Menu

Blog

Archive for the ‘information science’ category: Page 249

Jun 22, 2019

An AI “Vaccine” Can Block Adversarial Attacks

Posted by in categories: biotech/medical, cybercrime/malcode, information science, robotics/AI

For as smart as artificial intelligence systems seem to get, they’re still easily confused by hackers who launch so-called adversarial attacks — cyberattacks that trick algorithms into misinterpreting their training data, sometimes to disastrous ends.

In order to bolster AI’s defenses from these dangerous hacks, scientists at the Australian research agency CSIRO say in a press release they’ve created a sort of AI “vaccine” that trains algorithms on weak adversaries so they’re better prepared for the real thing — not entirely unlike how vaccines expose our immune systems to inert viruses so they can fight off infections in the future.

Jun 21, 2019

Researchers demonstrate new path to reliable quantum computation

Posted by in categories: computing, information science, quantum physics

Researchers at the University of Chicago published a novel technique for improving the reliability of quantum computers by accessing higher energy levels than traditionally considered. Most prior work in quantum computation deals with “qubits,” the quantum analogue of binary bits that encode either zero or one. The new work instead leverages “qutrits,” quantum analogues of three-level trits capable of representing zero, one or two.

The UChicago group worked alongside researchers based at Duke University. Both groups are part of the EPiQC (Enabling Practical-scale Quantum Computation) collaboration, an NSF Expedition in Computing. EPiQC’s interdisciplinary research spans from algorithm and software development to architecture and design, with the ultimate goal of more quickly realizing the enormous potential of computing for scientific discovery and computing innovation.

Jun 20, 2019

Quantum Computing for English Majors

Posted by in categories: computing, information science, quantum physics

Poet who discovered Shor’s algorithm answers questions about quantum computers and other mysteries.

Jun 20, 2019

Researchers develop ‘vaccine’ against attacks on machine learning

Posted by in categories: biotech/medical, information science, robotics/AI

Researchers from CSIRO’s Data61, the data and digital specialist arm of Australia’s national science agency, have developed a world-first set of techniques to effectively ‘vaccinate’ algorithms against adversarial attacks, a significant advancement in machine learning research.

Jun 14, 2019

DNA could store all of the world’s data in one room

Posted by in categories: biotech/medical, computing, information science

New algorithm delivers the highest-ever density for large-scale data storage.

Read more

Jun 14, 2019

A Data Storage Revolution? DNA Can Store Near Limitless Data in Almost Zero Space

Posted by in categories: computing, information science, space

In the age of big data, we are quickly producing far more digital information than we can possibly store.

Last year, $20 billion was spent on new data centers in the US alone, doubling the capital expenditure on data center infrastructure from 2016.

And even with skyrocketing investment in data storage, corporations and the public sector are falling behind.

Continue reading “A Data Storage Revolution? DNA Can Store Near Limitless Data in Almost Zero Space” »

Jun 13, 2019

Terrifying AI Matches DNA to Facial Recognition Databases

Posted by in categories: biotech/medical, information science, robotics/AI

Cops would love to have a system that uses DNA from a crime scene to generate a picture of a suspect’s face, but that tech is still restricted to science fiction.

That technology may never exist, but a team of Belgian and American engineers just developed something similar. Using what they know about how DNA shapes the human face, the researchers built an algorithm that scans through a database of images and selects the faces that could be linked to the DNA found at a crime scene, according to research published Wednesday in the journal Nature Communications — a powerful crime-fighting tool, but also a terrifying new way to subvert privacy.

Read more

Jun 10, 2019

Immortality is mathematically impossible, new research finds

Posted by in categories: biotech/medical, information science, life extension, mathematics

A mathematical equation has proven that controlling one of the two major changes in a cell—decay or cancerous growth—enhances the other, causing inevitable death.

NEXT NEWS ❯

Read more

Jun 7, 2019

The New Era of Exponential Encryption

Posted by in categories: encryption, information science

In their book “Era of Exponential Encryption — Beyond Cryptographic Routing” the authors provide a vision that can demonstrate an increasing multiplication of options for encryption and decryption processes: Similar to a grain of rice that doubles exponentially in every field of a chessboard, more and more newer concepts and programming in the area of cryptography increase these manifolds: both, encryption and decryption, require more session-related and multiple keys, so that numerous options even exist for configuring hybrid encryption: with different keys and algorithms, symmetric and asymmetrical methods, or even modern multiple encryption, with that ciphertext is converted again and again to ciphertext. It will be analyzed how a handful of newer applications like e.g. Spot-On and GoldBug E-Mail Client & Crypto Chat Messenger and other open source software programming implement these encryption mechanisms. Renewing a key several times — within the dedicated session with “cryptographic calling” — has forwarded the term of “perfect forward secrecy” to “instant perfect forward secrecy” (IPFS). But even more: if in advance a bunch of keys is sent, a decoding of a message has to consider not only one present session key, but over dozens of keys are sent — prior before the message arrives. The new paradigm of IPFS has already turned into the newer concept of these Fiasco Keys are keys, which provide over a dozen possible ephemeral keys within one session and define Fiasco Forwarding, the approach which complements and follows IPFS. And further: by adding routing- and graph-theory to the encryption process, which is a constant part of the so called Echo Protocol, an encrypted packet might take different graphs and routes within the network. This shifts the current status to a new age: The Era of Exponential Encryption, so the vision and description of the authors. If routing does not require destination information but is replaced by cryptographic in.

Read more

Jun 6, 2019

How Peter Shor’s Algorithm is Destined to Put an End to Modern Encryption

Posted by in categories: computing, encryption, information science, internet, quantum physics

RSA Encryption is an essential safeguard for our online communications. It was also destined to fail even before the Internet made RSA necessary, thanks the work of Peter Shor, whose algorithm in 1994 proved quantum computers could actually be used to solve problems classical computers could not.

Read more