Conduct research on security and privacy issues

Assignment Help Computer Engineering
Reference no: EM133643437

Cryptography

Project

There are three options for the class project, each described below. You can pick either one which may beinterested to you. The project can be a research paper, a case study, a simulation, or an implementation.In either case, you are required to write a report about it. You may team up with other partners, if you choose to, in doing your projects. Naturally, a lot more will be expected from such collaborative projects!

The project deliverables are listed below:
• Project middle report: The middle report should include a title and team members if you choose to work as a group. The middle report should also identify the project scope, the research questions you plan to work on, and preliminary ideas about how you are going to address the research questions.
• Project Final report and other documents: The final project report should be a comprehensive report including everything. The final project report has 15 points in the final grade.
• Final project presentation: everyone needs to prepare 10-15 slides for presenting their final project.
The project will be evaluated based on the following criteria:
• Originality and novelty
• Technical depth and soundness
• Presentation quality
The adoption of AIisrising. AI has changed the ways we explore science and conduct businesses:
• AlphaGo is the first computer program to defeat a professional human Go player, the first to defeat a Go world champion, and is arguably the strongest Go player in history.
• Google's DeepMind releases structure of every known protein.
• ChatGPT passes exams from law and business schools.
• Reinventing search with a new AI-powered Microsoft Bing and Edge, your copilot for the web.
However, many threats and attacks have also been reported targetingmachine learning algorithms. For example,
• One pixel attack for fooling deep neural networks (J. Su, D. V. Vargas and K. Sakurai, "One Pixel Attack for Fooling Deep Neural Networks," in IEEE Transactions on Evolutionary Computation, vol. 23, no. 5, pp. 828-841, Oct. 2019, doi: 10.1109/TEVC.2019.2890858.)

As we expect AI continues to change businesses, consumers, and the economy, we would also like to investigate AI related cybersecurity issues.

Large Language Model (LLM)Security
In this project, you will conduct research on security and privacy issues related to LLM. Examples of LLMs include GPT, Llama, and BERT. If you choose this option, you can explore any LLM-related security and privacy issues. The topics include, but are not limited to:
• LLM for offensive security
• LLM for defensive security
• LLM for risk management
• LLM for compliance and auditing
• Threats and attacks in LLM
• Threat modeling in LLM
• An in-depth study of an attack on LLM
• A case study of a cyber-attack on LLM
• Security remediation, e.g., defensive mechanism, in LLM
• Risk assessment in LLM
• Survey of cybersecurity in LLM
Project deliverables:
• Project middle report
• Project final report
• Project presentation slides
• Other related project documents
Project Middle Report Format
• 12-point standard font
• Single column
• Double spacing
• 3-5 pages (citation pages do not count)
Project Final Report Format
• 12-point standard font
• Single column
• Double spacing
• An extension of the middle report
• 10 pagesminimum (title and citation pages do not count): project final report is a complete report of your class project. Project final report can be extended from your middle report.

Note: you are welcome to use IEEE Manuscript Template for your final report. This is a good opportunity to practice academic writing and it may lead to publications too.

Reference no: EM133643437

Questions Cloud

What about marks such as the atlanta braves or florida state : What about marks such as the Atlanta Braves or Florida State Seminoles? Does it matter whether a Native American tribe gave its permission to use the name?
How can you use the retake your pen concept to help : Emotions are part of negotiations. How can you use the Retake Your Pen concept to help match frames and open communication in a negotiation?
What managerial and organisational changes they must make : What managerial and organisational changes they must make to significantly improve their performance and also advise your Client how to best implement
Provide a brief description of your project : Provide a brief description of your project. Do some research and explain if Six Sigma or another tool would be the best for your project.
Conduct research on security and privacy issues : INFA 723 Cryptography, Dakota State University - Conduct research on security and privacy issues related to LLM. Examples of LLMs include GPT, Llama, and BERT
Prepare an effective plan overview : A high-level outline of your implementation plan, including costs, impact on operations, ROI projections, competitive advantage, and risks associated
How can toyota improve the safety and reliability : What measures can be taken by automakers to prevent similar incidents of unintended acceleration in the future - How can Toyota improve the safety
Examine literary texts in order to understand their message : ENGL-1302 Composition, North Central Texas College - Literary analysis is an argument in which you argue that your interpretation of the text is valid
How you determine which design and source of data best align : Consider two different qualitative data analysis approaches. How do you determine which design and source of data best align with each analysis approach?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd