computer vision object detection
Convolutional neural networks (CNN), or ConvNets, have become the cornerstone of artificial intelligence (AI) in recent years. Their capabilities and limits are an interesting study of where AI stands today.
digital fingerprint
By Gabor Takacs Web tracking is the practice by which websites and third-party companies collect information about users’ online activity. The basis of tracking is the accurate identification of users – you are detected and identified...
starfield data cluster
The two main types of machine learning categories are supervised and unsupervised learning. In this post, we examine their key features and differences.
A machine learning expert decided to address artificial intelligence's lack of imagination, and overnight, he invented generative adversarial networks (GAN).
The main takeaway from the buildup of developments in the cybersecurity landscape is that privacy is becoming a commodity. The CIA is spying on your phone. Hackers are breaking into your home. Your documents, emails,...
One of the most basic practices every cybersecurity guide will recommend is not to click on links and attachments contained in emails coming from unknown sources, and to think twice even if they come from...
machine learning data poisoning
Data poisoning attack target the training of machine learning algorithms and cause them to behave maliciously during inference.
Robot reading book
Training a deep learning model requires vast amounts of training data and compute resources. With transfer learning, developers can cut both on training examples and CPU costs.
openai dactyl reinforcement learning robot hand
From game-playing bots to robotic hands that dexterously handle objects, reinforcement learning creates AI models that requires little training data.
IoT is an often-confused term. Here's what it means now and in the future.