The technology behind sophisticated mass surveillance systems have made enormous strides in recent years. You can’t even jaywalk in some parts of the world without an AI-powered camera snitching on ...
The algorithms that computers use to determine what objects are–a cat, a dog, or a toaster, for instance–have a vulnerability. This vulnerability is called an adversarial example. It’s an image or ...
Researchers at Katholieke Universiteit Leuven have demonstrated how a small, square, printed patch can be used as “cloaking device” to hide people from AI object detectors. In recent years, ...
Adversarial attacks are not something new to the world of Deep Networks used for image recognition. However, as the research with Deep Learning grows, more flaws are uncovered. The team at the ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results