Conduct research on security and privacy issues

Assignment Help Computer Engineering
Reference no: EM133643437

Cryptography

Project

There are three options for the class project, each described below. You can pick either one which may beinterested to you. The project can be a research paper, a case study, a simulation, or an implementation.In either case, you are required to write a report about it. You may team up with other partners, if you choose to, in doing your projects. Naturally, a lot more will be expected from such collaborative projects!

The project deliverables are listed below:
• Project middle report: The middle report should include a title and team members if you choose to work as a group. The middle report should also identify the project scope, the research questions you plan to work on, and preliminary ideas about how you are going to address the research questions.
• Project Final report and other documents: The final project report should be a comprehensive report including everything. The final project report has 15 points in the final grade.
• Final project presentation: everyone needs to prepare 10-15 slides for presenting their final project.
The project will be evaluated based on the following criteria:
• Originality and novelty
• Technical depth and soundness
• Presentation quality
The adoption of AIisrising. AI has changed the ways we explore science and conduct businesses:
• AlphaGo is the first computer program to defeat a professional human Go player, the first to defeat a Go world champion, and is arguably the strongest Go player in history.
• Google's DeepMind releases structure of every known protein.
• ChatGPT passes exams from law and business schools.
• Reinventing search with a new AI-powered Microsoft Bing and Edge, your copilot for the web.
However, many threats and attacks have also been reported targetingmachine learning algorithms. For example,
• One pixel attack for fooling deep neural networks (J. Su, D. V. Vargas and K. Sakurai, "One Pixel Attack for Fooling Deep Neural Networks," in IEEE Transactions on Evolutionary Computation, vol. 23, no. 5, pp. 828-841, Oct. 2019, doi: 10.1109/TEVC.2019.2890858.)

As we expect AI continues to change businesses, consumers, and the economy, we would also like to investigate AI related cybersecurity issues.

Large Language Model (LLM)Security
In this project, you will conduct research on security and privacy issues related to LLM. Examples of LLMs include GPT, Llama, and BERT. If you choose this option, you can explore any LLM-related security and privacy issues. The topics include, but are not limited to:
• LLM for offensive security
• LLM for defensive security
• LLM for risk management
• LLM for compliance and auditing
• Threats and attacks in LLM
• Threat modeling in LLM
• An in-depth study of an attack on LLM
• A case study of a cyber-attack on LLM
• Security remediation, e.g., defensive mechanism, in LLM
• Risk assessment in LLM
• Survey of cybersecurity in LLM
Project deliverables:
• Project middle report
• Project final report
• Project presentation slides
• Other related project documents
Project Middle Report Format
• 12-point standard font
• Single column
• Double spacing
• 3-5 pages (citation pages do not count)
Project Final Report Format
• 12-point standard font
• Single column
• Double spacing
• An extension of the middle report
• 10 pagesminimum (title and citation pages do not count): project final report is a complete report of your class project. Project final report can be extended from your middle report.

Note: you are welcome to use IEEE Manuscript Template for your final report. This is a good opportunity to practice academic writing and it may lead to publications too.

Reference no: EM133643437

Questions Cloud

What about marks such as the atlanta braves or florida state : What about marks such as the Atlanta Braves or Florida State Seminoles? Does it matter whether a Native American tribe gave its permission to use the name?
How can you use the retake your pen concept to help : Emotions are part of negotiations. How can you use the Retake Your Pen concept to help match frames and open communication in a negotiation?
What managerial and organisational changes they must make : What managerial and organisational changes they must make to significantly improve their performance and also advise your Client how to best implement
Provide a brief description of your project : Provide a brief description of your project. Do some research and explain if Six Sigma or another tool would be the best for your project.
Conduct research on security and privacy issues : INFA 723 Cryptography, Dakota State University - Conduct research on security and privacy issues related to LLM. Examples of LLMs include GPT, Llama, and BERT
Prepare an effective plan overview : A high-level outline of your implementation plan, including costs, impact on operations, ROI projections, competitive advantage, and risks associated
How can toyota improve the safety and reliability : What measures can be taken by automakers to prevent similar incidents of unintended acceleration in the future - How can Toyota improve the safety
Examine literary texts in order to understand their message : ENGL-1302 Composition, North Central Texas College - Literary analysis is an argument in which you argue that your interpretation of the text is valid
How you determine which design and source of data best align : Consider two different qualitative data analysis approaches. How do you determine which design and source of data best align with each analysis approach?

Reviews

Write a Review

Computer Engineering Questions & Answers

  The calling statement should then print out

Using conditional operator and the cal_days_in_month (CAL_GREGORIAN, int month, int year) function, find out  the number of days in the current month and output to the browser whether it is a normal month or a leap month (29 days).

  Find the mean of all values of an integer array

Write a simple ARM assembly language program that finds the mean (as an integer) of all values of an integer array.

  Discuss ethernet frame

Discuss Ethernet frame. Why are the frame lengths limited to 64 to 1518 bytes? Include at least two citations. Please remember to include page numbers

  Write a program that uses the class die of example

Suppose you roll a set of n dice. then the smallest sum is n and the largest is 6n. example if n=10 then the small sum will be 6 and the largest 60.

  Draw the high-level architecture for a fully centralized

Draw the high-level architecture for a fully centralized enterprise data warehouse (EDW) to support the analytical needs of the entire company. (Helpful hint

  Develop a checklist for technical and other aspects involved

Develop a checklist for the technical and other aspects involved in the selection process, and define what special considerations must you consider when introdu

  Write a python program which is trying to open a file

Write a Python program which is trying to open a file. Consider the case that the opening of the file fails because of various reasons

  What is the overall speedup using amdahls law

The improvement is applicable only to a fraction 35% of the program and the speedup of the improved fraction is 15.

  What is a work breakdown structure

What is  a work breakdown structure

  What problem may occur and what can be done about system

Consider a system that does client caching using the write-through algorithm. What problem may occur, and what can be done about it?

  Develop a detailed plan to secure the incident scene

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario.

  How much better can you do with the extra actions

How much better can you do with extra actions? Can you do even better by including a ninth action that causes no movement at all other than that caused by wind?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd