Movatterモバイル変換


[0]ホーム

URL:


PhilPapersPhilPeoplePhilArchivePhilEventsPhilJobs
Order:

1 filter applied
Disambiguations
Ken Huang [11]Kejian Huang [6]Kewu Huang [4]Kerson Huang [2]
Kejie Huang [1]Ke-Jian Huang [1]Kexin Huang [1]Ke Huang [1]
  1.  21
    From Pixels to Principles: A Decade of Progress and Landscape in Trustworthy Computer Vision.Kexin Huang,Yan Teng,Yang Chen &Yingchun Wang -2024 -Science and Engineering Ethics 30 (3):1-21.
    The rapid development of computer vision technologies and applications has brought forth a range of social and ethical challenges. Due to the unique characteristics of visual technology in terms of data modalities and application scenarios, computer vision poses specific ethical issues. However, the majority of existing literature either addresses artificial intelligence as a whole or pays particular attention to natural language processing, leaving a gap in specialized research on ethical issues and systematic solutions in the field of computer vision. This (...) paper utilizes bibliometrics and text-mining techniques to quantitatively analyze papers from prominent academic conferences in computer vision over the past decade. It first reveals the developing trends and specific distribution of attention regarding trustworthy aspects in the computer vision field, as well as the inherent connections between ethical dimensions and different stages of visual model development. A life-cycle framework regarding trustworthy computer vision is then presented by making the relevant trustworthy issues, the operation pipeline of AI models, and viable technical solutions interconnected, providing researchers and policymakers with references and guidance for achieving trustworthy CV. Finally, it discusses particular motivations for conducting trustworthy practices and underscores the consistency and ambivalence among various trustworthy principles and technical attributes. (shrink)
    Direct download(3 more)  
     
    Export citation  
     
    Bookmark  
  2.  21
    GenAI Model Security.Ken Huang,Ben Goertzel,Daniel Wu &Anita Xie -2024 - In Ken Huang, Yang Wang, Ben Goertzel, Yale Li, Sean Wright & Jyoti Ponnapalli,Generative AI Security: Theories and Practices. Springer Nature Switzerland. pp. 163-198.
    Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, quantum-resistant algorithms, (...) and human-guided reinforcement learning are analyzed as potential techniques to harden generative models. Broader ethical concerns surrounding transparency, accountability, deepfakes, and model interpretability are also addressed. The chapter aims to establish a conceptual foundation encompassing both the technical and ethical dimensions of security for generative AI. It highlights open challenges and lays the groundwork for developing robust, trustworthy, and human-centric solutions. The multifaceted perspective spanning vulnerabilities, implications, and solutions is intended to further discourse on securing society’s growing reliance on generative models. Frontier model security is discussed using Anthropic proposed approach. (shrink)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. Fang Dongmei juan.Dongmei Fang,Kejian Huang &Tao Wang -1996 - Shijiazhuang Shi: Hebei jiao yu chu ban she. Edited by Kejian Huang & Tao Wang.
     
    Export citation  
     
    Bookmark  
  4. Fang Dongmei ji.Dongmei Fang,Kejian Huang &Xiaolin Zhong -1993 - Beijing: Qun yan chu ban she. Edited by Kejian Huang & Xiaolin Zhong.
  5.  76
    An Alternative Conceptualisation of Corporate Social Responsibility.Ke Huang -forthcoming -Philosophy.
    Direct download  
     
    Export citation  
     
    Bookmark  
  6. Bai nian xin ru lin: dang dai xin ru xue ba da jia lun lüe.Kejian Huang -2000 - Beijing: Zhongguo qing nian chu ban she.
     
    Export citation  
     
    Bookmark  
  7.  34
    Generative AI Security: Theories and Practices.Ken Huang,Yang Wang,Ben Goertzel,Yale Li,Sean Wright &Jyoti Ponnapalli (eds.) -2024 - Springer Nature Switzerland.
    This book explores the revolutionary intersection of Generative AI (GenAI) and cybersecurity. It presents a comprehensive guide that intertwines theories and practices, aiming to equip cybersecurity professionals, CISOs, AI researchers, developers, architects and college students with an understanding of GenAI’s profound impacts on cybersecurity. The scope of the book ranges from the foundations of GenAI, including underlying principles, advanced architectures, and cutting-edge research, to specific aspects of GenAI security such as data security, model security, application-level security, and the emerging fields (...) of LLMOps and DevSecOps. It explores AI regulations around the globe, ethical considerations, the threat landscape, and privacy preservation. Further, it assesses the transformative potential of GenAI in reshaping the cybersecurity landscape, the ethical implications of using advanced models, and the innovative strategies required to secure GenAI applications. Lastly, the book presents an in-depth analysis of the security challenges and potential solutions specific to GenAI, and a forward-looking view of how it can redefine cybersecurity practices. By addressing these topics, it provides answers to questions on how to secure GenAI applications, as well as vital support with understanding and navigating the complex and ever-evolving regulatory environments, and how to build a resilient GenAI security program. The book offers actionable insights and hands-on resources for anyone engaged in the rapidly evolving world of GenAI and cybersecurity. (shrink)
    No categories
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
  8. Gong yu si: Jin dai Zhongguo ge ti yu qun ti zhi chong jian.Kewu Huang &Che-Chia Chang (eds.) -2000 - Taibei Shi: Zhong yang yan jiu yuan jin dai shi yan jiu suo.
     
