Computer Scientists Achieve ‘Crown Jewel’ of Cryptography

A cryptographic master tool called indistinguishability obfuscation has for years seemed too good to be true. Three researchers have figured out that it can work.

… Indistinguishability obfuscation, if it could be built, would be able to hide not just collections of data but the inner workings of a computer program itself, creating a sort of cryptographic master tool from which nearly every other cryptographic protocol could be built.  Read More

#homomorphic-encryption, #quantum

Don’t Sleep on China’s New Blockchain Internet

U.S. national security policymakers are working aggressively to push back China’s global market advance in 5G and artificial intelligence technology. Meanwhile, the Chinese Communist Party (CCP) is progressing unfettered in a parallel technological campaign: expanding global blockchain infrastructure. Read More

#blockchain

LinkedIn open-sources Dagli, a machine learning library for Java

LinkedIn today open-sourced Dagli, a machine learning library for Java (and other JVM languages) that ostensibly makes it easier to write bug-resistant, readable, modifiable, maintainable, and deployable model pipelines without incurring technical debt. Read More

#devops

Gait-based Emotion Learning

Read More
#robotics, #videos, #image-recognition

Can I Stop Big Data Companies From Getting My Personal Information?

I am going to answer this one right here in the intro: no, you can’t. In 2020, it is hard to just to go to the grocery store without inadvertently surrendering 40 or 50 highly personal data-points on the walk over. Go ahead, delete your Facebook—it makes no difference. It wouldn’t make a difference if you’d never had one in the first place—as we know, Facebook has enough data to build “shadow profiles” for those who, somehow, have never joined the site. We’re at the stage of harm reduction, pretty much—trying at least to limit Big Data’s file on us. For this week’s Giz Asks, we reached out to a number of experts for advice on how we might go about doing that. Read More

#big7, #surveillance

Transfer Learning in Deep Learning

What is Deep Learning? It is a branch of Machine Learning which uses a simulation of the human brain which is known as neural networks. These neural networks are made up of neurons that are similar to the fundamental unit of the human brain. The neurons make up a neural network model and this field of study altogether is named deep learning.

The end result of a neural network is called a deep learning model. Mostly, in deep learning, unstructured data is used from which the deep learning model extracts features on its own by repeated training on the data. Such models that are designed for one particular set of data when available for use as the starting point for developing another model with a different set of data and features, is known as Transfer Learning. In simple terms, Transfer Learning is a popular method where one model developed for a particular task is again used as the starting point to develop a model for another task. Read More

#transfer-learning

New Generation of Artificial Intelligence Development Plan

The rapid development of artificial intelligence will profoundly change human social lifeand the world. To seize the major strategic opportunities for the development of artificial intelligence, build China’s first-mover advantage in artificial intelligence development, accelerate the construction of innovative countries and the world’s science and technology power, this plan is enacted in accordance with the requirements of the CPC Central Committee and State Council. Read More

#china-ai

Threat of Quantum Computing to Bitcoin Should be Taken Seriously, But there’s Enough Time to Upgrade

LocalBitcoins, a leading peer to peer (P2P) Bitcoin exchange, notes that with the advent of quantum computing, there have been concerns that this new technology could be a threat to existing online protocols. Some experts claim that powerful quantum computers might become a legitimate threat to the security of Bitcoin (BTC) and the current encryption algorithms that it uses.

According to LocalBitcoins:

“While the threat of quantum computing to Bitcoin is to be taken seriously, experts believe that Bitcoin [and other cryptocurrencies] have time to adapt to the quantum age without compromising [their] security in the process.” Read More

#blockchain, #quantum

Artificial General Intelligence: A technology with more Cons than Pros

It is not every day that humans are exposed to questions like what will happen if technology exceeds the human thought process. Or what will happen if machines became conscious or start having conscience so that they can take decisions, equivalent to that of humans? Sounds Catastrophic, Right? However, scientists and researchers are looking out for an alternative solution that can perform tasks which the traditional artificial intelligence and its subsidiaries cannot.

… Research labs like OpenAI are already working to create AI more diverse so that technology can contribute to human advancement. However, with curiosity about AGI, the researchers need to pause and analyse, what is in store for humans if this technology actually comes into existence? Read More

#human

Do the math with Steve Brunton, a UW professor whose YouTube popularity keeps adding up

There’s online teaching and then there’s cool YouTube-style teaching with a lightboard, neon-colored markers, a black backdrop and a Steve Jobs-worthy wardrobe on the instructor.

Steve Brunton is doing the latter.

…. His YouTube channel has attracted more than 95,000 subscribers and four million views. Read More

#machine-learning, #videos