Friday, August 15, 2025
Science
No Result
View All Result
  • Login
  • HOME
  • SCIENCE NEWS
  • CONTACT US
  • HOME
  • SCIENCE NEWS
  • CONTACT US
No Result
View All Result
Scienmag
No Result
View All Result
Home Science News Technology and Engineering

How researchers are protecting AI of the future

May 30, 2024
in Technology and Engineering
Reading Time: 4 mins read
0
Samson Zhou
67
SHARES
605
VIEWS
Share on FacebookShare on Twitter
ADVERTISEMENT

Trust is vital to the widespread acceptance of AI across industries, especially when safety is a concern. For example, people may be hesitant to ride in a self-driving car knowing that the AI running it can be hacked. One barrier to increasing trust is that the algorithms powering AI are vulnerable to such attacks. 

Samson Zhou

Credit: Texas A&M Engineering

ADVERTISEMENT

Trust is vital to the widespread acceptance of AI across industries, especially when safety is a concern. For example, people may be hesitant to ride in a self-driving car knowing that the AI running it can be hacked. One barrier to increasing trust is that the algorithms powering AI are vulnerable to such attacks. 

Dr. Samson Zhou, assistant professor in the Department of Computer Science and Engineering at Texas A&M University, and Dr. David P. Woodruff, professor in the Computer Science Department at Carnegie Mellon University, hope to strengthen algorithms used by big data AI models against attacks. Big data AI models are scalable algorithms that are specifically designed to handle and analyze large volumes of data. 

Zhou and Woodruff are a long way off from creating algorithms that are completely robust against attacks, but they aim to make progress. The two received a grant from the National Science Foundation for their work. 

“It’s definitely a long-term goal to give people an algorithm that comes with a guarantee behind it,” Woodruff said. “We’d like to be able to say, ‘We promise you that this algorithm is robust against adversaries,’ meaning that no matter how many queries you make to this algorithm it’s still going to give you the correct answer,” Woodruff said. 

“People are scared to go into self-driving cars when they know an adversary can cause the car to have an accident,” Zhou said. “We hope that our work will be one step in inspiring confidence towards algorithms.” 

Zhou and Woodruff’s research focuses on a type of big data model called a streaming model. With a streaming model, information and insights must be gleaned from the data right away or they will be lost because all the data cannot be stored. Common examples of streaming models are apps that provide real-time information to users, like a public transportation app that shows the current location of buses on a route. 

Challenges to Creating Secure Algorithms

One challenge researchers face when trying to create a secure algorithm is randomness. Think of an algorithm as a set of instructions for AI. Randomness is included in these instructions to save space. However, when randomness is included, the engineers of an algorithm don’t have a complete picture of the algorithm’s inner workings, leaving the algorithm open to attack. 

“Any algorithm that uses randomness can be attacked because the attacker kind of learns your randomness through its interaction with you” Woodruff said. “And if [the attacker] knows something about your randomness, it can find things to feed your algorithm and force it to fail.” 

Woodruff compared manipulating algorithms to manipulating coin tosses: “You might have a sequence of coin tosses in your algorithm, and that sequence is really good for solving most problems. But if the attacker knew that sequence of coin tosses, it could find exactly the right input that causes the result to be bad,” Woodruff said. 

There are also different types of attacks. Sometimes the only thing attackers know about an algorithm is how it responds to queries. In this case, attackers base future queries on the algorithm’s previous output. This is called a black box attack. When attackers know the entire state of the algorithm, its inner workings and how it responds, that is a white box attack. Zhou and Woodruff want to defend against both. 

“Attackers that know the internal parameters of an algorithm seem like much more powerful adversaries,” Zhou said. “But we’re actually able to show that there are still interesting things that can be done to defend against them.” 

Future Research

In creating an algorithm that will be robust against attack, Zhou and Woodruff plan to develop new connections between mathematics and theoretical computer science. They will also look to the field of cryptography (data encryption) for ideas. Through their research, they hope to understand how to strengthen algorithms against attack while maintaining efficiency. They want to identify principles underlying vulnerabilities in algorithms. 

Zhou and Woodruff know it will be difficult to prove that an algorithm is robust against infinite types of attack and that the algorithm will reliably give an accurate answer. 

“Sometimes it’s not possible to design algorithms to guarantee adversarial robustness,” Zhou said. “Sometimes there is no way to promote adversarial robustness if you don’t have enough space. In that case, we should stop trying to design algorithms that meet these guarantees and instead look for other ways around these problems.” 

Zhou and Woodruff ultimately hope to write a monograph based on their work. 

By Amanda Norvelle, Texas A&M Engineering



Share27Tweet17
Previous Post

Glimpses of a volcanic world: New telescope images of Jupiter’s moon Io rival those from spacecraft

Next Post

New coral disease forecasting system led by University of Hawai’i team

Related Posts

blank
Technology and Engineering

New Multimodal Sentiment Analysis Technique Enhances Emotional Detection and Reduces Computing Costs

August 15, 2025
blank
Technology and Engineering

Hydrogel Electrochemical Cells Boost Ischemia–Reperfusion Therapy

August 15, 2025
blank
Technology and Engineering

Epilepsy Linked to NHS Gene and Phenotype Patterns

August 15, 2025
blank
Technology and Engineering

Urban Meteorology and Chemistry Drive Heat-Ozone Extremes

August 15, 2025
blank
Technology and Engineering

Environmental and Health Costs of China’s Express Delivery

August 15, 2025
blank
Technology and Engineering

KIER Innovates Advanced Electrodes for Efficient Hydrogen Production from Seawater Electrolysis

August 15, 2025
Next Post
Great Barrier Reef

New coral disease forecasting system led by University of Hawai'i team

  • Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    Mothers who receive childcare support from maternal grandparents show more parental warmth, finds NTU Singapore study

    27533 shares
    Share 11010 Tweet 6881
  • University of Seville Breaks 120-Year-Old Mystery, Revises a Key Einstein Concept

    947 shares
    Share 379 Tweet 237
  • Bee body mass, pathogens and local climate influence heat tolerance

    641 shares
    Share 256 Tweet 160
  • Researchers record first-ever images and data of a shark experiencing a boat strike

    507 shares
    Share 203 Tweet 127
  • Warm seawater speeding up melting of ‘Doomsday Glacier,’ scientists warn

    310 shares
    Share 124 Tweet 78
Science

Embark on a thrilling journey of discovery with Scienmag.com—your ultimate source for cutting-edge breakthroughs. Immerse yourself in a world where curiosity knows no limits and tomorrow’s possibilities become today’s reality!

RECENT NEWS

  • Expanding Rock Extraction Boosts Enhanced Weathering Efficiency
  • Loop Quantum Gravity: Black Hole Effects Rewritten
  • New Multimodal Sentiment Analysis Technique Enhances Emotional Detection and Reduces Computing Costs
  • Precision Nanobody Therapy Breaks New Ground in Targeting Lung Cancer Tumors

Categories

  • Agriculture
  • Anthropology
  • Archaeology
  • Athmospheric
  • Biology
  • Bussines
  • Cancer
  • Chemistry
  • Climate
  • Earth Science
  • Marine
  • Mathematics
  • Medicine
  • Pediatry
  • Policy
  • Psychology & Psychiatry
  • Science Education
  • Social Science
  • Space
  • Technology and Engineering

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 4,859 other subscribers

© 2025 Scienmag - Science Magazine

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • HOME
  • SCIENCE NEWS
  • CONTACT US

© 2025 Scienmag - Science Magazine

Discover more from Science

Subscribe now to keep reading and get access to the full archive.

Continue reading