admin

360 Results / Page 38 of 40

Adversarial ML admin / October 31, 2020

Attacking object detection models with dynamic patches

Despite the fact that deep neural networks have become an integral part of highly vulnerable activities, they are highly susceptible to adsarial attacks. We have compiled a selection of the most interesting studies for October 2020. Dynamic Adversarial Patch for Evading Object Detection Models Deep neural networks (DNN) have become ...

todayOctober 30, 2020

  • 62
  • 1
close

Company News + Conference Talks admin

ITBN CONF-EXPO 2020

ITBN is a professional forum that brings people close to the latest trends and innovations through the EXPO of national and international organizations and famous lecturers’ presentations. ITBN stimulates the building and strengthening of business connections with numerous networking possibilities and interactive programs among the representatives of the IT-security profession. ...

todayOctober 20, 2020

  • 60
close

Company News + Industry Awards admin

Adversa is a Golden Bridge Awards Winner 2020 in Artificial Intelligence

As a company engaged in researching security of AI-powered systems, Adversa was  honored by 12th Annual 2020 Golden Bridge Business and Innovation Awards. The company became a winner in the Artificial Intelligence category.  Golden Bridge Business and Innovation Awards are an international award, which is given annually to the companies ...

todayOctober 11, 2020

  • 50
close

Company News + Conference Talks admin

Hacking Facial Recognition at Hacktivity

Hacktivity is the biggest event of its kind in Central & Eastern Europe. The visitors are coming from all around the globe every year to learn more about the latest trends of cybersecurity, get inspired by people with similar interests, and develop themselves via comprehensive workshops and training sessions. Alex ...

todayOctober 11, 2020

  • 59
close

Secure AI Weekly admin

Towards trusted AI Week 41 – the ways hackers use AI

Using AI remind using a knife: you can either cut yourself or cook a nice dinner. Most popular ways malefactors use smart technologies  TechRepublic, October 7, 2020 Cybersecurity professionals state that AI and ML are widely used by malefactors to perform breaches, and there are thee most popular easy to ...