Coinswitch, one of the largest crypto exchanges in India, became the latest entrant to the list of beleaguered entities being probed by the agencies and tax officials like the Enforcement Directorate this week. There is no end to the troubles of cryptocurrency exchanges operating in India as they continue to face the scrutinyof central government agencies and tax investigators.
Ashish Singhal, CEO of Coinswitch, took to Twitter for the first time to allay the fears of investors and the crypto community after the searches at Coinswitch Kuber pertaining to its money laundering inestigation into the instant micro loan app scam this week.
Coinswitch has more than 18 million registered users and is valued at $1.9 billion. It is backed by Tiger Global, Andreessen Horowitz, and Coinbase Ventures. Coinswitch is the third exchange after Flipvolt and WazirX (the Indian arm of crypto exchange Vauld) to be probed by the central agency, which is investigating at least 10 cryptocurrency exchanges for laundering more than Rs 1,000 crore.
The money has been recognized as proceeds of crime of the firms accused under investigation in the instant loan app case and almost all of them have a link to China.
The probe has discovered instances of the accused firms approaching the exchanges to purchase crypto coins for more than Rs. 100 crore and crypto coins being transferred to international wallets. Further, these exchanges did not carry any enhanced due diligence and even failed to present suspicious transaction reports (STRs).
On further probe in the money laundering probe, the Enforcement Directorate allegedly recovered over Rs 800 crore proceeds of crime against 365 fintechs and their non-banking financial companies (NBFCs) partners.
Elon Musk has announced that Tesla’s electric vehicles (EVs) will use Starlink’s new cellular broadcasting satellites to connect with T-Mobile users in the United States.
Musk took to Twitter after T-Mobile and Starlink announced the partnership. He also clarified that this would work even with Tesla’s EVs with the AT&T LTE network. This will potentially be used for other operators as well.
Musk revealed that the connection would provide satellite to cellular coverage from Starlink that will provide a 2-4 Mbps link shared by everyone in the satellite coverage area.
This means the speeds would not be fast enough for streaming 4k content or enjoying some of the premium features of the Tesla EVs, like live streaming video from the car’s cameras. Experts say this implementation could work similarly to MVNO like Google Fi, which works via many other carriers.
Tesla always has come with connectivity packages, but its sales have grown, and Musk has scaled back the packages. Teslas purchased before June of 2018 had a premium connectivity package at no additional cost. But the latest cars bought after July 20, 2022, come only with the standard connectivity package along with navigation and in-car maps at best.
The reason could be that as AT&T has shut down its 3G network, and old cars that do not have an LTE modem could be required to do a $200 upgrade to stay connected. This would apply to cars that were sold before 2015.
BITS Pilani has announced the launch of a new master’s degree program, MTech in artificial intelligence and machine learning, designed to equip working professionals with theoretical and practical knowledge of cutting-edge ML and AI methods such as reinforcement learning and deep learning.
The Work Integrated Learning Programmes (WILP) department announced the launch of a four-semester program concluding with a doctorate that will provide participants with a wide variety of skills helpful in advancing their careers as AI and ML scientists.
Using tools and technologies such as OpenCV for computer vision, Tensorflow for Deep Learning, NLTK for natural language processing, and Python libraries, the course will examine the practical applications of AI in fields like computer vision, natural language processing (NLP), robotics, and cyber security.
Professor Anita Ramachandran is the head of BITS Pilani’s WILP’s computer science and information system group. She emphasized the importance of the course by saying that its electives and subjects are meant to aid in the comprehensive development of skills and knowledge. It is also meant to familiarise ML engineers with algorithms like supervised, unsupervised, and reinforcement learning, along with application areas like natural language processing (NLP), computer vision (CV), robotics (robotics), and cyber security.
This course also includes weekend online lectures taught by BITS Pilani professors. The course application deadline is September 12, 2022. As noted by Professor Ramachandran, this curriculum will also aid engineers in comprehending the moral dilemmas inherent in using AI and ML. In 2020, the worldwide artificial intelligence industry was estimated to be worth USD 65.48 billion and that figure is expected to rise to USD 1581.7 billion by 2030.
