The surprising creativity of digital evolution: A collection of anecdotes from the evolutionary computation and artificial life research communities Lehman et al., arXiv 2018 Today’s paper choice could make you the life and soul of the party with a rich supply of anecdotes from the field of evolutionary computation. I hope you get to go … Continue reading The surprising creativity of digital evolution
Month: March 2018
Adversarial patch
Adversarial patch Brown, Mané et al., arXiv 2017 Today’s paper choice is short and sweet, but thought provoking nonetheless. To a man with a hammer (sticker), everything looks like a hammer. We’ve seen a number of examples of adversarial attacks on image recognition systems, where the perturbations are designed to be subtle and hard to … Continue reading Adversarial patch
Deep learning scaling is predictable, empirically
Deep learning scaling is predictable, empirically Hestness et al., arXiv, Dec.2017 With thanks to Nathan Benaich for highlighting this paper in his excellent summary of the AI world in 1Q18 This is a really wonderful study with far-reaching implications that could even impact company strategies in some cases. It starts with a simple question: "how … Continue reading Deep learning scaling is predictable, empirically
Anna: A KVS for any scale
Anna: A KVS for any scale Wu et al., ICDE'18 This work comes out of the RISE project at Berkeley, and regular readers of The Morning Paper will be familiar with much of the background. Here’s how Joe Hellerstein puts it in his blog post introducing the work: As researchers, we asked the counter-cultural question: … Continue reading Anna: A KVS for any scale
Information flow reveals prediction limits in online social activity
Information flow reveals prediction limits in online social activity Bagrow et al., arVix 2017 If I know your friends, then I know a lot about you! Suppose you don’t personally use a given app/service, and so the provider doesn’t have data on you directly. However, many of your friends do use the app/service, and there’s … Continue reading Information flow reveals prediction limits in online social activity
Tracking ransomware end-to-end
Tracking ransomware end-to-end Huang et al., IEEE Security & Privacy 2018 With thanks to Elie Bursztein for bringing this paper to my attention. You get two for the price of one with today’s paper! Firstly, it’s a fascinating insight into the ransomware business and how it operates, with data gathered over a period of two … Continue reading Tracking ransomware end-to-end
Three years of the Right To Be Forgotten
Three years of the Right To Be Forgotten Bertram et al., 2018 With thanks to Elie Bursztein for bringing this paper to my attention. See also Elie’s blog post ‘Insights about the first three years of the Right To Be Forgotten requests at Google.’ Following on from the GDPR we looked at yesterday, and which … Continue reading Three years of the Right To Be Forgotten
On purpose and by necessity: compliance under the GDPR
On purpose and by necessity: compliance under the GDPR Basin et al., FC'18 A year ago it seemed like hardly anyone in a technical role had heard of GDPR. Now it seems to be front of mind for everyone! Not surprising perhaps, as it comes into force on the 25th May this year. In today’s … Continue reading On purpose and by necessity: compliance under the GDPR
Designing secure Ethereum smart contracts: a finite state machine approach
Designing secure Ethereum smart contracts: a finite state machine based approach Mavridou & Laszka, FC’18 You could be forgiven for thinking I’m down on smart contracts, but I actually think they’re a very exciting development that opens up a whole new world of possibilities. That’s why I’m so keen to see better ways of developing … Continue reading Designing secure Ethereum smart contracts: a finite state machine approach
A quantitive analysis of the impact of arbitrary blockchain content on Bitcoin
A quantitative analysis of the impact of arbitrary blockchain content on Bitcoin Matzutt et al., FC’18 We’re leaving NDSS behind us now, and starting this week with a selection of papers from FC’18. First up is a really interesting analysis of what’s in the Bitcoin blockchain. But this isn’t your typical analysis of transactions, addresses, … Continue reading A quantitive analysis of the impact of arbitrary blockchain content on Bitcoin