AI Development and the ‘Fuzzy Logic' of Chinese Cyber Security and Data Laws

2021 ◽  
Author(s):  
Max Parasol

The book examines the extent to which Chinese cyber and network security laws and policies act as a constraint on the emergence of Chinese entrepreneurialism and innovation. Specifically, how the contradictions and tensions between data localisation laws (as part of Network Sovereignty policies) affect innovation in artificial intelligence (AI). The book surveys the globalised R&D networks, and how the increasing use of open-source platforms by leading Chinese AI firms during 2017–2020, exacerbated the apparent contradiction between Network Sovereignty and Chinese innovation. The drafting of the Cyber Security Law did not anticipate the changing nature of globalised AI innovation. It is argued that the deliberate deployment of what the book refers to as 'fuzzy logic' in drafting the Cyber Security Law allowed regulators to subsequently interpret key terms regarding data in that Law in a fluid and flexible fashion to benefit Chinese innovation.

AI Magazine ◽  
2019 ◽  
Vol 40 (3) ◽  
pp. 67-78
Author(s):  
Guy Barash ◽  
Mauricio Castillo-Effen ◽  
Niyati Chhaya ◽  
Peter Clark ◽  
Huáscar Espinoza ◽  
...  

The workshop program of the Association for the Advancement of Artificial Intelligence’s 33rd Conference on Artificial Intelligence (AAAI-19) was held in Honolulu, Hawaii, on Sunday and Monday, January 27–28, 2019. There were fifteen workshops in the program: Affective Content Analysis: Modeling Affect-in-Action, Agile Robotics for Industrial Automation Competition, Artificial Intelligence for Cyber Security, Artificial Intelligence Safety, Dialog System Technology Challenge, Engineering Dependable and Secure Machine Learning Systems, Games and Simulations for Artificial Intelligence, Health Intelligence, Knowledge Extraction from Games, Network Interpretability for Deep Learning, Plan, Activity, and Intent Recognition, Reasoning and Learning for Human-Machine Dialogues, Reasoning for Complex Question Answering, Recommender Systems Meet Natural Language Processing, Reinforcement Learning in Games, and Reproducible AI. This report contains brief summaries of the all the workshops that were held.


Author(s):  
Juveriya Afreen

Abstract-- With increase in complexity of data, security, it is difficult for the individuals to prevent the offence. Thus, by using any automation or software it’s not possible by only using huge fixed algorithms to overcome this. Thus, we need to look for something which is robust and feasible enough. Hence AI plays an epitome role to defense such violations. In this paper we basically look how human reasoning along with AI can be applied to uplift cyber security.


2019 ◽  
Vol 17 (1) ◽  
pp. 69-76
Author(s):  
Mohammad Shiddiq Ghozali

Perkembangan Teknologi Informasi dan Komunikasi begitu pesat di zaman sekarang ini. Diikuti pula dengan perkembangan di bidang Artificial Intelligence (AI) atau Kecerdasan Buatan. Di Indonesia sendiri masih belum begitu populer dikalangan masyarakat akan tetapi perusahaan-perusahaan IT berlomba-lomba menciptakan inovasi dibidang Kecerdasan Buatan dan penerapan Kecerdasan Buatan disegala aspek kehidupan. Contoh kasus di Automated Teller Machine (ATM), seringkali terjadi kejahatan di ATM seperti pengintaian nomor pin, skimming, lebanese loop dan kejahatan lainnya. Walaupun di ATM sudah terdapat CCTV akan tetapi penjahat menggunakan alat bantu untuk menutupi wajahnya seperti helm, topi, masker dan kacamata hitam. Biasanya didepan pintu masuk ATM terpampang larangan untuk tidak menggunakan helm, topi, masker dan kacamata hitam serta tidak membawa rokok. Akan tetapi larangan itu masih tetap ada yang melanggar, dikarenakan tidak ada tindak lanjut ketika seseorang menggunakan benda-benda yang dilarang dibawa kedalam ATM. Oleh karena itu penulis membuat sistem pendeteksi obyek di bidang Kecerdasan Buatan untuk mendeteksi benda-benda yang dilarang digunakan ketika berada di ATM. Salah satu metode yang digunakan untuk menciptakan Object Detection yaitu You Only Look Once (YOLO). Implementasi ide ini tersedia pada DARKNET (open source neural network). Cara kerja YOLO yaitu dengan melihat seluruh gambar sekali, kemudian melewati jaringan saraf sekali langsung mendeteksi object yang ada. Oleh karena itu disebut You Only Look Once (YOLO). Pada penelitian ini, penulis membuat sistem yang masih dalam bentuk pengembangan, sehingga menjalankannya masih menggunakan command prompt. Keywords : Automated Teller Machine (ATM), Kecerdasan Buatan, Pendeteksi Obyek, You Only Look Once (YOLO)  


Author(s):  
TRU H. CAO

Conceptual graphs and fuzzy logic are two logical formalisms that emphasize the target of natural language, where conceptual graphs provide a structure of formulas close to that of natural language sentences while fuzzy logic provides a methodology for computing with words. This paper proposes fuzzy conceptual graphs as a knowledge representation language that combines the advantages of both the two formalisms for artificial intelligence approaching human expression and reasoning. Firstly, the conceptual graph language is extended with functional relation types for representing functional dependency, and conjunctive types for joining concepts and relations. Then fuzzy conceptual graphs are formulated as a generalization of conceptual graphs where fuzzy types and fuzzy attribute-values are used in place of crisp types and crisp attribute-values. Projection and join as basic operations for reasoning on fuzzy conceptual graphs are defined, taking into account the semantics of fuzzy set-based values.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Kevin Page ◽  
Max Van Kleek ◽  
Omar Santos ◽  
...  

AbstractMultiple governmental agencies and private organisations have made commitments for the colonisation of Mars. Such colonisation requires complex systems and infrastructure that could be very costly to repair or replace in cases of cyber-attacks. This paper surveys deep learning algorithms, IoT cyber security and risk models, and established mathematical formulas to identify the best approach for developing a dynamic and self-adapting system for predictive cyber risk analytics supported with Artificial Intelligence and Machine Learning and real-time intelligence in edge computing. The paper presents a new mathematical approach for integrating concepts for cognition engine design, edge computing and Artificial Intelligence and Machine Learning to automate anomaly detection. This engine instigates a step change by applying Artificial Intelligence and Machine Learning embedded at the edge of IoT networks, to deliver safe and functional real-time intelligence for predictive cyber risk analytics. This will enhance capacities for risk analytics and assists in the creation of a comprehensive and systematic understanding of the opportunities and threats that arise when edge computing nodes are deployed, and when Artificial Intelligence and Machine Learning technologies are migrated to the periphery of the internet and into local IoT networks.


Sign in / Sign up

Export Citation Format

Share Document