To offer more value to its retail investors and make it more affordable, Tesla has split its stock for the second time in the span of two years. The 3:1 stock split means each stockholder of record on August 17, 2022, will receive two more shares of common stock for each previously held share. This kicked in after closing the trade on August 24.
This stock split was approved by the Tesla board of directors and the shareholders during the company’s 2022 Annual Meeting on August 4. The Giga factory in Shanghai crossed a milestone recently as the millionth car rolled out from the factory on August 14 and took Tesla’s total number of cars to over 3 million.
In 2020, the company decided to split its stock on a 5:1 basis and breached the $1 trillion in market capitalization in 2021. However, the counter’s market capitalization currently stands north of $300 billion.
This stock split is not unique to Tesla. It follows a trend of high-value stocks splitting to diversify the investor base and offer more value to retail investors. Several other entities, like Google’s parent firm Alphabet and Amazon, recently went through a share split.
The share price dipped below the $300 level in early US trade on Thursday morning as the share split kicked in. For retail investors, the share split does not affect the stock’s fundamentals. Based on analysts’ offerings, the 12-month price target is around the $314 level.
Incidentally, Tesla shares debuted at $17 in 2010 and rose to more than $1,200 after the stock split in 2020. However, the stock has fallen over 16 percent in the last year as concerns about the US rate hike and geopolitical tension continue to worry investors.
US EV giant Tesla has launched a new cloud-based ‘Profiles’ feature, making it easier for drivers to switch between multiple versions of the company’s EVs frequently. The feature is being added to the Tesla vehicles with the latest over-the-air software update and will memorize vehicle settings. These will then be synchronized when the profile owner gets behind the wheel of another Tesla.
The technology is being introduced, bearing in mind the households that own multiple Tesla vehicles, businesses with multiple Tesla models on their fleets, and anyone renting one of the company’s EVs. For example, last year, rental company Hertz announced the purchase of 100,000 Teslas, starting with the Model 3, and later expanding the fleet to include the model Y SUV.
The Tesla profiles feature can synchronize various features such as mirrors, seat and steering wheel adjustments, autopilot, driving and climate control preferences, navigation, media, and data-sharing settings.
Other updates to Tesla vehicles along with the cloud-profile feature include the ability to choose the position of the blind-spot camera display, uninstall video games to free space on the EV’s hard drive, and disable Sentry Mode noises, among others, as reported by Electrek. The rear passenger climate controls can also be set to automatic.
On the other hand, Tesla drivers who have signed up for the company’s FSD (Full Self-Driving) Beta program are looking forward to getting access to their own software updates. The rollout for FSD beta 10.69 will involve many code changes, but Tesla has confirmed it will be available to everyone by the end of 2022. The carmaker is also increasing the price of the FSD package from $12,000 to $15,000 for any car purchased after September 5.
Instagram is a popular social media platform that doubles up as an effective marketing space for brands and businesses. Video advertising on Instagram has helped many small businesses and brands to grow and amplify their visibility. Instagram creates opportunities for businesses to reach out to their target audience and fulfill their marketing goals.
Instagram has over 1 billion active monthly accounts. It is a visual platform that attracts and engages the audience with aesthetic photos and well-curated videos. With new tools and in-built features, Instagram allows users to advertise their business through short and long-form video content. Most brands are flocking toward using Instagram video marketing to create higher engagement with customers.
Instagram Marketing and its Benefit for the Businesses
Videos are becoming increasingly popular as they visually represent a business. The Instagram algorithm is one of the promising reasons for businesses to adopt video marketing. The latest algorithm of Instagram supports video content more than a static image. Here are a few reasons to opt for video marketing on Instagram.
Increase brand awareness and visibility
Engagement on Instagram is on the higher side and is a determining factor for enhancing brand discovery. Instagram’s built-in tools help create videos and reels to attract viewers’ attention. The short-form reels relay information and educates or entertain the viewers with the content. Videos are visually appealing, which makes their views and visibility higher. Here are some videos on Instagram that make a brand more discoverable.
Videos show a glimpse of a product or new service while keeping the mystery element intact.
DIY videos or reels that concise the message or information in a few seconds
Tell an emotion-evoking story about the brand, real people, or sourcing
Record behind the scene like packaging, production, and how packages are shipped
Entertaining videos that are fun and make the audience happy
As per the Algorithm of Instagram, videos are optimized for higher reach. An effective way to leverage and improve brand awareness is to post videos with a catchy and creative thumbnail, use relevant hashtags, and add trending music.
