Trojan Attack

How to Defend Neural Networks from Trojan Attacks

Neural networks, inspired by the human brain, play a pivotal role in modern…


AI Model Fragmentation

Model Fragmentation and What it Means for Security

Introduction Machine learning models have become integral components in a…


Model Evasion AI

Outsmarting AI with Model Evasion

In the cybersecurity arena, artificial intelligence classifiers like neural…


Canada AI

AI and Canada: Pioneering Innovation, Searching for Homegrown Success

Deep Learning’s Canadian Roots and Revolution It’s easy to forget, amid the…


Homomorphic Encryption ML

Securing Machine Learning Workflows through Homomorphic Encryption

While ML/AI in its pioneering days might have gotten away by considering data…


Data Poisoning ML AI

Understanding Data Poisoning: How It Compromises Machine Learning Models

Machine learning (ML) and artificial intelligence (AI) have rapidly…


Semantic Adversarial Attacks

Semantic Adversarial Attacks: When Meaning Gets Twisted

A particular subset of AI/ML adversarial attcks that often flies under the…


AI Alignment Problem

The AI Alignment Problem

Introduction The AI alignment problem sits at the core of all future…


History AI

A (Very) Brief History of AI

Pre-Dartmouth As early as the mid-19th century, Charles Babbage and Ada…


ML Biases

Understanding and Addressing Biases in Machine Learning

Introduction ML enables computers to learn from data and make decisions,…


Privacy Preference Center