Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Clickbait (Score 1) 130

I called it cheating because they violated both one of the prime rules of AI: train on a data set that is more or less representative of the data set you will test with, and one of the prime rules of statistics: do not apply a priori statistical analysis when you iterate with feedback based on the thing you estimated. Their test images are intentionally much different from the training images, which is one of the first things an undergraduate course on AI will talk about. They also use what are essentially a priori estimates after they repeatedly tweak the inputs to push those estimates to extremes, which is identified as taboo in decent undergraduate courses on statistics. Both of those are intentional violations of good practices that make the results look worse for the neural networks.

I can't tell from their paper what they mean by "99% confidence". Unless the DNN has max-pooling layers very near the output, none or many of the output units might have high activation levels for a given input. (It sounds like they had classes with low typical activation levels, and did not try to evolve fooling images for those classes.) If that happens -- say, "wheel" gets a score of 0.99, "lizard" gets 0.90, "dog" gets 0.80, and everything else is near zero -- then it is inappropriate to say that the network decided it was a wheel with 99% certainty. You would usually say that the network recognized the image as a wheel, but note it as an ambiguous result.

Comment Re:Clickbait (Score 1) 130

Why was my characterization of their approach "hardly fair"? Someone -- either the researchers or their press people -- decided to hype it as finding a general failing in DNNs (or "AI" as a whole). The failure mode is known, and their particular failure modes are tailored to one particular network (rather than even just one training set). I think the "hardly fair" part is the original hyperbole, and my response is perfectly appropriate to that. The research is not at all what it is sold as.

Don't multi-class identification networks typically have independent output ANNs, so that several can have high scores? I assumed, perhaps incorrectly, that the 99+% measures they cited were cases where only one output class had a high score, and the rest were low. If they were effectively using single-class identifiers, either in fact or by considering only the maximum score in a multi-class identifier, that makes their findings even less notable.

Comment Re:Clickbait (Score 1) 130

The researchers also basically cheated by "training" their distractor images on a fixed neural network. People have known for decades that a fixed/known neural network is easy to fool; what varies is exactly how you can fool it. The only novel finding here is their method for finding images that fool DNNs in practice -- but the chances are overwhelmingly high that a different DNN, trained on the same training set, would not make the same mistake (and perhaps not make any mistake, by assigning a low probability for all classes). It is a useful reminder for some security analyses, but not a useful indictment of AI or DNNs as a whole.

Comment Re:This synopsis (Score 1) 130

The people choosing the training sets are not morons at all. This "research" is almost exactly analogous to finding that this year's SAT can be passed by feeding it a fixed pattern of A, C, D, A, B, and so forth -- and then declaring that this means standardized testing is easy to fake out. They are exploiting the particular structure of a particular instance of a DNN. It is not surprising that they can find odd images that make a DNN answer "yes" when the only question it knows how to answer is "is this a rotary phone dial?"

The Courts

Apple Wins iTunes DRM Case 191

An anonymous reader sends word that Apple's iTunes DRM case has already been decided. The 8-person jury took only a few hours to decide that the features introduced in iTunes 7.0 were good for consumers and did not violate antitrust laws. Following the decision, the plaintiff's head attorney Patrick Coughlin said an appeal is already planned. He also expressed frustrations over getting two of the security features — one that checks the iTunes database, and another that checks each song on the iPod itself — lumped together with the other user-facing features in the iTunes 7.0 update, like support for movies and games. "At least we got a chance to get it in front of the jury," he told reporters. ... All along, Apple's made the case that its music store, jukebox software, and hardware was simply an integrated system similar to video game consoles from Sony, Microsoft, and Nintendo. It built all those pieces to work together, and thus it would be unusual to expect any one piece from another company to work without issues, Apple's attorneys said. But more importantly, Apple offered, any the evolution of its DRM that ended up locking out competitors was absolutely necessary given deals it had with the major record companies to patch security holes.
Google

Eric Schmidt: To Avoid NSA Spying, Keep Your Data In Google's Services 281

jfruh writes Google Chairman Eric Schmidt told a conference on surveillance at the Cato Institute that Edward Snowden's revelations on NSA spying shocked the company's engineers — who then immediately started working on making the company's servers and services more secure. Now, after a year and a half of work, Schmidt says that Google's services are the safest place to store your sensitive data.
Security

Stealthy Linux Trojan May Have Infected Victims For Years 129

An anonymous reader writes: Researchers from Moscow-based Kaspersky Labs have uncovered an extremely stealthy trojan for Linux systems that attackers have been using to siphon sensitive data from governments and pharmaceutical companies around the world.