Ease of creating videos for Instagram
There are various formats of video for uploading on Instagram. Each category of video has its relevance. With the in-built tools, it has become easy to trim and edit the video using the app. Online video editors have templates for creating Instagram-centric videos. The Instagram story makerallows you to choose from thousands of in-built templates and customize the video. Here are versatile forms of videos for uploading on Instagram.
Reels are short-form, vertical videos of up to 60 seconds. It is one of the most trending forms of video on Instagram, allowing brands to use their creativity and give the audience a visual experience.
Instagram ad videos are perfect for a highly targeted audience. It helps in promoting a business or brand at an affordable cost. Brands use story ads, reels ads, and in-feed post ads to maximize their reach.
Long videos are perfect for answering Q&A, product demos, or simply explaining a particular service or product. It is beneficial for spreading awareness and educating people about a brand.
Instagram stories create a sense of urgency as the stories disappear after 24 hours. It is perfect for showing behind-the-scenes, real-time work, etc., about a business.
Instagram Live is another form of video content that helps connect with the audience in real time. Instagram Live is a raw and authentic way of communicating with the audience. It is an excellent platform for organizing online events, live launches, and organize Q&A.
Create better customer engagement via videos
Instagram was primarily used as a static photo-sharing app, but gradually, it has grown with time to become a marketplace. Videos on Instagram are known to create better customer engagement, and a brand’s aesthetic videos on Instagram influence the buying decision for a brand. People constantly scroll through the Instagram feed, making it a solid platform for discovering businesses. Instagram as a platform is great for showcasing the brand through creative and informative video content.
The use of intriguing video content combined with an interesting caption helps grab people’s attention. Tagging people or brands on the Instagram video and resharing the video helps in reaching new prospective customers. Geotagging in the video is another way to multiply the reach of the business.
Make a stronger purchase decision
Most purchase decisions from online brands are fueled by online reviews and how well the product or service is presented. Video presentation provides a window to showcase the product or service interestingly and interactively. Instagram video ads allow brands to target potential buyers through their feeds. Customers prefer watching videos rather than reading content to make a purchase decision. Videos help in breaking down and explaining the features of a new product.
A powerful feature of the Instagram video is embedding a CTA (call-to-action). It is a powerful feature that redirects the customers to the land page or online shopping site. The CTAs are easy to add at the bottom of the video ads, redirecting the customers to shop for the product. As CTA redirects the customers, users spend more time browsing products and services, creating a sales funnel.
Increase the rate of conversion
Instagram videos are an excellent way of lead conversion, increase sales, and hence overall revenue stream for the business. Instagram video marketing is a subtle way of converting leads instead of making hard sales. Brands create fun and educational videos that generate people’s interest in the brand. Brand collaboration with an Instagram influencer is an excellent marketing strategy for increasing conversion rates.
Brands collaborate with influencers and create branded videos that help in increasing brand awareness and amplifying the reach. As influencers create videos and tag the brands, it reaches millions of people, increasing overall sales.
Create Targeted Advertising
Instagram allows video ads, a great way to advertise the brand to the target audience. Sponsored or targeted ads with interesting, creative content reach the right demographics, improving the overall sale. It is an affordable way to continue reaching the target buyers or prospective customers. The ads are perfect for customizing the demographics like age group, location, gender, etc.
Partner and Team up with Instagram Influencers
Influencer marketing is a new form of marketing that helps people grow their reach and improve their branding. Influencers are those who have thousands to millions of followers on social media. Instagram influencers work on either barter or paid marketing campaigns for promoting a particular brand. Influencers tag and promote the brand and market it in front of a large audience. It is indeed one of the fastest ways for brands to increase visibility. Work on video campaigns with influencers or ask for a shoutout in exchange for sending them free products to grow your brand.
Tips for Video Marketing Using Instagram
There are millions of videos uploaded on Instagram every single day. However, the following tips and tricks are required to increase the videos’ engagement rate. Creating a robust marketing strategy for Instagram videos is pivotal for connecting with the audience better. The changes in the Algorithm undoubtedly support video content and make it a valuable platform for brands. Here are some tips for creating impeccable video content for Instagram.
