Toggle light / dark theme

Student-made invisibility coat aims to hide wearers from AI cameras

The accuracy of pedestrian identification was reduced by 57% when the students tested the outfit on on-campus security cameras.

According to the South China Morning Post (SCMP), Chinese students have successfully developed a coat that can make people invisible to security cameras. So the SCMP story goes, the coat looks the same as regular camouflaged clothing, but it can trick digital cameras, especially ones with AI.

This is achieved, so it is claimed, by virtue of the patterning of the coat that was developed using a complex algorithm. The coat also comes with inbuilt thermal devices that can emit various temperatures at night.

Timeless Explanation: A New Kind of Causality, Julian Barbour

There are serious indications from attempts to create a quantum theory of gravity that time must disappear completely from the description of the quantum universe. This has been known since 1967, when DeWitt discovered the Wheeler-DeWitt equation. I shall argue that this forces us to conceive explanation and causality in an entirely new way. The present can no longer be understood as the consequence of the past. Instead, I shall suggest that one may have to distinguish possible presents on the basis of their intrinsic structure, not on the basis of an assumed temporal ordering. If correct, this could have far-reaching implications. Hitherto, because the present has always been interpreted as the lawful consequence of the past, science has made no attempt to answer ‘Why’ questions, only ‘How’ questions. But if there is no past in the traditional sense, we must consider things differently. Thus, if we eliminate time, we may even be able to start asking “Why” questions.

Specification of a point and tangent vector in conformal superspace (CS) determines a slab of spacetime in CMC foliation and unique curve in CS.
Almost perfect implementation of Mach’s principle because local inertial frames, local proper distance and local proper time all emergent and determined by the universe’s shape and shape velocity.
The Mystery: Shape velocity, as opposed to shape direction, is last vestige of Newton’s absolute space and time. Responsible for expansion of the universe and perhaps perfect transformation theory in quantum theory of the universe.

This lecture was delivered on the 16th Kraków Methodological Conference “The Causal Universe”, May 17–18, 2012.
More information:
http://causal-universe.philosophyinscience.com.
http://copernicuscenter.edu.pl.
Photos:
http://www.adamwalanus.pl/2012/cc120517.html

The hidden danger of ChatGPT and generative AI

Check out the on-demand sessions from the Low-Code/No-Code Summit to learn how to successfully innovate and achieve efficiency by upskilling and scaling citizen developers. Watch now.

Since OpenAI launched its early demo of ChatGPT last Wednesday, the tool already has over a million users, according to CEO Sam Altman — a milestone, he points out, that took GPT-3 nearly 24 months to get to and DALL-E over 2 months.

The “interactive, conversational model,” based on the company’s GPT-3.5 text-generator, certainly has the tech world in full swoon mode. Aaron Levie, CEO of Box, tweeted that “ChatGPT is one of those rare moments in technology where you see a glimmer of how everything is going to be different going forward.” Y Combinator cofounder Paul Graham tweeted that “clearly something big is happening.” Alberto Romero, author of The Algorithmic Bridge, calls it “by far, the best chatbot in the world.” And even Elon Musk weighed in, tweeting that ChatGPT is “scary good. We are not far from dangerously strong AI.”

Researchers develop a scaled-up spintronic probabilistic computer

Researchers at Tohoku University, the University of Messina, and the University of California, Santa Barbara (UCSB) have developed a scaled-up version of a probabilistic computer (p-computer) with stochastic spintronic devices that is suitable for hard computational problems like combinatorial optimization and machine learning.

Moore’s law predicts that computers get faster every two years because of the evolution of semiconductor chips. While this is what has historically happened, the continued evolution is starting to lag. The revolutions in machine learning and means much higher computational ability is required. Quantum computing is one way of meeting these challenges, but significant hurdles to the practical realization of scalable quantum computers remain.

A p-computer harnesses naturally stochastic building blocks called probabilistic bits (p-bits). Unlike bits in traditional computers, p-bits oscillate between states. A p-computer can operate at room-temperature and acts as a domain-specific computer for a wide variety of applications in machine learning and artificial intelligence. Just like quantum computers try to solve inherently quantum problems in , p-computers attempt to tackle probabilistic algorithms, widely used for complicated computational problems in combinatorial optimization and sampling.

Stephen Wolfram on the Wolfram Physics TOE, Blackholes, Infinity, and Consciousness

Stephen Wolfram is at his jovial peak in this technical interview regarding the Wolfram Physics project (theory of everything).
Sponsors: https://brilliant.org/TOE for 20% off. http://algo.com for supply chain AI.

Link to the Wolfram project: https://www.wolframphysics.org/

Patreon: https://patreon.com/curtjaimungal.
Crypto: https://tinyurl.com/cryptoTOE
PayPal: https://tinyurl.com/paypalTOE
Twitter: https://twitter.com/TOEwithCurt.
Discord Invite: https://discord.com/invite/kBcnfNVwqs.
iTunes: https://podcasts.apple.com/ca/podcast/better-left-unsaid-wit…1521758802
Pandora: https://pdora.co/33b9lfP
Spotify: https://open.spotify.com/show/4gL14b92xAErofYQA7bU4e.
Subreddit r/TheoriesOfEverything: https://reddit.com/r/theoriesofeverything.
Merch: https://tinyurl.com/TOEmerch.

