AI, ML & Data Science 21/November/2023 Detecting bugs in source code with AI Explore one of the techniques for detecting vulnerabilities through Functionally-similar yet Inconsistent Code (FICS), using static analysis to identify inconsistencies in code. Learn more about its customized representation and hierarchical clustering, revealing advantages, results, and potential improvements
AI, ML & Data Science 08/September/2023 Detecting Anomalies using Machine Learning on Splunk The identification of cyberattacks is crucial to safeguard networks and systems, but signature detection has its limitations. Therefore, the discovery of anomalies through machine learning is a promising approach
AI, ML & Data Science 19/April/2023 Threats to Machine Learning-Based Systems – Part 2 of 5 In this post, we discuss how adversarial attacks affect the physical layer of the OSI model and may potentially shut down wireless communications, such as 5G, by focusing on a modulation classification application
AI, ML & Data Science 15/March/2023 Threats to Machine Learning-based Systems – Part 1 of 5 Risks and Vulnerabilities Introduced by Machine Learning
AI, ML & Data Science 21/November/2023 Detecting bugs in source code with AI Explore one of the techniques for detecting vulnerabilities through Functionally-similar yet Inconsistent Code (FICS), using static analysis to identify inconsistencies in code. Learn more about its customized representation and hierarchical clustering, revealing advantages, results, and potential improvements
AI, ML & Data Science 08/September/2023 Detecting Anomalies using Machine Learning on Splunk The identification of cyberattacks is crucial to safeguard networks and systems, but signature detection has its limitations. Therefore, the discovery of anomalies through machine learning is a promising approach
AI, ML & Data Science 19/April/2023 Threats to Machine Learning-Based Systems – Part 2 of 5 In this post, we discuss how adversarial attacks affect the physical layer of the OSI model and may potentially shut down wireless communications, such as 5G, by focusing on a modulation classification application
AI, ML & Data Science 15/March/2023 Threats to Machine Learning-based Systems – Part 1 of 5 Risks and Vulnerabilities Introduced by Machine Learning