Vertical short-form content like reels is trending these days. So, create entertaining reels with trending music. Follow the latest trends for creating viral videos.
Upload Instagram videos to explain in depth a product or service. People scroll through Instagram, an excellent way to educate customers about a particular brand or product.
One of the efficient ways to make a video go viral is to use relevant hashtags with the videos. This makes the videos discoverable and helps make videos go viral.
A good way to redirect people to an online website or shopping site to increase sales is by adding CTA to the videos. A call-to-action button is a powerful way to turn the viewers into potential customers.
As a brand, always keep posting relevant Instagram stories. It helps create better engagement and reminds people of new products, services, or existing things. It acts as an incredible tool for interacting with the audience.
Preferably use an attractive thumbnail or image picture for the reels to grab the people’s attention.
Final Words
Instagram is one of the popular social media platforms with a higher engagement rate, billions of active users, and a great place for brands to connect with their target audience. Instagram marketing through videos has substantially grown small businesses into big ones. Many brands started their marketing and promotion on Instagram and became big household names. Videos are visually appealing, convey a story, influence purchase decisions, and drive organic traffic to the brand website.
Instagram videos in all forms, like reels, Instagram videos, Live videos, Stories, etc., are backed and supported by the latest Algorithm of Instagram. It is a great platform for creating and sharing innovative, entertaining, engaging, and informative content. The blog summarizes tips and benefits of adopting video marketing via Instagram.
While the word ‘software development’ conjures up images of creating a program, it also refers to a broader notion. It defines the process of developing and distributing software applications. Developing these apps may be as easy as writing a few lines of code, or it could take hundreds of hours, resulting in a well-functioning and dependable application as an end-product. a well-functioning and dependable application.
How does one evaluate software development?
The process of benchmarking is similar to comparing insurance rates. The data must be normalized, and the data must be measured formally. Similarly, evaluating software development is difficult, especially in a competitive environment.
The software development method is already regarded as a new standard in several sectors. In these circumstances, the software is created by assembling specified components. Using these components enables developers to easily design new apps without worrying about the intricacy of their code. The phrase ‘software framework’ may also refer to reusable design and implementation. Other techniques to construct software using components include service-oriented architectures and programming. The phrase ‘software product line’ refers to developing a single product line based on a shared core asset. These applications include various properties that make them suitable for various sectors.
Software is now utilized everywhere, having moved from desktop computers to mobile devices. The Internet of Things (IoT) has grown wider and is now omnipresent. Many ‘things’ in the Internet of Things incorporate logic, which raises the danger of failure. In safety-critical areas, IoT devices are employed. Companies that use these technologies may learn from their success and implement the most delicate organizational structures.
What Is The Definition Of Software Performance Benchmarking?
It assesses software performance under certain workload circumstances. You may, for example, compare the performance of two apps or systems and use this information to evaluate which application or system performs better. Benchmarking is often done without defining objectives and only creates a baseline for comparison. In other words, you don’t want to add any parameters that could impair the performance of your application.
What Does Creating A Benchmark In Software Development Necessitate?
Creating a benchmark for your software development project necessitates a defined methodology. It would be best if you took the time to standardize data and evaluate the domain and sector you are operating. In other words, you must test and compare your product to other comparable ones. It is how you can guarantee that your software is on par with the competition. Furthermore, you may utilize stress testing to identify bottlenecks in your program.
A benchmark is an assessment of the quality and expense of software.
Using benchmarks can assist you in determining where your project sits compared to the industry and other comparable initiatives.
In addition, you may analyze the quality of your program using a standard or customized benchmarking test.
When developing a benchmark, ensure that it is repeatable and quantitative.
A benchmark is a baseline against which you may compare other initiatives. It is particularly true with software. A benchmark is a standard that allows you to assess and evaluate the performance of different software applications. Make a benchmark that signifies both your aim and the goals of your project. Your chosen benchmark should reflect this purpose when you’re creating a product.
Performance Benchmarking for Software Comes in Many Sorts
Different forms of benchmarking are used for various goals. They may be used to assess which program or system is doing the best. You may also compare them to a benchmark to see how they compare. It may provide you with vital data that you can utilize to enhance your software or systems. Setting performance objectives is also beneficial.
