In the world of Machine Learning (ML), Matrices are not merely arrangements of numbers; they are the foundation stones upon which complex algorithms are built. Their properties—determinant, rank, singularity, and echelon forms—are critical in shaping the efficacy of ML models. Let’s take a closer look at these properties and elucidate…
Tag: AIforAutomotives
Dredging the Lake of Automotive OS: Balancing Innovation with Security
In an era where vehicles are becoming as connected and complex as any smart device, the automotive industry faces unprecedented challenges in balancing innovation with security. The Operating Systems (OS) at the heart of these advancements are both the catalyst for new features and the gatekeepers of vehicular safety. This…
The GPU.zip Side-Channel Attack: Implications for AI and the Threat of Pixel Stealing
The digital era recently witnessed a new side-channel attack named GPU.zip. While its primary target is graphical data compression in modern GPUs, the ripple effects of this vulnerability stretch far and wide, notably impacting the flourishing field of AI. This article understands the intricacies of the GPU.zip attack, its potential…
Understanding different Reinforcement Learning Models using a simple example
In previous blogposts, we saw how supervised and unsupervised learnings have their own types and how they are different from one another. To understand the difference, we had taken a small and simple example and also identified if and how certain model types could be used interchangeably in specific scenarios….
Reviewing Prompt Injection and GPT-3
Recently, AI researcher Simon Willison discovered a new-yet-familiar kind of attack on OpenAI’s GPT-3. The attack dubbed as prompt injection attack has taken the internet by storm over the last couple of weeks highlighting how vulnerable GPT-3 is to this attack. This review article gives a brief overview on GPT-3,…
Backdoor: The Undercover Agent
As I was reading about backdoors sometime back, I could relate them to undercover agents. But much before getting to that, let’s see what backdoors are. A Backdoor in the world of internet and computerized systems, is like a stealthy / secret door that allows a hacker to get into…
Generative Adversarial Networks (GAN): The Devil’s Advocate
AI is fueled with abundant and qualitative data. But deriving such vast amount from real resources can be quite challenging. Not only because resources are limited, but also the privacy factor which at present is a major security requirement to be complied with, by AI powered systems. In this trade-off…