当前位置:网站首页>Little p weekly Vol.10
Little p weekly Vol.10
2022-06-26 02:43:00 【SenseParrots】

Small P Send you information worth seeing this week ~
Comments 、 Suggestion and roast , Welcome to Xiao P Leave a message ~
Click the link to open the corresponding web page .
Academic frontier
Microsoft has restricted the use of facial recognition tools in the ethical reform of artificial intelligence
Microsoft is overhauling its AI ethics policy , And said it would no longer allow other companies to use their facial recognition technology to infer emotions 、 Sex or age .
As its new “ Responsible AI standards ” (Responsible AI principles from Microsoft) Part of , Microsoft says it intends to “ People and their goals are at the center of system design decisions ”. The company said , These high-level principles will bring real changes to practice , They will adjust some functions , At the same time, other functions will not be sold .
for example , Microsoft Azure Face Service is a facial recognition tool , By Uber As part of their authentication process . Now? , Any company that wants to use the facial recognition feature of the service needs to actively apply for it , Including companies that have built it into their products , To prove that they meet Microsoft's artificial intelligence ethical standards , And prove that these functions are beneficial to the end users and the society .
Microsoft said , Even companies that have been granted permission will no longer be able to use Azure Face Some of the more controversial features of , They will remove facial analysis techniques that claim to infer attributes such as emotional state and gender or age .
Microsoft has not completely abandoned emotion recognition —— The company will still use it internally , For example Seeing AI Such accessibility tools . The tool will use voice to broadcast the world around the visually impaired users .
Again , Microsoft has also restricted the use of its custom neurovoice technology , This technology allows the creation of synthetic sounds that sound almost the same as the original source . Earlier this year , Microsoft began to watermark its synthetic voice , Add subtle... To the output 、 An inaudible wave , This means that Microsoft can know that a recording is made with its technology .

DeepMind: Through large-scale interpretation of high accuracy differential image classification
Differential privacy (Differential Privacy) Is a mechanism to protect user data privacy , Prevent people who can access the machine learning model from extracting the information of a single training point . Differential privacy random gradient descent method (DP-SGD) It is the most popular in deep learning DP Training methods , This kind of information protection is realized by injecting noise into training .
However, previous work has found that ,DP-SGD It often leads to the performance of standard image classification benchmarks being greatly degraded . Besides , Some authors speculate that ,DP-SGD The performance on the large model is poor , Because the noise criterion required to protect privacy is proportional to the model dimension .
DeepMind The team proved DP-SGD The performance on the hyperparametric model is much better than previously thought . A combination of careful hyperparametric adjustment and simple techniques to ensure signal propagation and improve convergence , The author team is CIFAR-10 Upper use 40 Layer of Wide-ResNet stay \((8, 10^{-5})\)-DP New without additional data SOTA by 81.4%, Than before SOTA by 71.7% Improved . When it comes to pre trained NFNet-F3 When fine tuning , stay \((0.5, 8*10^{-7})\)-DP Next , The author team is ImageNet We got it 83.8% The highest accuracy of . Besides , The author team is still \((8, 8\cdot 10^{-7})\)-DP Realized under 86.7% The highest accuracy of , This is only more than the current non private SOTA low 4.3%.
For more information please visit DeepMind Of the topic The original page .

Basic technology
How to exclude .DS_Store file
MacOS All file systems contain a hidden file .DS_Store. Submitted to the Git when , It will be submitted together , I hate it very much .
This article teaches you a way , stay Git It is excluded from the global settings of , It is not necessary to set each library once .
Five minutes to understand software architecture patterns
The author uses simple language , Five common patterns of software architecture are explained , For example, the following figure shows the event driven architecture .

Design philosophy
20 A controversial programming point of view
This article summarizes StackOverflow above 20 A controversial programming point of view , such as “ For good software design , Using design patterns does more harm than good ”.
Small P Special Award
A nonexistent cat
This site will give you a random push with GAN Generated cat map .

1800 Diagram of exercise methods
This website collects 1800 A variety of physical exercise methods , Each method is illustrated .
I'm tired of code ? Stand up , Get some exercise !

Thank you for reading , Welcome to leave a message in the comment area ~
P.S. If you like this article , Please do more give the thumbs-up , Let more people see us :D
Focus on official account 「SenseParrots」, Obtain the dynamic thinking framework of AI in the industry .
边栏推荐
- Thirty ninth step
- 在 R 中创建非线性最小二乘检验
- Possible values for @supply in kotlin
- Fresh graduates talk about their graduation stories
- How did the thief unlock the password after the iPhone was stolen? After reading the long knowledge
- Never criticize
- 请指教同花顺软件究竟是什么?在线开户安全么?
- MySQL doit maîtriser 4 langues!
- @Query difficult and miscellaneous diseases
- Termux install openssh
猜你喜欢

One year's work

Ardiuno smart mosquito racket

55 pictures make you feel a bit B-tree at one time

音视频与CPU架构

Redis classic 20 questions

Redis6.0 new feature - ACL (permission control list) implements the restriction of user executable commands and keys

Cow sequencing problem

In depth good article: what is supernetting?

应届毕业生谈毕业的故事

Redis6.0新特性——ACL(权限控制列表)实现限制用户可执行命令和KEY
随机推荐
Here comes the official zero foundation introduction jetpack compose Chinese course!
Which securities company is better and safer to open a mobile stock account?
在同花顺网上开户安全吗?如何网上开一个券商账户
.NET7之MiniAPI(特别篇) :Preview5优化了JWT验证(下)
多测师拱墅校区肖sir_jenkins中搭建出现页面报错
Problem solving process of no internet access
UTONMOS:以数字藏品助力华夏文化传承和数字科技发展
High availability in Internet three highs (high concurrency, high performance and high availability)
短信插件哪个好用万能表单需要发短信着急测试
【flask入门系列】flask处理请求和处理响应
Fresh graduates talk about their graduation stories
What happens when the cloud answer does not display the third-party login button
Dual batteries in series, hardware design
小 P 周刊 Vol.10
版本管理工具使用
GD32 ADC采集电压
In depth good article: what is supernetting?
Largeur d'abord traversée basée sur la matrice de contiguïté
The programmer's eight-year salary change has made netizens envious: you pay me one year's salary per month
How to solve the problem that the iPhone 13 lock screen cannot receive the wechat notification prompt?