What about benchmarking, though? The following are the things to look out for:
Load Benchmarking: Using Load Benchmarking to measure the performance of your web application is a great way to find bottlenecks and improve your overall website performance. This process measures response times, throughput rates, and CPU utilization levels. It can also help you identify the maximum load that your system can handle and allow you to optimize your site to run faster. It is crucial to understand how the results will improve your web application.
Stress Benchmarking: There are two types of Stress Benchmarking, one for memory and another for CPU. Memory and CPU benchmarking are based on tests run on one computer—the same tests the overall performance of a CPU while assessing the reliability of a server. You can run the stress test on several computers simultaneously to ensure high accuracy.
Endurance Benchmarking: The goal of endurance benchmarking is to create a realistic simulation of how a system will perform under prolonged, high-load conditions. While it is not necessary to beat other competitors, setting realistic expectations for your performance is essential. This way, you can refocus your motivation and keep training at the right level. It’s time to start if you haven’t done so in a while.
Spike Benchmarking: The basic idea behind spike benchmarking is to test the performance of a system when suddenly there are drastic changes in loads. The resulting results are then compared to those of a similar approach. This kind of testing is similar to stress benchmarking, but it focuses on a system’s limit instead of finding leaks in the system. It is an increasingly popular technique, becoming more useful for developers and companies.
Breakpoint Benchmarking: Breakpoint Benchmarking can be a game-changing experience when it comes to performance. This new benchmarking method looks at how far a system can be pushed before it breaks. For example, in a breakpoint test, you’ll see how long it takes a specific game to start. It also allows you to see how long it takes for a particular game to start, which is helpful when trying to find a suitable game to buy.
Bottom-line
If you’d like to learn software engineering, a great way to get started is to take free courses online from Great Learning Academy. You can also take up professional courses such as this Software Engineering Course from Great Learning teaches the essentials and the most current practices. Students will learn the basic concepts and then move to more advanced courses, including cloud computing, mobile development, and Python. These courses can help students land a new job or start a new career.
Last year, researchers published a paper on the privacy risks posed by deep reinforcement learning systems. The researchers have suggested a framework for evaluating the susceptibility to membership inference attacks (MIA) of reinforcement learning models.
Internet services like search engines, voice assistants, natural language translation, SEO-based ads, etc., are backed by machine learning. Marketing companies leverage machine learning to enhance marketing and advertising, suggest products and solutions catered to customers’ personal interests, or understand customer feedback and data from their activities. In each of these instances, training data is derived from the behaviors of individual people, including their preferences and purchases, health information, online and offline transactions, images they take, search history, voice commands they give, and locations they visit. Irrespective of the format of the training data – textual, audio, media, or tabular data – every machine learning model starts with random parameter values that are progressively tuned later to map input (training data) with the expected output. In other words, to get its output confidence score as near to the labels of the training pictures as possible, the machine learning model gradually adjusts its parameters throughout training.
During training, all machine learning models undergo a similar procedure regardless of the kind of algorithm you use. Most of the time, post-training the model can map fresh and unknown instances to categories or value predictions using the tuned parameters instead of relying on the training dataset.
In addition to classifying its training data, a successful machine learning model can generalize its skills to situations it has never encountered before. Scientists can accomplish this mission with the appropriate architecture and proper training data. However, machine learning models generally do better when using the data they were trained on.
Membership inference attacks exploit this capability to uncover or reconstruct the instances used to train the machine learning model. For the individuals whose data records were utilized for training the model, this can have ramifications for user privacy.
The membership inference attack is the process that allows an attacker to query a trained machine learning model to anticipate whether or not a certain sample or instance was in the model’s training dataset. With the increasing number of machine learning models, their susceptibility to membership inference attacks can directly result in a privacy violation, particularly reinforcement learning, when samples are related to a person, such as medical or financial data. For example, by identifying a clinical study record that has been used to train a model linked with a certain disease, an attacker might conclude that the clinical record’s owner is likely to have the condition.
