In previous blogposts, we saw how supervised and unsupervised learnings have their own types and how they are different from one another. To understand the difference, we had taken a small and simple example and also identified if and how certain model types could be used interchangeably in specific scenarios. In this blogpost, we will see the different types of reinforcement learning and use the same strategy as before, to understand the different types of reinforcement learning and their alternate use in particular cases. Reinforcement Learning: A Brief Overview Reinforcement Learning (RL) is a subfield of machine learning and artificial […]
Decoding AI Deception: Poisoning Attack
Hi! Welcome to my series of blogposts, “Decoding AI Deception” wherein we will take a closer look into each kind of adversarial AI attack. This post covers the details of poisoning attack comprising common types of poisoning attacks, their applicable cases, vulnerabilitiesof models that are exploited by these attacks, and remedial measures. Poisoning Attack and its Types As we all know from previous post that poisoning attack is the form of adversarial AI attack that is used to corrupt data intended for either training or retraining of a model. It has few common forms which are as follows: – Applicable […]
Understanding different Unsupervised learning models using a single example
As a part of previous blogpost and in continuation with similar lines, this blogpost will try to clarify the difference and purpose of each kind of Unsupervised learning model using a common example across all these models. Apart from defining each model type, this post will highlight if any models could be used interchangeably for certain scenarios. Types of Unsupervised Learning Models Understanding Models using an Example Let’s consider the example of customer segmentation in a retail store. The store wants to group its customers based on their purchasing behavior and preferences, in order to better target their marketing campaigns […]
Understanding different Supervised learning models using a single example
Often we get confused between different types of Supervised learning models available. This is majorly due to lack of understanding of the goal and applicability of each kind of model. In this blogpost, I will try to clarify the difference and purpose of each kind of Supervised learning model using a common example across all these models. Apart from defining each model type, I will also mention if any models could be used interchangeably for certain scenarios. Types of Supervised Learning Models Understanding Models using an Example Let’s use the example of predicting whether a person has diabetes based on […]
Key Research Work on AI against Traditional Cybersecurity Measures
With the intelligence accompanied, AI has tapped enormous strength to stealthily bypass traditional cybersecurity measures. This blogpost enlists some key research work available in public domain that bring out insightful results on how AI in its adversarial form can be used to fool or bypass traditional cybersecurity measures. Such research work (by and large provide all the more reason why current security measures need to armor for bigger and conniving threats lurking around.
Comparative Assessment of Critical Adversarial AI Attacks
Often we come across various adversarial AI attacks. Over the time, there have been numerous attacks surfacing with extensive use of one or more AI model(s) together in any application. In this blog post, a one stop platform summarizing the critical adversarial AI attacks is provided. The comparative assessment of these attacks is performed on certain basic features – Modus Operandi, Type of information affected, Phase of AI operation, and More Realizable Applicable Case Study/ Use Case (Examples are not limited to the ones listed below. The examples below are only for better realization purpose). It is worth noting that, […]
Comparative Assessment of Critical AI Models
This blog post is a one stop platform for summary of different AI models that are in predominant use. The comparative assessment of these models is based on various parameters such as – Definition, Process, Main Learning Approach, Pros, Cons, and Applications. The idea is to summarize these models and make it available for a quick view. Note that the information about the model’s is not limited to the contents in this post. Readers are highly encouraged to refer valid sources for additional and detailed information. ModelDefinitionProcess Main Learning ApproachProsConsApplicationsLinear RegressionA model that predicts a continuous output by finding the […]
Triggered vs. Triggerless Backdoor Attacks using a Single Example
In previous blog post, there was an introduction to backdoor attack and its various forms. In this post, I will provide the basic difference between the two forms of attacks using a single example so as to understand the difference in a more precise manner and I will finally provide a comparative assessment of both the forms using different properties/ features. Triggered is the form where a specific input is injected with a trigger / adversarial information so as to activate the malicious behavior of the model. Triggerless is the form which does not inject a typical trigger or adversarial […]
ChatGPT: Assignment companion
With all the hype going on lately about ChatGPT, it has become the talk of every household. While a certain clan is reaping its benefits, there are some who are either exploring its breaking point or misusing it incessantly at various degrees. Starting from misusing it for assignments to generating malwares, ChatGPT seems to have become the Messiah lately and is here to stay. You might think this blog is written using ChatGPT as well. While it could have been possible, but that would not have involved the sentience of a human which even ChatGPT acknowledges of in its various […]
Reviewing Prompt Injection and GPT-3
Recently, AI researcher Simon Willison discovered a new-yet-familiar kind of attack on OpenAI’s GPT-3. The attack dubbed as prompt injection attack has taken the internet by storm over the last couple of weeks highlighting how vulnerable GPT-3 is to this attack. This review article gives a brief overview on GPT-3, its use, vulnerability, and how the said attack has been successful. Apart from that, links to different articles for additional reference and possible security measures are also highlighted in this post. OpenAI’s GPT-3 In May, 2020, San Francisco based AI research laboratory had launched its third generation language prediction model, […]