Scientists identify security flaw in AI query models

Scientists identify security flaw in AI query models

Overview of our pro­posed meth­ods: (A) We pro­pose four types of mali­cious trig­gers with­in the joint embed­ding space for attack decom­po­si­tion: tex­tu­al trig­ger, OCR tex­tu­al trig­ger, visu­al trig­ger, and com­bined OCR tex­­tu­al-visu­al trig­ger. (B) We employ an end-to-end gra­di­ent-based attack to update images to match the embed­dings of mali­cious trig­gers in the joint embed­ding space.…

Boosting faith in the authenticity of open source software

Boosting faith in the authenticity of open source software

Cred­it: Alex Shipps and Kelsey Mer­rill via Midjourney/Massachusetts Insti­tute of Tech­nol­o­gy Open source software—software that is freely dis­trib­uted, along with its source code, so that copies, addi­tions, or mod­i­fi­ca­tions can be read­i­ly made —is “every­where,” to quote the 2023 Open Source Secu­ri­ty and Risk Analy­sis Report. Of the com­put­er pro­grams used by major indus­tries, 96%…

Engineers’ new approach brings images into focus

Engineers’ new approach brings images into focus

Cred­it: Whit­ing School of Engi­neer­ing Johns Hop­kins researchers have devel­oped an effi­cient new method to turn blur­ry images into clear, sharp ones. Called Pro­gres­sive­ly Deblur­ring Radi­ance Field (PDRF), this approach deblurs images 15 times faster than pre­vi­ous meth­ods while also achiev­ing bet­ter results on both syn­thet­ic and real scenes. “Often­times, images are blur­ry because aut­o­fo­cus…

Vulnerability in virtual reality systems identified

Vulnerability in virtual reality systems identified

Incep­tion Attacks: A user thinks they are inter­act­ing direct­ly with a VR app launched from the VR home screen, when they are in fact run­ning a sim­u­lat­ed VR app inside the attacker’s incep­tion lay­er. Cred­it: arX­iv (2024). DOI: 10.48550/arxiv.2403.05721 A team of com­put­er sci­en­tists at the Uni­ver­si­ty of Chica­go has uncov­ered a poten­tial vul­ner­a­bil­i­ty in…

Intel introduces approach to boost power efficiency, reliability of packaged chiplet ecosystems

Intel introduces approach to boost power efficiency, reliability of packaged chiplet ecosystems

Cred­it: Das Shar­ma et al The inte­gra­tion of elec­tron­ic chips in com­mer­cial devices has sig­nif­i­cant­ly evolved over the past decades, with engi­neers devis­ing var­i­ous inte­gra­tion strate­gies and solu­tions. Ini­tial­ly, com­put­ers con­tained a cen­tral proces­sor or cen­tral pro­cess­ing unit (CPU), con­nect­ed to mem­o­ry units and oth­er com­po­nents via tra­di­tion­al com­mu­ni­ca­tion path­ways, known as front-side-bus (FSB) inter­faces.…

How long you got? Danish AI algorithm aims to predict life, and death

How long you got? Danish AI algorithm aims to predict life, and death

Cred­it: Tara Win­stead from Pex­els Researchers in Den­mark are har­ness­ing arti­fi­cial intel­li­gence and data from mil­lions of peo­ple to help antic­i­pate the stages of an indi­vid­u­al’s life all the way to the end, hop­ing to raise aware­ness of the tech­nol­o­gy’s pow­er, and its per­ils. Far from any mor­bid fas­ci­na­tions, the cre­ators of life2vec want to…

Who wrote this? Engineers discover novel method to identify AI-generated text

Who wrote this? Engineers discover novel method to identify AI-generated text

Raidar detects machine-gen­er­at­ed text by cal­cu­lat­ing rewrit­ing mod­i­fi­ca­tions. This illus­tra­tion shows the char­ac­ter dele­tion in red and the char­ac­ter inser­tion in orange. Human-gen­er­at­ed text tends to trig­ger more mod­i­fi­ca­tions than machine-gen­er­at­ed text when asked to be rewrit­ten. Cred­it: Yang and Von­drick labs Com­put­er sci­en­tists at Colum­bia Engi­neer­ing have devel­oped a trans­for­ma­tive method for detect­ing AI-gen­er­at­ed…

Top computer scientists say the future of artificial intelligence is similar to that of Star Trek

Top computer scientists say the future of artificial intelligence is similar to that of Star Trek

