Mapping Defense Investment in AI – CSET
Earlier this summer, I was asked to review an additional publication recently released by Georgetown’s Center for Security and Emerging Technology (CSET). Th...
Earlier this summer, I was asked to review an additional publication recently released by Georgetown’s Center for Security and Emerging Technology (CSET). Th...
In two recently published blog posts, my colleague Michael Lomnitz and I discuss IQTLabs’s work in FaceBook’s DeepFake Detection Challenge (DFDC).
My colleague John Speed Meyers and I published a short thought-piece in DefenseOne! Here, we set some realistic expectations for how artificial intelligence...
Earlier this summer, I was asked to review a publication recently released by Georgetown’s Center for Security and Emerging Technology (CSET). The paper goes...
Introduction Scientists of all disciplines make observations that are subject to the finite resolutions and biases of their detectors. In the case that the r...
A variety of data sets are comprised of samples that share some sort of relationships amongst each other. However, it’s quite possible that all the samples a...
I recently gave an machine learning workshop for my astroparticle group at the IIHE in Brussels. The main goal was to provide an introductory lecture on the ...