Besides that, these attacks on vulnerable machine learning services could be used for discriminatory practices. For instance, in the decision-making processes, such as hiring, awarding rights, and financial aid, attackers can use user data to manipulate the model outcome fairness. In recent years, membership inference attacks have been proven to be successful against a variety of machine learning models, including generative and classification models. Now membership inference attacks have taken another branch of machine learning algorithms as its victim: reinforcement learning.
It is important to note that the attacker need not be aware of the underlying reinforcement learning parameters of the target machine learning model in order to launch a membership inference attack. The only information the attacker has is the model’s architecture and algorithm or the name of the service that designed the model.
Reinforcement learning is a type of machine learning that has grown in prominence in recent years. This approach allows an AI agent to learn in an interactive environment through trial and error, utilizing input from its own actions and experiences. Contrary to supervised learning, where the feedback given to the agent is the proper course of action to take in order to complete a task, reinforcement learning employs rewards and penalties as cues for desirable and undesirable behavior. Therefore, the objective of reinforcement learning is to determine a suitable action plan that would maximize the overall cumulative reward of the agent.
Deep learning is another machine learning algorithm that is based on artificial neural networks, which enables models with multiple processing layers to learn data representations with different degrees of abstraction. When you pair the decision-making quality of reinforcement learning with large data processing and pattern recognition features of deep learning, you get an even more powerful algorithm called deep reinforcement learning.
Even though deep reinforcement learning has witnessed tremendous research milestones, the possibility of privacy invasions has recently come to light as a key obstacle to its widespread commercial use. There has not been much research about the susceptibility of deep reinforcement learning systems to membership inference assaults till the latest paper.
In their paper, the researchers acknowledge, “There has been no study on the potential membership leakage of the data directly employed in training deep reinforcement learning (deep reinforcement learning) agents.” However, they believe that this scarcity of study is due in part to the restricted use of reinforcement learning in the actual world of reinforcement learning.
The study’s findings demonstrate that attackers can mount successful assaults on deep reinforcement learning systems and potentially obtain private data needed to train the models. These insights are important because industrial uses for deep reinforcement learning are starting to go mainstream.
Researchers explain that deep reinforcement learning models pass through episodes in the course of training, each of which is made up of a trajectory or series of actions and variables. As a result, a successful membership inference attack method for reinforcement learning must get familiar with the data points and training trajectory. This makes it far more difficult to implement membership inference algorithms against reinforcement learning systems while also making it challenging to evaluate how secure the models are against such attacks.
Due to the sequential and temporally correlated nature of the data points utilized in the training process, the study notes membership inference attack is more challenging in deep reinforcement learning than in other forms of machine learning algorithms. In contrast to other learning methodologies, the many-to-many interactions between the training and prediction data sets are fundamentally different.
The researchers focused their study on off-policy reinforcement learning algorithms, which separate the data acquisition and model training processes. Off-policy reinforcement learning allows the reinforcement learning agent to investigate several input trajectories from the same set of data while using “replay buffers” to decorrelate input trajectories.
In many real-world deep reinforcement learning applications, when training data is already available and is given to the machine learning team building the reinforcement learning model, off-policy reinforcement learning is very important. The development of membership inference attack models also requires off-policy reinforcement learning.
The researchers argue that genuine off-policy reinforcement learning models separate exploration and exploitation phases. Therefore, according to the authors, the target policy has no impact on training trajectories. This configuration is especially recommended for developing membership inference attack frameworks in a black-box situation, where the adversary is unaware of the internal workings of the target model or the exploration policy used to gather the training trajectories.
The attacker can only view the behavior of the trained deep reinforcement learning model in black-box membership inference attacks. In this situation, the attacker expects that the target model has been trained on trajectories produced from a private collection of data, as is the case with the off-policy reinforcement learning model.
To overcome the constraint of the black box, the attacker trains multiple alternative models that are identical to the target model, known as shadow models. Shadow models can be perceived as replicas of the target model, with identical architecture and hyperparameters. Since the target model does not have any explicit requirements, shadow models may differ from it if the attacker is unaware of all of its details.
After training, the shadow model can distinguish between data points from the target machine learning model’s training set and new information that it hasn’t seen before. Next, the attacker can develop training data for the attack models (the model that will predict whether a sample is from the training set or not). The inputs for the attack models are the confidence levels and the “in” or “out” label for samples.