Research fields con­tribut­ing to ShELL. Cred­it: Nature Machine Intel­li­gence (2024). DOI: 10.1038/s42256-024–00800‑2 Lead­ing com­put­er sci­en­tists from around the world have shared their vision for the future of arti­fi­cial intelligence—and it resem­bles the capa­bil­i­ties of Star Trek char­ac­ter “The Borg.” Experts from the likes of Lough­bor­ough Uni­ver­si­ty, MIT, and Yale say we are set to see…

New software enables blind and low-vision users to create interactive, accessible charts

New software enables blind and low-vision users to create interactive, accessible charts

The Umwelt inter­face. A) The data, visu­al, and audio tabs of the edi­tor. B) The editor’s fields tab, where users spec­i­fy field def­i­n­i­tions and encod­ings. C) The view­er, where users ana­lyze data with inter­ac­tive mul­ti­modal data rep­re­sen­ta­tions. Cred­it: arX­iv (2024). DOI: 10.48550/arxiv.2403.00106 A grow­ing num­ber of tools enable users to make online data rep­re­sen­ta­tions, like…

Machine learning, quantum computing may transform health care, including diagnosing pneumonia

Machine learning, quantum computing may transform health care, including diagnosing pneumonia

The image on the left shows a nor­mal chest X‑ray, where­as the one on the right shows lungs with pneu­mo­nia opac­i­ty (Bre­viglieri, 2019). Cred­it: Fron­tiers in Com­put­er Sci­ence (2024). DOI: 10.3389/fcomp.2023.1286657 Pneu­mo­nia, an infec­tion in the lungs that caus­es dif­fi­cul­ty breath­ing, is most com­mon­ly diag­nosed through chest X‑rays. Typ­i­cal­ly, those chest X‑rays are read by…

Proof-of-principle demonstration of 3D magnetic recording could lead to enhanced hard disk drives

Proof-of-principle demonstration of 3D magnetic recording could lead to enhanced hard disk drives

Schemat­ic view of (top) cur­rent­ly used HAMR and (bot­tom) three-dimen­­sion­al mag­net­ic record­ing sys­tems. In the three-dimen­­sion­al mag­net­ic record­ing sys­tem, the Curie tem­per­a­ture of each record­ing lay­er dif­fers by about 100 K and data are writ­ten to each lay­er by adjust­ing the laser pow­er. Cred­it: Acta Mate­ri­alia (2024). DOI: 10.1016/j.actamat.2024.119869 Research groups from NIMS, Sea­gate Tech­nol­o­gy,…

Game theory research shows AI can evolve into more selfish or cooperative personalities

Game theory research shows AI can evolve into more selfish or cooperative personalities

Large-scale lan­guage mod­els enable AI agents to evolve var­i­ous types of per­son­al­i­ties in social inter­ac­tions. Cred­it: Reiko Mat­sushi­ta Researchers in Japan have effec­tive­ly devel­oped a diverse range of per­son­al­i­ty traits in dia­logue AI using a large-scale lan­guage mod­el (LLM). Using the pris­on­er’s dilem­ma from game the­o­ry, Pro­fes­sor Takaya Ari­ta and Asso­ciate Pro­fes­sor Rei­ji Suzu­ki from…

Tech companies want to build artificial general intelligence. But who decides when AGI is attained?

Tech companies want to build artificial general intelligence. But who decides when AGI is attained?

Dr. Pei Wang teach­es a arti­fi­cial gen­er­al intel­li­gence class at Tem­ple Uni­ver­si­ty in Philadel­phia, Thurs­day, Feb. 1, 2024. Main­stream AI research “turned away from the orig­i­nal vision of arti­fi­cial intel­li­gence, which at the begin­ning was pret­ty ambi­tious,” said Wang. Cred­it: AP Photo/Matt Rourke There’s a race under­way to build arti­fi­cial gen­er­al intel­li­gence, a futur­is­tic vision…

Researchers 3D print key components for a point-of-care mass spectrometer

Researchers 3D print key components for a point-of-care mass spectrometer

MIT researchers have 3D print­ed a minia­ture ion­iz­er, which is a key com­po­nent of a mass spec­trom­e­ter. The new minia­ture ion­iz­er could some­day enable an afford­able, in-home mass spec­trom­e­ter for health mon­i­tor­ing. Pic­tured are parts of the new device, includ­ing a green print­ed cir­cuit board (PCB) with orange cas­ing on top. Under the cas­ing is…

