Aktionen

Benutzer

C.heck: Unterschied zwischen den Versionen

Aus exmediawiki

Zeile 112: Zeile 112:
  
 
=LANGUAGE=
 
=LANGUAGE=
 +
 +
==(KI-generierte) Krypto==
 +
* https://motherboard.vice.com/de/article/8q8wkv/google-ki-entwickelt-verschluesselung-die-selbst-google-nicht-versteht
 +
* http://kryptografie.de/kryptografie/index.htm
 +
 
==esotheric neural net (programming language)==
 
==esotheric neural net (programming language)==
 
* Forscher suchen eigene Programmiersprache: https://t3n.de/news/machine-learning-facebooks-ki-chef-sucht-sprache-1144900/
 
* Forscher suchen eigene Programmiersprache: https://t3n.de/news/machine-learning-facebooks-ki-chef-sucht-sprache-1144900/
Zeile 205: Zeile 210:
 
* https://remicnrd.github.io/Natural-language-generation/
 
* https://remicnrd.github.io/Natural-language-generation/
 
* https://github.com/shashank-bhatt-07/Natural-Language-Generation-using-LSTM-Keras
 
* https://github.com/shashank-bhatt-07/Natural-Language-Generation-using-LSTM-Keras
 
=(KI-GENERIERTE) KRYPTO=
 
* https://motherboard.vice.com/de/article/8q8wkv/google-ki-entwickelt-verschluesselung-die-selbst-google-nicht-versteht
 
* http://kryptografie.de/kryptografie/index.htm
 
  
 
=REPRODUKTIVE KI=
 
=REPRODUKTIVE KI=
 
https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/
 
https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/

Version vom 16. April 2019, 15:09 Uhr

Keras Examples

https://github.com/keras-team/keras/tree/master/examples


einfaches perceptron (schöne skizzen): https://github.com/nature-of-code/NOC-S17-2-Intelligence-Learning/blob/master/week4-neural-networks/perceptron.pdf

ADVERSARIAL ATTACKS

KNN's sind extrem anfällig für...

WHITE BOX ATTACKS

Untargeted Adversarial Attacks

Adversarial attacks that just want your model to be confused and predict a wrong class are called Untargeted Adversarial Attacks.

  • nicht zielgerichtet

Fast Gradient Sign Method(FGSM)

FGSM is a single step attack, ie.. the perturbation is added in a single step instead of adding it over a loop (Iterative attack).

Basic Iterative Method

Störung, anstatt in einem einzelnen Schritt in mehrere kleinen Schrittgrößen anwenden

Iterative Least-Likely Class Method

ein Bild erstellen, welches in der Vorhersage den niedrigsten Score trägt

Targeted Adversarial Attacks

Attacks which compel the model to predict a (wrong) desired output are called Targeted Adversarial attacks

  • zielgerichtet

(Un-)Targeted Adversarial Attacks

kann beides...

Projected Gradient Descent (PGD)

Eine Störung finden die den Verlust eines Modells bei einer bestimmten Eingabe maximiert:

BLACK BOX ATTACKS

on computer vision

propose zeroth order optimization (ZOO)

Black-Box Attacks using Adversarial Samples

  • a technique that uses the victim model as an oracle to label a synthetic training set for the substitute, so the attacker need not even collect a training set to mount the attack

new Tesla Hack

on voice (ASR)

hidden voice commands

Psychoacoustic Hiding (Attacking Speech Recognition)

on written text (NLP)

paraphrasing attacks

Anti Surveillance

http://dismagazine.com/dystopia/evolved-lifestyles/8115/anti-surveillance-how-to-hide-from-machines/

libraries

ETHIK

XAI

XAI/NLG

LANGUAGE

(KI-generierte) Krypto

esotheric neural net (programming language)

NLU / NLI

NLP

Speech recognition

https://de.wikipedia.org/wiki/Spracherkennung

NLG

https://byteacademy.co/blog/overview-NLG

XAI durch Sprachrationalisierung

(un-)supervised techniques

LSTM

http://colah.github.io/posts/2015-08-Understanding-LSTMs/

LSTM+RNN

Autoencoder

https://www.wired.co.uk/article/google-artificial-intelligence-poetry

LSTM+Autoencoder

GAN

https://arxiv.org/abs/1705.10929

transformer-based language model

OpenAI's gpt-2:

Diskussion:

Poetry

examples...

datenbanken

deutsch:

englisch:

E2E NLG Challenge:

chatbots

Toolkits/Librarys

tryouts:

REPRODUKTIVE KI

https://www.sir-apfelot.de/kuenstliche-intelligenz-erschafft-neue-ki-systeme-10436/