Computer Sciences

Computer Sciences

Common approach to demystify black box AI not ready for prime time

Credit: Pixabay/CC0 Public Domain Artificial intelligence models that interpret medical images hold the promise to enhance clinicians' ability to make accurate and timely diagnoses, while also lessening workload by allowing busy physicians to focus on critical cases and delegate rote tasks to AI. But AI models that lack transparency about...
Computer Sciences

Mathematical formula tackles complex moral decision-making in AI

Credit: Pixabay/CC0 Public Domain An interdisciplinary team of researchers has developed a blueprint for creating algorithms that more effectively incorporate ethical guidelines into artificial intelligence (AI) decision-making programs. The project was focused specifically on technologies in which humans interact with AI programs, such as virtual assistants or "carebots" used in...
Computer Sciences

Swarms of advanced unmanned aircraft to collect key environmental data

Credit: University of Sheffield Swarms of advanced unmanned aircraft are set to carry out aerial surveys of Antarctica—gathering crucial data on changes to the region's environment and wildlife—as part of new research with engineers from the University of Sheffield. The exciting new project, involving researchers from the University's Department of...
Computer Sciences

Are virtual private networks actually private?

Associate Professor Jedidiah Crandall hopes his research will help inform users that the networking fundamentals of virtual private networks, or VPNs, do not provide the security properties people expect. He wants to illuminate a path forward to building a better VPN. Credit: Shutterstock In countries where internet censorship and surveillance...
Computer Sciences

TypoSwype: An image recognition tool to detect typosquatting attacks

Credit: Lee & Yam. In recent decades, cyberattacks have become increasingly varied, introducing various strategies to lure users onto malicious websites or prompt them to share sensitive data. As a result, computer scientists are continuously trying to develop more advanced tools to detect and neutralize these attacks. Typosquatting, one of...
1 2 3 4
Page 2 of 4