From Pixels to Principles: A Decade of Progress and Landscape in Trustworthy Computer Vision.Kexin Huang,Yan Teng,Yang Chen &Yingchun Wang -2024 -Science and Engineering Ethics 30 (3):1-21.detailsThe rapid development of computer vision technologies and applications has brought forth a range of social and ethical challenges. Due to the unique characteristics of visual technology in terms of data modalities and application scenarios, computer vision poses specific ethical issues. However, the majority of existing literature either addresses artificial intelligence as a whole or pays particular attention to natural language processing, leaving a gap in specialized research on ethical issues and systematic solutions in the field of computer vision. This (...) paper utilizes bibliometrics and text-mining techniques to quantitatively analyze papers from prominent academic conferences in computer vision over the past decade. It first reveals the developing trends and specific distribution of attention regarding trustworthy aspects in the computer vision field, as well as the inherent connections between ethical dimensions and different stages of visual model development. A life-cycle framework regarding trustworthy computer vision is then presented by making the relevant trustworthy issues, the operation pipeline of AI models, and viable technical solutions interconnected, providing researchers and policymakers with references and guidance for achieving trustworthy CV. Finally, it discusses particular motivations for conducting trustworthy practices and underscores the consistency and ambivalence among various trustworthy principles and technical attributes. (shrink)
GenAI Model Security.Ken Huang,Ben Goertzel,Daniel Wu &Anita Xie -2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli,Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.detailsSafeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, quantum-resistant algorithms, (...) and human-guided reinforcement learning are analyzed as potential techniques to harden generative models. Broader ethical concerns surrounding transparency, accountability, deepfakes, and model interpretability are also addressed. The chapter aims to establish a conceptual foundation encompassing both the technical and ethical dimensions of security for generative AI. It highlights open challenges and lays the groundwork for developing robust, trustworthy, and human-centric solutions. The multifaceted perspective spanning vulnerabilities, implications, and solutions is intended to further discourse on securing society’s growing reliance on generative models. Frontier model security is discussed using Anthropic proposed approach. (shrink)
No categories
Generative AI Security: Theories and Practices.Ken Huang,Yang Wang,Ben Goertzel,Yale Li,Sean Wright &Jyoti Ponnapalli (eds.) -2024 - Springer Nature Switzerland.detailsThis book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields (...) of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. (shrink)
No categories
Wei shi zhi an: Yan Fu yu jin dai Zhongguo de wen hua zhuan xing.Kewu Huang -2010 - Taibei Shi: Lian jing chu ban shi ye gu fen you xian gong si.details本書以新的史料刻畫出嚴復所面對的挑戰與思想上的徬徨和奮鬥,並藉此思考文化轉型的現實意義 本書以嚴復為例探討中國近代的思想與文化的轉型。轉型時代的觀念由張灝先生提出,意指1895至1925前後的三十餘年間,中國思想文化由傳統過渡到現代的關鍵時代。在此期間中國受到傳統與西力的雙重衝擊,產生了 劇烈的變化。嚴復為轉型時代中具代表性的知識分子,他的生活與思想均表現出「現代性」與「傳統性」,或說「啟蒙」與「反啟蒙」交織併陳的轉型特點。本書利用新的史料刻畫出嚴復所面對的挑戰與思想上的徬徨和奮鬥,並 藉此思考文化轉型的現實意義。.
Relations between physical activity and hippocampal functional connectivity: Modulating role of mind wandering.Donglin Shi,Fengji Geng,Xiaoxin Hao,Kejie Huang &Yuzheng Hu -2022 -Frontiers in Human Neuroscience 16:950893.detailsPhysical activity is critical for maintaining cognitive and brain health. Previous studies have indicated that the effect of physical activity on cognitive and brain function varies between individuals. The present study aimed to examine whether mind wandering modulated the relations between physical activity and resting-state hippocampal functional connectivity. A total of 99 healthy adults participated in neuroimaging data collection as well as reported their physical activity in the past week and their propensity to mind wandering during typical activities. The results (...) indicated that mind wandering was negatively related to the resting-state functional connectivity between hippocampus and right inferior occipital gyrus. Additionally, for participants with higher level of mind wandering, physical activity was negatively related to hippocampal connectivity at left precuneus and right precentral gyrus. In contrast, such relations were positive at right medial frontal gyrus and bilateral precentral gyrus for participants with lower level of mind wandering. Altogether, these findings indicated that the relations between physical activity and hippocampal functional connectivity vary as a function of mind wandering level, suggesting that individual differences are important to consider when we aim to maintain or improve cognitive and brain health through increasing physical activity. (shrink)