A new release of the Adversarial Robustness Toolbox provides a method for defending against poisoning and "backdoor" attacks in machine learning models.
If we can protect videos, audio and photos with digital watermarking, why not AI models? This is the question my colleagues and I asked ourselves as we looked to develop a technique to assure developers that their hard work in building AI, such as deep learning models, can be protected. You may be thinking, “Protected […]
“The prettiest thing I had ever seen” is not how IBM researcher Shai Halevi describes the beaches in Israel where he grew up. Or the sunset after a long day of hiking in Mitzpe Ramon desert. Rather, he saves these words to describe the first time he saw a cryptographic equation as an undergrad student. […]
Each year, we showcase some of the biggest breakthroughs coming out of IBM Research’s global labs – five technologies that we believe will fundamentally reshape business and society in the next five years.
Quantum computing, future of AI and celebrity guest speakers make up the IBM Research lineup for Think 2018, IBM’s upcoming megaconference in Las Vegas. IBM Research will be the feature of over 45 sessions at Think 2018, taking place in Las Vegas, Nevada, March 19-22. IBM’s biggest industry and innovation event of the year will […]
We can all thank an elementary school teacher for keeping our electronic data safe and secure. Growing up in Argentina, and studying in Israel, not far from where his career started at IBM’s Haifa Lab, IBM Fellow and cryptographer, Hugo M. Krawczyk cites his third-grade teacher as one of his first influences. “She piqued my […]
Every year, CareerCast publishes a widely-reported list of the top 10 most stressful jobs. The 2017 list includes some obvious careers including military service, firefighter, and police officer, who risk their lives every day. The list also includes several less life-threatening jobs including TV news broadcaster and taxi driver. But what if you had the […]
Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting enterprises is demonstrated in the increase in the scale, scope, and frequency of cyber-attacks confronting enterprises today. As noted by guest editor and IBM Fellow […]
Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today, as an expert in malware evasion techniques, she tries to figure out how the bad guys are avoiding detection as they try to hack our […]
This blog post was authored by Ayman Jarrous and Fady Copty, research staff members at IBM Research – Haifa. When it comes to hacking, there are always new techniques being used by both us good guys who work in security, and the bad guys who are trying to exploit system vulnerabilities. Today’s tools are getting […]
Have you recently bought a house, or sold shares in a company, or maybe sent money overseas? If so, I suspect that the experience has left you wondering why these simple transactions take so much time and cost so much money. In each case, what looks like a simple financial transaction takes place over many […]