The malware may have sat unnoticed on at least one victim computer for years, although Kaspersky Lab researchers still have not confirmed that suspicion. The trojan is able to run arbitrary commands even though it requires no elevated system privileges.
Sony

The Sony Pictures Hack Was Even Worse Than Everyone Thought 528

An anonymous reader writes with today's installment of Sony hack news. "It's time to take a moment of silence for Sony Pictures, because more startling revelations about leaked information just came out and employees are starting to panic. BuzzFeed raked through some 40 gigabytes of data and found everything from medical records to unreleased scripts. This is probably the worst corporate hack in history. Meanwhile, Fusion's Kevin Roose is reporting on what exactly happened at Sony Pictures when the hack went down. The hack was evidently so extensive that even the company gym had to shut down. And once the hackers started releasing the data, people started 'freaking out,' one employee said. That saddest part about all of this is that the very worst is probably still to come. Hackers say they stole 100 terabytes of data in total. If only 40 gigabytes contained all of this damning information, just imagine what 100 terabytes contains."
Wikipedia

A Mismatch Between Wikimedia's Pledge Drive and Its Cash On Hand? 274

Andreas Kolbe writes The latest financial statements for the Wikimedia Foundation, the charity behind Wikipedia, show it has assets of $60 million, including $27 million in cash and cash equivalents, and $23 million in investments. Yet its aggressive banner ads suggest disaster may be imminent if people don't donate and imply that Wikipedia may be forced to run commercial advertising to survive. Jimmy Wales counters complaints by saying the Foundation are merely prudent in ensuring they always have a reserve equal to one year's spending, but the fact is that Wikimedia spending has increased by 1,000 percent in the course of a few years. And by a process of circular logic, as spending increases, so the reserve has to increase, meaning that donors are asked to donate millions more each year. Unlike the suggestion made by the fundraising banners, most of these budget increases have nothing to do with keeping Wikipedia online and ad-free, and nothing to do with generating and curating Wikipedia content, a task that is handled entirely by the unpaid volunteer base. The skyrocketing budget increases are instead the result of a massive expansion of paid software engineering staff at the Foundation – whose work in recent years has been heavily criticised by the unpaid volunteer base. The aggressive fundraising banners too are controversial within the Wikimedia community itself.

Comment Re:Eliminating the bus driver is Pareto-stupid (Score 2) 257

The last time I frequently used a US bus system -- about 15 years ago, in Pittsburgh -- they used a zone system, with the fare based on your origin and destination zones, and most bus routes crossing at least one zone boundary. The last time I used a public bus -- about 5 years ago, in Japan (Yamanouchi, Nagano Prefecture) -- riders took a numbered ticket when they boarded, and their exact fare to the next stop was displayed on an LCD panel. I would guess that US cities avoid exact metering in order to subsidize their passengers who live far away from their workplace; these are the most frequent riders, and tend to be lower-income.

Comment Eliminating the bus driver is Pareto-stupid (Score 2) 257

If you go from ten single-occupancy cars to a ten-passenger bus, you've eliminated 90% of the vehicles at the (relatively low) cost of adding one more driver. Eliminating the bus driver gets you from eleven people in the bus to ten, which is probably not as important as other efficiency improvements. Also, buses are awful unless you have quite high population density -- lots of areas don't have enough prospective trip endpoints to justify mass transit.

Bug

Bad Lockup Bug Plagues Linux 257

jones_supa (887896) writes "A hard to track system lockup bug seems to have appeared in the span of couple of most recent Linux kernel releases. Dave Jones of Red Hat was the one to first report his experience of frequent lockups with 3.18. Later he found out that the issue is present in 3.17 too. The problem was first suspected to be related to Xen. A patch dating back to 2005 was pushed for Xen to fix a vmalloc_fault() path that was similar to what was reported by Dave. The patch had a comment that read "the line below does not always work. Needs investigating!" But it looks like this issue was never properly investigated. Due to the nature of the bug and its difficulty in tracking down, testers might be finding multiple but similar bugs within the kernel. Linus even suggested taking a look in the watchdog code. He also concluded the Xen bug to be a different issue. The bug hunt continues in the Linux Kernel Mailing List."

Comment Re:Except... (Score 1) 413

And in your world, how do you deal with unicorn overpopulation?

When you have one district that breaks down mostly into two significantly different constituencies -- whether they are based on race, class, rural versus suburban, or whatever else -- the way politicians react in reality is that they focus their appeal on one of the constituencies, try to increase turnout for that constituency, and discourage turnout for the other one. It's just gerrymandering of a different kind.

Slashdot Top Deals

One of the chief duties of the mathematician in acting as an advisor... is to discourage... from expecting too much from mathematics. -- N. Wiener

Working...