SlideShare a Scribd company logo
1 of 48
Topik 3
Etika dan Dampak Sosial
Teknologi Kecerdasan Buatan
Dr. Sunu Wibirama
Modul Kuliah Kecerdasan Buatan
Kode mata kuliah: UGMx 001001132012
May 23, 2022
May 23, 2022
1 Capaian Pembelajaran Mata Kuliah
Topik ini akan memenuhi CPMK 3, yakni mampu menjelaskan dampak sosial yang ditim-
bulkan dari perkembangan teknologi kecerdasan buatan serta etika dalam pengembangan
solusi berbasis kecerdasan buatan. Adapun indikator tercapainya CPMK tersebut adalah
mampu memahami kelemahan teknologi kecedasan buatan dalam kasus rasial, maupun
kelemahan karena tidak akuratnya dataset, serta etika-etika yang perlu diperhatikan dalam
hal pengambilan data dan privasi data.
2 Cakupan Materi
Cakupan materi dalam topik ini sebagai berikut:
a) Racial and Gender Bias in Artificial Intelligence: materi ini menjelaskan kasus-kasus
bias rasial dan bias gender yang terjadi dalam dunia penelitian dan implementasi
praktis teknologi kecerdasan buatan. Salah satu kasus yang diangkat adalah kelema-
han teknologi face recognition dari tiga perusahaan besar duniaā€”Microsoft, IBM, dan
Megviiā€”dalam mengidentifikasi wajah berkulit gelap. Selain itu akan dibahas juga
sumber-sumber munculnya bias gender dan bias rasial dalam teknologi kecerdasan
buatan.
b) How AI Learns Unhealthy Stereotypes: materi ini akan membahas bagaimana teknologi
kecerdasan buatan mempelajari data yang memiliki kecenderugan stereotipe negatif
dan bias gender. Teknologi berbasis AI yang menjadi contoh kajian dalam materi ini
adalah word embedding model.
c) Explainable Artificial Intelligence: materi ini membahas tentang dasar-dasar explain-
ability dalam teknologi kecerdasan buatan. Explainable AI menjadi salah satu so-
lusi untuk membuat teknologi kecerdasan buatan menjadi lebih transparan dan hasil
pengambilan keputusannya dapat dipertanggungjawabkan.
d) Deepfakes: materi ini membahas tentang cara kerja Deepfakes, yakni sebuah proses
untuk membuat video, suara atau gambar sintetis dengan menggunakan deep learning.
Teknologi Deepfakes biasa digunakan dalam dunia hiburan dan produksi film layar
lebar. Meskipun demikian, teknologi ini menyimpan potensi penyalahgunaan informasi
apabila tidak diawasi dengan ketat.
e) AI Based Cyberattacks: materi ini membahas tentang bentuk-bentuk serangan pada
sistem berbasis kecerdasan buatan, mulai dari malware yang diberi kemampuan untuk
melakukan serangan pada target spesifik dan menyembunyikan informasi serangan
tersebut, sampai dengan adversarial machine learning yang biasa digunakan untuk
mengecoah sistem berbasis machine learning.
f) Ethics in Artificial Intelligence: materi ini membahas tentang etika dalam pengem-
bangan teknologi kecerdasan buatan. Ada enam prinsip utama dalam etika teknologi
kecerdasan buatan, yakni transparency, respect for human values, fairness, safety,
1
May 23, 2022
accountability, dan privacy. Selain itu, materi ini menjelaskan bagaimana teknologi ke-
cerdasan buatan berperan dalam rangka memecahkan problem-problem sosial kemasyarakatanā€”
penanggulangan bencana lapar, pencarian warga masyarakat yang hilang, pembuatan
materi edukatif, sampai dengan deteksi hoax dalam berita internet.
2
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Racial and Gender Bias in Artificial Intelligence (Part 1)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Some stories on gender biasā€¦
ā€¢ In 2011, during her undergraduate degree at Georgia
Institute of Technology, Ghanaian-US computer
scientist Joy Buolamwini discovered that getting a
robot to play a simple game of peek-a-boo with her
was impossible ā€“ the machine was incapable of
seeing her dark-skinned faceā€¦.
ā€¢ Later, in 2015, as a Masterā€™s student at
Massachusetts Institute of Technologyā€™s Media Lab
working on a scienceā€“art project called Aspire
Mirror, she had a similar issue with facial analysis
software: it detected her face only when she wore a
white mask. Was this a coincidence?
Source:
https://physicsworld.com/a/fighting-algorithmic-bias-in-artificial-intelligence/
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Some stories on gender biasā€¦
ā€¢ She then decided to test 1270 faces of
politicians from 3 African and 3 European
countries, with different features, skin tones
and gender, which became her Masterā€™s
thesis project
ā€¢ This evaluation focuses on gender
classification as a motivating example to
show the need for increased transparency in
the performance of any AI products and
services that focused on human subjects.