Flexible microspectrometer for mobile applications

Flexible microspectrometer for mobile applications

The fiber-cou­­pled microspec­trom­e­ter array maps 39 spec­tra onto a CMOS sen­sor. Cred­it: Fraun­hofer IOF Researchers at the Fraun­hofer Insti­tute for Applied Optics and Pre­ci­sion Engi­neer­ing IOF have devel­oped a very com­pact spec­trom­e­ter mod­ule. It maps spec­tra from 39 opti­cal fibers onto one cam­era sen­sor in a small space. This is made pos­si­ble by a spe­cial…

Quiet-STaR algorithm allows chatbot to think over its possible answer before responding

Quiet-STaR algorithm allows chatbot to think over its possible answer before responding

Qui­et-STaR. We visu­al­ize the algo­rithm as applied dur­ing train­ing to a sin­gle thought. We gen­er­ate thoughts, in par­al­lel, fol­low­ing all tokens in the text (think). The mod­el pro­duces a mix­ture of its next-token pre­dic­tions with and with­out a thought (talk). We apply REINFORCE, as in STaR, to increase the like­li­hood of thoughts that help the…

AI generates high-quality images 30 times faster in a single step

AI generates high-quality images 30 times faster in a single step

With their DMD method, MIT researchers cre­at­ed a one-step AI image gen­er­a­tor that achieves image qual­i­ty com­pa­ra­ble to Sta­bleD­if­fu­sion v1.5 while being 30 times faster. Cred­it: Illus­tra­tion by Alex Shipps/MIT CSAIL using six AI-gen­er­at­ed images devel­oped by researchers. In our cur­rent age of arti­fi­cial intel­li­gence, com­put­ers can gen­er­ate their own “art” by way of dif­fu­sion…

Large language models use a surprisingly simple mechanism to retrieve some stored knowledge

Large language models use a surprisingly simple mechanism to retrieve some stored knowledge

Cred­it: AI-gen­er­at­ed image Large lan­guage mod­els, such as those that pow­er pop­u­lar arti­fi­cial intel­li­gence chat­bots like Chat­G­PT, are incred­i­bly com­plex. Even though these mod­els are being used as tools in many areas, such as cus­tomer sup­port, code gen­er­a­tion, and lan­guage trans­la­tion, sci­en­tists still don’t ful­ly grasp how they work. In an effort to bet­ter under­stand…

Novel quantum algorithm proposed for high-quality solutions to combinatorial optimization problems

Novel quantum algorithm proposed for high-quality solutions to combinatorial optimization problems

The pro­posed algo­rithm com­bines vari­a­tion­al sched­ul­ing with post-pro­cess­ing to achieve near-opti­­mal solu­tions to com­bi­na­to­r­i­al opti­miza­tion prob­lems with con­straints with­in the oper­a­tion time of quan­tum com­put­ers. Cred­it: Tat­suhiko Shi­rai / Wase­da Uni­ver­si­ty Com­bi­na­to­r­i­al opti­miza­tion prob­lems (COPs) have appli­ca­tions in many dif­fer­ent fields such as logis­tics, sup­ply chain man­age­ment, machine learn­ing, mate­r­i­al design and drug dis­cov­ery, among…

AI models need not be so power hungry

AI models need not be so power hungry

Each dot in this fig­ure is a con­vo­lu­tion­al neur­al net­work mod­el with the ener­gy con­sump­tion on hor­i­zon­tal axis and per­for­mance on ver­ti­cal axis. Con­ven­tion­al­ly, mod­els are select­ed only based on their performance—without tak­ing their ener­gy con­sump­tion into account—resulting in mod­els in the red ellipse. This work enables prac­ti­tion­ers to select mod­els from the green ellipse…

A game changer for the insurance industry and people’s well-being

A game changer for the insurance industry and people’s well-being

Fig­ure 1. Vehi­cle insur­ance frame­work with­out blockchain. Cred­it: Expert Sys­tems with Appli­ca­tions (2023). DOI: 10.1016/j.eswa.2023.120651 Blockchain, a dis­rup­tive tech­nol­o­gy of our time, holds the poten­tial to change our lives for the bet­ter. The insur­ance sec­tor is a prime illus­tra­tion. Ever won­dered how vehi­cle insur­ance claims could become a seam­less, user-con­trolled process? Tra­di­tion­al­ly, man­ag­ing insur­ance claims…

