When fed a sufficient amount of training data, artificial intelligence techniques can be used to generate new ideas in several different ways. Is that creativity...Keith Kirkpatrick From Communications of the ACM | February 1, 2023
Security researcher Matthias Marx successfully bid on eBay for a Secure Electronic Enrollment Kit, which contained the names, nationalities, photographs, fingerprints...The New York Times From ACM TechNews | December 30, 2022
An international research team led by Markus Weinmann at the University of Cologne identified online fraudsters by their mouse movements, which were found to be...University of Cologne From ACM TechNews | December 29, 2022
The market for commercial spyware — which allows governments to invade mobile phones and vacuum up data — is booming. Even the U.S. government is using it.
The New York Times From ACM News | December 9, 2022
Scientists taught an artificial intelligence a second distinct task without overwriting connections learned from a first task, through the use of simulated sleep...New Scientist From ACM TechNews | November 16, 2022
Common deidentification techniques do not adequately protect data privacy, according to a study by University of Chicago computer scientist Aloni Cohen.
University of Chicago From ACM TechNews | October 13, 2022