    Export citation  
     
    Bookmark  
  9. Huang Kejian zi xuan ji.Kejian Huang -1998 - Guilin Shi: Guangxi shi fan da xue chu ban she.
  10.  6
    Ren yun: yi zhong dui Makesi di jie du.Kejian Huang -1996 - Beijing Shi: Dong fang chu ban she.
  11.  15
    Wei shi zhi an: Yan Fu yu jin dai Zhongguo de wen hua zhuan xing.Kewu Huang -2010 - Taibei Shi: Lian jing chu ban shi ye gu fen you xian gong si.
    本書以新的史料刻畫出嚴復所面對的挑戰與思想上的徬徨和奮鬥,並藉此思考文化轉型的現實意義 本書以嚴復為例探討中國近代的思想與文化的轉型。轉型時代的觀念由張灝先生提出,意指1895至1925前後的三十餘年間,中國思想文化由傳統過渡到現代的關鍵時代。在此期間中國受到傳統與西力的雙重衝擊,產生了 劇烈的變化。嚴復為轉型時代中具代表性的知識分子,他的生活與思想均表現出「現代性」與「傳統性」,或說「啟蒙」與「反啟蒙」交織併陳的轉型特點。本書利用新的史料刻畫出嚴復所面對的挑戰與思想上的徬徨和奮鬥,並 藉此思考文化轉型的現實意義。.
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  7
    Yi ge bei fang qi de xuan ze: Liang QiChao tiao shi si xiang zhi yan jiu.Kewu Huang -1994 - Zhonghua min guo Taibei Shi: Zhong yang yan jiu yuan jin dai shi yan jiu suo.
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. You "ming" er "dao": xian Qin zhu zi shi jiang.Kejian Huang -2006 - Beijing Shi: Xian zhuang shu ju.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  14.  6
    Zi you de suo yi ran: Yan Fu dui Yuehan Mi'er zi you zhu yi si xiang de ren shi yu pi pan.Kewu Huang -1998 - Taibei Shi: Yun chen wen hua shi ye gu fen you xian gong si.
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  13
    Relations between physical activity and hippocampal functional connectivity: Modulating role of mind wandering.Donglin Shi,Fengji Geng,Xiaoxin Hao,Kejie Huang &Yuzheng Hu -2022 -Frontiers in Human Neuroscience 16:950893.
    Physical activity is critical for maintaining cognitive and brain health. Previous studies have indicated that the effect of physical activity on cognitive and brain function varies between individuals. The present study aimed to examine whether mind wandering modulated the relations between physical activity and resting-state hippocampal functional connectivity. A total of 99 healthy adults participated in neuroimaging data collection as well as reported their physical activity in the past week and their propensity to mind wandering during typical activities. The results (...) indicated that mind wandering was negatively related to the resting-state functional connectivity between hippocampus and right inferior occipital gyrus. Additionally, for participants with higher level of mind wandering, physical activity was negatively related to hippocampal connectivity at left precuneus and right precentral gyrus. In contrast, such relations were positive at right medial frontal gyrus and bilateral precentral gyrus for participants with lower level of mind wandering. Altogether, these findings indicated that the relations between physical activity and hippocampal functional connectivity vary as a function of mind wandering level, suggesting that individual differences are important to consider when we aim to maintain or improve cognitive and brain health through increasing physical activity. (shrink)
    Direct download(2 more)  
     
    Export citation  
     
    Bookmark  
Export
Limit to items.
Filters





Configure languageshere.Sign in to use this feature.

Viewing options


Open Category Editor
Off-campus access
Using PhilPapers from home?

Create an account to enable off-campus access through your institution's proxy server or OpenAthens.


[8]ページ先頭

©2009-2025 Movatter.jp