C.heck: Unterschied zwischen den Versionen
Aus exmediawiki
C.heck (Diskussion | Beiträge) |
C.heck (Diskussion | Beiträge) |
||
Zeile 2: | Zeile 2: | ||
=Links= | =Links= | ||
==adversarial attacks== | ==adversarial attacks== | ||
+ | * Praxis-Beispiele: https://boingboing.net/tag/adversarial-examples | ||
+ | * https://bdtechtalks.com/2018/12/27/deep-learning-adversarial-attacks-ai-malware/ | ||
+ | ===paraphrasing attacks=== | ||
+ | * https://venturebeat.com/2019/04/01/text-based-ai-models-are-vulnerable-to-paraphrasing-attacks-researchers-find/ | ||
* https://bdtechtalks.com/2019/04/02/ai-nlp-paraphrasing-adversarial-attacks/ | * https://bdtechtalks.com/2019/04/02/ai-nlp-paraphrasing-adversarial-attacks/ | ||
+ | ===Tesla=== | ||
+ | * https://spectrum.ieee.org/cars-that-think/transportation/self-driving/three-small-stickers-on-road-can-steer-tesla-autopilot-into-oncoming-lane | ||
* https://boingboing.net/2019/03/31/mote-in-cars-eye.html | * https://boingboing.net/2019/03/31/mote-in-cars-eye.html | ||
− | * https:// | + | ** Paper vom Forschungsteam: https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf |
− | |||
===HowTo's=== | ===HowTo's=== | ||
* https://towardsdatascience.com/know-your-enemy-7f7c5038bdf3 | * https://towardsdatascience.com/know-your-enemy-7f7c5038bdf3 |
Version vom 4. April 2019, 01:22 Uhr
Inhaltsverzeichnis
Links
adversarial attacks
- Praxis-Beispiele: https://boingboing.net/tag/adversarial-examples
- https://bdtechtalks.com/2018/12/27/deep-learning-adversarial-attacks-ai-malware/
paraphrasing attacks
- https://venturebeat.com/2019/04/01/text-based-ai-models-are-vulnerable-to-paraphrasing-attacks-researchers-find/
- https://bdtechtalks.com/2019/04/02/ai-nlp-paraphrasing-adversarial-attacks/
Tesla
- https://spectrum.ieee.org/cars-that-think/transportation/self-driving/three-small-stickers-on-road-can-steer-tesla-autopilot-into-oncoming-lane
- https://boingboing.net/2019/03/31/mote-in-cars-eye.html
- Paper vom Forschungsteam: https://keenlab.tencent.com/en/whitepapers/Experimental_Security_Research_of_Tesla_Autopilot.pdf
HowTo's
- https://towardsdatascience.com/know-your-enemy-7f7c5038bdf3
- https://cv-tricks.com/how-to/breaking-deep-learning-with-adversarial-examples-using-tensorflow/
- https://medium.com/@ml.at.berkeley/tricking-neural-networks-create-your-own-adversarial-examples-a61eb7620fd8
libraries
XAI
- https://de.m.wikipedia.org/wiki/Explainable_Artificial_Intelligence
- https://netzpolitik.org/2018/enquete-kommission-kuenstliche-intelligenz-sachverstaendige-und-abgeordnete-klaeren-grundbegriffe/
- https://www.ayasdi.com/blog/artificial-intelligence/trust-challenge-explainable-ai-not-enough/
- https://www.bons.ai/blog/explainable-artificial-intelligence-using-model-induction
- https://en.m.wikipedia.org/wiki/Right_to_explanation
ethics
- https://www.economist.com/science-and-technology/2018/02/15/computer-programs-recognise-white-men-better-than-black-women
- https://books.google.de/books?id=rLsyDwAAQBAJ&pg=PA95&redir_esc=y#v=onepage&q&f=false
- https://books.google.de/books?id=_H1K3vojDFQC&pg=PA762&redir_esc=y#v=onepage&q&f=false
- https://neil.fraser.name/writing/tank/
- https://www.wired.com/story/why-ai-is-still-waiting-for-its-ethics-transplant/
- AI Now Report: https://medium.com/@AINowInstitute/the-10-top-recommendations-for-the-ai-field-in-2017-b3253624a7
esotheric neural net
- Forscher suchen eigene Programmiersprache: https://t3n.de/news/machine-learning-facebooks-ki-chef-sucht-sprache-1144900/
- esoterische programmiersprachen http://kryptografie.de/kryptografie/chiffre/index-sprachen.htm
KI-generierte Sprache
- Google: https://motherboard.vice.com/de/article/mg7md8/eine-kuenstliche-intelligenz-von-google-hat-gerade-seine-eigene-sprache-erfunden
- veröffentlichtes Paper: https://arxiv.org/pdf/1611.04558v1.pdf
- FB Bots: https://code.fb.com/ml-applications/deal-or-no-deal-training-ai-bots-to-negotiate/
(KI-generierte) Krypto
- https://motherboard.vice.com/de/article/8q8wkv/google-ki-entwickelt-verschluesselung-die-selbst-google-nicht-versteht
- http://kryptografie.de/kryptografie/index.htm
Reproduktive KI
https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/