Hamza

1,394 Flips | 12 Magazines | 17 Likes | 2 Following | 501 Followers | @hamzaharkous | Keep up with Hamza on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Hamza”

Polisis

Polisis - AI that reads privacy policies so that you don't have to!. (Privacy, Artificial Intelligence, and Tech) Read the opinion of 14 influencers. …

We Gave Privacy Policies an AI Overhaul, and You’ll Never Have to Read Them Again!

<b>Summary:</b> <i>This is the backstory of how we built</i> <i>pribot.org</i><i>. There is a</i> <i>Wired article</i> <i>about the project already. This article provides our story of what</i> …

Research Background

This service is based on the paper:<p>What is Polisis?<p>Polisis is a unique way of visualizing privacy policies. Using deep learning, it allows you to …

Privacy

An AI That Reads Privacy Policies So That You Don't Have To

You don't read privacy policies. And of course, that's because they're not actually written for you, or any of the other billions of people who click …

We know you don't really read privacy policies. This AI can do it for you.

Visualized Summaries<p>“I have read and understood…” has got to be one of the biggest lies people commit on a regular basis. It’s the typical ending for …

Hackers Can Rickroll Thousands of Sonos and Bose Speakers Over the Internet

Perhaps you've been hearing strange sounds in your home—ghostly creaks and moans, random Rick Astley tunes, Alexa commands issued in someone else's …

A Guide to Scaling Machine Learning Models in Production

The workflow for building machine learning models often ends at the evaluation stage: you have achieved an acceptable accuracy, and “<i>ta-da!</i> <i>Mission</i> …

Structured Deep Learning

• Fast<br>• No Domain Knowledge Requiring<br>• High Performing<p>This blog will mainly focus on a not very widely known application area of deep learning, structured …

What to Do if You’re Being Doxed

There are few more toxic practices online than doxing, the distribution of someone's personal information across the internet against their will. …

The impossibility of intelligence explosion

In 1965, I. J. Good described for the first time the notion of “intelligence explosion”, as it relates to artificial intelligence (AI):<p>Let an …

The Popular Design Tool That’s Actually A Privacy Nightmare

Session replay scripts record how you browse, scroll, and do just about everything else online.<p>There’s a lot going on in the background when you visit most websites. Scripts may be providing analytical data about what you click on. Trackers may link your activity back to your social media accounts. …

How to Encrypt All of the Things

Cryptography was once the realm of academics, intelligence services, and a few cypherpunk hobbyists who sought to break the monopoly on that science …

Artificial Intelligence Seeks An Ethical Conscience

Leading artificial-intelligence researchers gathered this week for the prestigious Neural Information Processing Systems conference have a new topic …

Artificial Intelligence

Smartphone Security 101: The Steps That Matter Most

Hackers can threaten your smartphone in lots of ways, and if you want (or need) to lock it down completely, ironclad protection gets a little …

The Grand Tor: How to Go Anonymous Online

Fifteen years have passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or Tor, a wild experiment in …

The Most Secure Account of All—If You Can Stand It

There was a time when high-status people signaled their worth with an ostentatious key fob for an expensive car. Today the keyring of an important …

You are leaving Pocket

You are being redirected to an external site that Pocket does not control. The url may not be safe to visit, so please be careful. If you trust link, …

Word embeddings: how to transform text into numbers

In Natural Language Processing we want to make computer programs that understand, generate and, more generally speaking, work with human languages. …

How Email Open Tracking Quietly Took Over the Web

"I just came across this email," began the message, a long overdue reply. But I knew the sender was lying. He’d opened my email nearly six months …

Deep Learning for Natural Language Processing (NLP): Advancements & Trends

Sentiment analysis in Twitter has drawn a lot of attention from researchers in NLP, but also in political and social sciences. That is why since …

Even Imperfect Algorithms Can Improve the Criminal Justice System

In courtrooms across the country, judges turn to computer algorithms when deciding whether defendants awaiting trial must pay bail or can be released without payment. The increasing use of such algorithms has prompted warnings about the dangers of artificial intelligence. But research shows that …

The Great AI Paradox - MIT Technology Review

You’ve probably heard versions of each of the following ideas.<p>1. With computers becoming remarkably adept at driving, understanding speech, and other …

Artificial Intelligence

The data that transformed AI research—and possibly the world

In 2006, Fei-Fei Li started ruminating on an idea.<p>Li, a newly-minted computer science professor at University of Illinois Urbana-Champaign, saw her colleagues across academia and the AI industry hammering away at the same concept: a better algorithm would make better decisions, regardless of the …

Deep Learning

Five Trends for Voice Assistants in 2018

<i>It’s going to be an interesting year…</i><p>Since we’ve reached the end of one year, and the beginning of another, it seems like a good time to take a …

Why We Should Be Worried About Tiny Robot Spies

DARPA has been trying to develop tiny spy drones for years. Once perfected, they will be a powerful new weapon against groups like ISIS, but they'll …

Governments may be able to start tracking immigrant flows through Google searches

The continuing gush of refugees from troubled areas around the world has been catching governments around the world by surprise.<p>In 2014, US immigration authorities were overcome by a wave of Central Americans immigrants, many of them women and children fleeing violence and poverty at home. Farther …

Google Trends

Computer printers have been quietly embedding tracking codes in documents for decades

In 2004, when color printers were still somewhat novel, PCWorld magazine published an article headlined: “Government Uses Color Laser Printer Technology to Track Documents.”<p>It was one of the first news reports on a quiet practice that had been going on for 20 years. It revealed that color printers …