtube>cjo_u_yT2wQ</youtube>
Line 41: Line 40:
 
<youtube>R9lkyJL2LlQ</youtube>
 
<youtube>R9lkyJL2LlQ</youtube>
 
<youtube>B3ZZWx9WUEk</youtube>
 
<youtube>B3ZZWx9WUEk</youtube>
 +
<youtube>gCWBFyFTxVU</youtube>

Revision as of 20:32, 17 January 2019