mirror of
https://github.com/jackyzha0/quartz.git
synced 2025-12-27 14:54:05 -06:00
vault backup: 2022-10-10 10:12:45
This commit is contained in:
parent
a9812fedfc
commit
ebb247a5b9
@ -4,6 +4,9 @@ aliases:
|
||||
tags:
|
||||
- lecture
|
||||
- comp210
|
||||
sr-due: 2022-10-13
|
||||
sr-interval: 3
|
||||
sr-ease: 250
|
||||
---
|
||||
|
||||
# nefarious uses of ml
|
||||
@ -71,9 +74,48 @@ how
|
||||
|
||||
F5 steganographic algorithm
|
||||
- developed to fool analysis of dct distributions
|
||||
-
|
||||
- seeded with key to create pseudorandom sequence for embedding
|
||||
- can preserve statistical properties of DCT distributions
|
||||
|
||||
can use ML to find hidden images
|
||||
- then hackers will try to fool this
|
||||
- some will always get through
|
||||
|
||||
# bigger issues
|
||||
- deepfakes to to shape political views of the day
|
||||
- pixel replacement with segmentation and inpainting
|
||||
- 
|
||||
|
||||
## is ML good or bad
|
||||
- being used everywhere
|
||||
|
||||
- should we care
|
||||
|
||||
- data and modelling cannot always be 100% perfect
|
||||
- e.g., killer drones
|
||||
|
||||
- privacy concerns
|
||||
- linked data
|
||||
- pipelins - information seepage
|
||||
|
||||
nx integrated data infrastructure
|
||||
|
||||
ethics
|
||||
- what considerations need to be made
|
||||
- ML being used to automate decision making
|
||||
- ML sentencing of criminals
|
||||
|
||||
theft
|
||||
- theft of data
|
||||
- data is more valuable
|
||||
- transfer learning
|
||||
|
||||
- reverse engineering a ML model
|
||||

|
||||
|
||||
|
||||
# where to from here
|
||||
- good and bad are human constructs
|
||||
- how will laws work
|
||||
- can we use ML to make laws
|
||||
- Do we need to stop it?
|
||||
18
content/notes/19-deepfakes.md
Normal file
18
content/notes/19-deepfakes.md
Normal file
@ -0,0 +1,18 @@
|
||||
---
|
||||
title: "19-deepfakes"
|
||||
aliases:
|
||||
tags:
|
||||
- comp210
|
||||
- lecture
|
||||
---
|
||||
|
||||
# what, origins, how
|
||||
- issue with trust politics etc
|
||||
|
||||
-
|
||||
|
||||
# related concepts
|
||||
|
||||
# how
|
||||
|
||||
# concerns and solutions
|
||||
@ -38,4 +38,5 @@ No final exam
|
||||
- [15-policies-standards-practices](notes/15-policies-standards-practices.md)
|
||||
- [16-cloud-security](notes/16-cloud-security.md)
|
||||
- [17-ML-in-IA-1](notes/17-ML-in-IA-1.md)
|
||||
- [18-ML-in-IA-2](notes/18-ML-in-IA-2.md)
|
||||
-
|
||||
Loading…
Reference in New Issue
Block a user