TIMESTAMPS:
00:00:00 Introduction.
00:02:26 Behind the scenes.
00:04:00 Wolfram critiques are from people who haven’t read the papers (generally)
00:10:39 The Wolfram Model (Theory of Everything) overview in under 20 minutes.
00:29:35 Causal graph vs. multiway graph.
00:39:42 Global confluence and causal invariance.
00:44:06 Rulial space.
00:49:05 How to build your own Theory of Everything.
00:54:00 Computational reducibility and irreducibility.
00:59:14 Speaking to aliens / communication with other life forms.
01:06:06 Extra-terrestrials could be all around us, and we’d never see it.
01:10:03 Is the universe conscious? What is “intelligence”?
01:13:03 Do photons experience time? (in the Wolfram model)
01:15:07 “Speed of light” in rulial space.
01:16:37 Principle of computational equivalence.
01:21:13 Irreducibility vs undecidability and computational equivalence.
01:23:47 Is infinity “real”?
01:28:08 Discrete vs continuous space.
01:33:40 Testing discrete space with the cosmic background radiation (CMB)
01:34:35 Multiple dimensions of time.
01:36:12 Defining “beauty” in mathematics, as geodesics in proof space.
01:37:29 Particles are “black holes” in branchial space.
01:39:44 New Feynman stories about his abjuring of woo woo.
01:43:52 Holographic principle / AdS CFT correspondence, and particles as black holes.
01:46:38 Wolfram’s view on cryptocurrencies, and how his company trades in crypto [Amjad Hussain]
01:57:38 Einstein field equations in economics.
02:03:04 How to revolutionize a field of study as a beginner.
02:04:50 Bonus section of Curt’s thoughts and questions.

Just wrapped (April 2021) a documentary called Better Left Unsaid http://betterleftunsaidfilm.com on the topic of “when does the left go too far?” Visit that site if you’d like to watch it.

Scientists create AI neural net that can unlock digital fingerprint-secured devices

Computer scientists at New York University and Michigan State University have trained an artificial neural network to create fake digital fingerprints that can bypass locks on cell phones. The fakes are called “DeepMasterPrints”, and they present a significant security flaw for any device relying on this type of biometric data authentication. After exploiting the weaknesses inherent in the ergonomic needs of cellular devices, DeepMasterPrints were able to imitate over 70% of the fingerprints in a testing database.

An artificial neural network is a type of artificial intelligence comprising computer algorithms modeled after the human brain’s ability to recognize patterns. The DeepMasterPrints system was trained to analyze sets of fingerprint images and generate a new image based on the features that occurred most frequently. This “skeleton key” could then be used to exploit the way cell phones authenticate user fingerprints.

In cell phones, the necessarily small size of fingerprint readers creates a weakness in the way they verify a print. In general, phone sensors only capture a partial image of a print when a user is attempting to unlock the device, and that piece is then compared to the phone’s authorized print image database. Since a partial print means there are fewer characteristics to distinguish it than a full print, a DeepMasterPrint needs to match fewer features to imitate a fingerprint. It’s worth noting that the concept of exploiting this flaw is not unique to this particular study; however, generating unique images rather than using actual or synthesized images is a new development.

UK rules that AI cannot patent inventions

The UK government has announced that artificial intelligence algorithms that come up with new technologies will not be able to patent their inventions.

The Intellectual Property Office said on Tuesday that it also plans to tweak existing laws to make it easier for people and institutions to use AI, machine learning and data mining software in order to rapidly advance research and innovation without requiring extensive permissions from copyright owners.

AI predicts crime a week before it happens — study

‘It will tell you what’s going to happen in future,’ says University of Chicago professor. ‘It’s not magical, there are limitations… but it works really well’

New AI crime prediction tech is reminiscent of the 2002 sci-fi film Minority report, based on the 1956 short story by Philip K. Dick

An artificial intelligence algorithm that can predict crimes a week in advance with a 90 per cent accuracy has been demonstrated for the first time.

This Artificial Intelligence Paper Presents an Advanced Method for Differential Privacy in Image Recognition with Better Accuracy

Machine learning has increased considerably in several areas due to its performance in recent years. Thanks to modern computers’ computing capacity and graphics cards, deep learning has made it possible to achieve results that sometimes exceed those experts give. However, its use in sensitive areas such as medicine or finance causes confidentiality issues. A formal privacy guarantee called differential privacy (DP) prohibits adversaries with access to machine learning models from obtaining data on specific training points. The most common training approach for differential privacy in image recognition is differential private stochastic gradient descent (DPSGD). However, the deployment of differential privacy is limited by the performance deterioration caused by current DPSGD systems.

The existing methods for differentially private deep learning still need to operate better since that, in the stochastic gradient descent process, these techniques allow all model updates regardless of whether the corresponding objective function values get better. In some model updates, adding noise to the gradients might worsen the objective function values, especially when convergence is imminent. The resulting models get worse as a result of these effects. The optimization target degrades, and the privacy budget is wasted. To address this problem, a research team from Shanghai University in China suggests a simulated annealing-based differentially private stochastic gradient descent (SA-DPSGD) approach that accepts a candidate update with a probability that depends on the quality of the update and the number of iterations.

Concretely, the model update is accepted if it gives a better objective function value. Otherwise, the update is rejected with a certain probability. To prevent settling into a local optimum, the authors suggest using probabilistic rejections rather than deterministic ones and limiting the number of continuous rejections. Therefore, the simulated annealing algorithm is used to select model updates with probability during the stochastic gradient descent process.

/* */