It might be challenging to develop shadow models for deep reinforcement learning agents since the target model is trained sequentially. Therefore, researchers accomplished this stage in multiple phases.
First, they give the reinforcement learning model trainer a fresh batch of public data trajectories and watch the trajectories the target model produces. An attack trainer uses the input and output trajectories to train a machine learning classifier to recognize input trajectories that were utilized during the training of the target reinforcement learning model. The classifier is then given additional trajectory data, which it categorizes as training members or novel data samples.
The researchers used “batch-constrained deep Q learning” (BCQ), a cutting-edge off-policy reinforcement learning method that has demonstrated outstanding performance in control tasks, for their investigation. However, they claim that other off-policy reinforcement learning models could also be targeted using their membership inference attack method.
The team experimented with a variety of trajectory lengths, single versus multiple trajectories, and correlated versus decorrelated trajectories while evaluating their membership inference attacks. They discovered that their proposed attack framework successfully predicts the reinforcement learning model training data points. The results show that using deep reinforcement learning entails significant privacy implications.
According to their findings, attacks with multiple trajectories are more effective than those with just one. In addition, attack accuracy rises as trajectories get longer and become more connected to one another.
Aside from the temporal correlations recorded by the trained policy’s characteristics, considering the enhanced performance of membership inference attacks collective mode performance, the adversary could also take advantage of the cross-correlation between the training trajectories of the target policy.
The researchers note that this inherently means that an attacker needs a more sophisticated learning architecture and hyper-parameter tuning to avail use of the cross-correlation between training trajectories and the temporal correlation within a trajectory.
The Telangana AI Mission (T-AIM) has launched the Mobility AI Grand Challenge, powered by NASSCOM and Capgemini. The initiative aims to enhance and promote AI-driven innovation. GHMC will identify and classify the severity of potholes across roads in Hyderabad via live video feeds.
TiHAN, India’s 1st autonomous navigation platform at IIT Hyderabad, is also partnering with the Mobility Challenge to provide intellectual support and guidance. The aim is to promote innovation and viability in technological solutions that use artificial intelligence and enhance their applicability to real-world problems.
The challenge is open for innovators across the country. Registered people will be expected to present an approach note stating the techniques and results they plan to offer. Shortlisted candidates will have four weeks to develop a Proof of Concept. The winning innovator will be awarded INR20 lakhs to implement a pilot project with GHMC.
GHMC officials plan to incorporate live, and archive video skimming and analysis using AI and receive additional insights to work on targeted repair requirements. Jayesh Ranjan, Principal Secretary of GHMC, said, “governments and innovators should increasingly collaborate to solve social problems through open innovation.”
Anurag Pratap, VP at Capgemini India, said that with T-AIM, the company would leverage an innovative “ecosystem to advocate and support tech-enabled transformative solutions” that will make a difference in people’s daily lives.
Google has launched AI Test Kitchen, an application that allows users to test experimental AI-powered systems from the labs of the company before they make their way into production. Starting today, parties interested can fill out a sign-up form as AI Test Kitchen gradually becomes available to small groups in the US.
As announced at the I/O developer conference of Google earlier this year, AI Test Kitchen will serve rotating demos centered around new, cutting-edge AI technologies, all from within Google. The company stresses that these products aren’t finished products yet. However, they are intended to give a taste of Google’s innovations while offering the company an opportunity to study how they are used.
The first demos in AI Test Kitchen deal with the capabilities of the latest version of Google’s language model, Language Model for Dialogue Applications (LaMDA), that queries the web to respond to questions like a human. For example, one can name a place and have LaMDA offer routes or share a goal to ask LaMDA to break it down into a list of subtasks.
Google says it has added multiple layers of protection to AI Test Kitchen in order to minimize the risks like biases and toxic outputs around systems like LaMDA. As shown most recently by Meta’s BlenderBot 3.0, even the most advanced chatbots today can quickly go out of control, delving into offensive content and conspiracy theories when prompted with certainty text.
Google says that the systems within AI Test Kitchen will automatically detect and filter out objectionable content that might be sexually explicit, hateful, offensive, or divulge personal information. But the company warns that the offensive text might occasionally make it through.