AI image generators can be tricked into making NSFW content

AI image generators can be tricked into making NSFW content

Cred­it: Pixabay/CC0 Pub­lic Domain A new test of pop­u­lar AI image gen­er­a­tors shows that while they’re sup­posed to make only G‑rated pic­tures, they can be hacked to cre­ate not suit­able for work (NSFW) con­tent. Most online art gen­er­a­tors are pur­port­ed to block vio­lent, porno­graph­ic, and oth­er types of ques­tion­able con­tent. But Johns Hop­kins Uni­ver­si­ty researchers…

Learning to forget—a weapon in the arsenal against harmful AI

Learning to forget—a weapon in the arsenal against harmful AI

Cred­it: Pixabay/CC0 Pub­lic Domain With the AI sum­mit well under­way, researchers are keen to raise the very real prob­lem asso­ci­at­ed with the technology—teaching it how to for­get. Soci­ety is now abuzz with mod­ern AI and its excep­tion­al capa­bil­i­ties; we are con­stant­ly remind­ed its poten­tial ben­e­fits, across so many areas, per­me­at­ing prac­ti­cal­ly all facets of our…

Accelerating AI tasks while preserving data security

Accelerating AI tasks while preserving data security

SecureLoop is an MIT-devel­oped search engine that can iden­ti­fy an opti­mal design for a deep neur­al net­work accel­er­a­tor that pre­serves data secu­ri­ty while improv­ing ener­gy effi­cien­cy and boost­ing per­for­mance. This could enable device man­u­fac­tur­ers to increase the speed of demand­ing AI appli­ca­tions, while ensur­ing sen­si­tive data remain safe from attack­ers. Cred­it: Jose-Luis Oli­vares, MIT With…

Monitoring nuclear weapons stockpiles with radio waves

Monitoring nuclear weapons stockpiles with radio waves

In this con­tain­er, the researchers test­ed how robust and how repro­ducible the radio fin­ger­print is. The tech­nol­o­gy detects move­ments of the blue bar­rel. Cred­it: RUB, Mar­quard An inter­na­tion­al research team has pro­posed a new method for mon­i­tor­ing nuclear dis­ar­ma­ment treaties. The IT secu­ri­ty experts devel­oped a mech­a­nism that uses radio waves to remote­ly mon­i­tor whether…

Your smart speaker data is used in ways you might not expect

Your smart speaker data is used in ways you might not expect

Smart speak­ers offer amaz­ing convenience—from play­ing your favorite tunes to re-order­ing toi­let paper—with only a sim­ple voice com­mand. But that con­ve­nience can come with a steep cost in pri­va­cy that many con­sumers aren’t even aware they’re pay­ing. We’ve all had the uncan­ny expe­ri­ence of search­ing for some­thing on the inter­net and then sud­den­ly ads for…

Sabotage tool takes on AI image scrapers

Sabotage tool takes on AI image scrapers

Exam­ple images gen­er­at­ed by the clean (unpoi­soned) and poi­soned SD-XL mod­els with dif­fer­ent # of poi­son data. The attack effect is appar­ent with 1000 poi­son­ing sam­ples, but not at 500 sam­ples. Cred­it: arX­iv (2023). DOI: 10.48550/arxiv.2310.13828 Artists who have stood by help­less­ly as their online works remained ripe for the pick­ing with­out autho­riza­tion by AI…

This tiny, tamper-proof ID tag can authenticate almost anything

This tiny, tamper-proof ID tag can authenticate almost anything

After pass­ing through the tag and strik­ing the objec­t’s sur­face, ter­a­hertz waves are reflect­ed, or backscat­tered, to a receiv­er for authen­ti­ca­tion. Cred­it: Ruo­nan Han, Eun­seok Lee, et al A few years ago, MIT researchers invent­ed a cryp­to­graph­ic ID tag that is sev­er­al times small­er and sig­nif­i­cant­ly cheap­er than the tra­di­tion­al radio fre­quen­cy tags (RFIDs) that…

New, super-smart hardware could provide drastic cuts in power consumption

New, super-smart hardware could provide drastic cuts in power consumption

The high-per­­for­­mance com­put­ing facil­i­ty at the Nor­we­gian Uni­ver­si­ty of Sci­ence and Tech­nol­o­gy (NTNU) has helped researchers to run real­is­tic sim­u­la­tions using enor­mous­ly large data sets. They used the sim­u­la­tions to devel­op hard­ware to cut com­put­er pro­gram run­times. Cred­it: NTNU Green­er data pro­cess­ing requires sys­tems that work smarter, faster, and are more ener­gy effi­cient. Researchers from…