This blog post is a one stop platform for summary of different AI models that are in predominant use. The comparative assessment of these models is based on various parameters such as – Definition, Process, Main Learning Approach, Pros, Cons, and Applications. The idea is to summarize these models and…
Triggered vs. Triggerless Backdoor Attacks using a Single Example
In previous blog post, there was an introduction to backdoor attack and its various forms. In this post, I will provide the basic difference between the two forms of attacks using a single example so as to understand the difference in a more precise manner and I will finally provide…
ChatGPT: Assignment companion
With all the hype going on lately about ChatGPT, it has become the talk of every household. While a certain clan is reaping its benefits, there are some who are either exploring its breaking point or misusing it incessantly at various degrees. Starting from misusing it for assignments to generating…
Reviewing Prompt Injection and GPT-3
Recently, AI researcher Simon Willison discovered a new-yet-familiar kind of attack on OpenAI’s GPT-3. The attack dubbed as prompt injection attack has taken the internet by storm over the last couple of weeks highlighting how vulnerable GPT-3 is to this attack. This review article gives a brief overview on GPT-3,…
Machine “Un”learning
With increasing concern for data privacy, there have been several measures taken up to make AI applications privacy friendly. Of many such measures, the most commonly found and practiced method is Federated Learning. While an entire blog post will be dedicated to know how it works and its current application,…
Artificial Intelligence and Cryptography: An Intersection
There has been this common belief among a large sector of academicians and researchers about Artificial Intelligence (AI) and Cryptography – “They are not relatable” or “There is nothing about Cryptography that AI can do.” Up until times when AI was still quite invisible, one might have continued believing the…
Backdoor: The Undercover Agent
As I was reading about backdoors sometime back, I could relate them to undercover agents. But much before getting to that, let’s see what backdoors are. A Backdoor in the world of internet and computerized systems, is like a stealthy / secret door that allows a hacker to get into…
Explainability vs. Confidentiality: A Conundrum
Ever since AI models have rendered biased results and have caused a major deal of dissatisfaction, panic, chaos, and insecurities, “Explainability” has become the buzz word. Indeed it’s genuine and a “Must-have” for an AI based product. The user has the right to question, “Why?” and “How?”. But how much…
Generative Adversarial Networks (GAN): The Devil’s Advocate
AI is fueled with abundant and qualitative data. But deriving such vast amount from real resources can be quite challenging. Not only because resources are limited, but also the privacy factor which at present is a major security requirement to be complied with, by AI powered systems. In this trade-off…
AI-powered Fuzz Testing on Automotives
Until sometime back, fuzz testing was pretty much manual operation. Passing random data as input to check how target system reacts is one effective way to identify if the system is having flaws that may go unnoticed and creep their way into release models. But how much of data is…