Source:
https://dam-prod.media.mit.edu/x/2018/02/06/Gender%20Shades%20Intersectional%20Accuracy%20Disparities.pdf
http://gendershades.org/overview.html
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Some stories on gender biasā€¦
ā€¢ The dermatologist approved Fitzpatrick skin
type classification system was used to label
faces as Fitzpatrick Types I, II, III, IV, V, or
VI.
ā€¢ Then faces labelled Fitzpatrick Types I, II,
and III were grouped in a lighter category
and faces labelled Fitzpatrick Types IV, V,
and VI were grouped into a darker category.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Some stories on gender biasā€¦
ā€¢ Buolamwini uncovered that three
commercially available facial-recognition
technologies made by Microsoft, IBM and
Megvii misidentified darker female faces
nearly 35% of the time, while they worked
almost perfectly (99%) on white men
ā€¢ What is beyond these results?
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Bias in artificial intelligence
ā€¢ We often assume that machines can
create smarter, better and more objective
decisions,
ā€¢ However, this algorithmic bias is one of
many examples that dispels the notion of
machine neutrality and replicates existing
inequalities in society.
ā€¢ A key factor in the accuracy differences is
the lack of diversity in training images and
benchmark data sets.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
7
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Racial and Gender Bias in Artificial Intelligence (Part 2)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Another story of racial issues in AI
ā€¢ Dr. Latanya Sweeney is a professor at
Harvard and director of their Data
Privacy Lab, Sweeneyā€™s research
examines technological solutions to
societal, political and governance
challenges.
ā€¢ One of her important contributions:
discrimination in online advertising,
where she discovered internet searches
of names ā€œracially associatedā€ with the
black community are 25% more likely to
yield sponsored ads suggesting that the
person has a criminal record.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Google ā€™racistā€™ algorithm for image labeling
ā€¢ In 2015, software engineer Jacky AlcinĆ© pointed
out that the image recognition algorithms in Google
Photos were classifying his black friends as
ā€œgorillas.ā€
ā€¢ Google apologized for this and came out saying
that Image recognition technologies were still at an
early stage, but that they would solve the problem.
ā€¢ If a company as powerful and technologically
advanced as Google can have these sort of issues,
imagine the hundreds of thousands of other
businesses that create AI powered software and
applications without such expertise.
ā€¢ Itā€™s a good reminder of how difficult it can be to
train AI software to be consistent and robust.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Important findings by AI NOW Institute
ā€¢ The AI Now Institute of New York University aims to
produce interdisciplinary research and public engagement
to help ensure that AI systems are accountable to the
communities and contexts in which theyā€™re applied.
ā€¢ In 2019, AI Now Institute published a report entitled
ā€œDiscriminating Systems: Gender, Race, and Power in AIā€:
ā€¢ There is a diversity crisis in the AI sector across gender
and race.
ā€¢ Recent studies found only 18% of authors at leading AI
conferences are women, and more than 80% of AI
professors are men. This disparity is extreme in the AI
industry.
ā€¢ The overwhelming focus on ā€˜women in techā€™ is too
narrow and likely to privilege white women over others.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Sources of algorithmic bias
ā€¢ Algorithmic decision making is normally developed
through scientific research, most of them are
laboratory-based research.
ā€¢ When the product is later used in real life setting or
commercial surveillance situations, the product uses
real data.
ā€¢ These real data maybe inaccurate, or highly
influenced by how the data are acquired in real life.
ā€¢ ā€œComputers are programmed by people who ā€“ even
with good intentions ā€“ are still biased and discriminate
within this unequal social world, in which there is
racism and sexism,ā€ (Joy Lisi Rankin, A Peopleā€™s
History of Computing in the United States, Harvard
University Press, 2018)
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
6
End of File
19/05/2022
1
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
How AI Learns Unhealthy Stereotypes
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Our study case
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
19/05/2022
2
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Word embedding model
ā€¢ AI can represent words in vector, and make
inference based on quantitative value of the
vector.
ā€¢ This technique is called word-vector model,
or in the case of Bolukbasi et al. (2016), it is
called word embedding model.
ā€¢ Using this kind of representation, we may
find new analogy based on the existing
analogies that have been trained to the
model.
Source: Jon Krohn, ā€Deep Learning Illustrated,ā€ Addison-Wesley, 2020
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Example of analogy
ā€¢ Man : Woman as Father : ?
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
19/05/2022
3
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : ?
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : Queen
ā€¢ Man : Computer programmer as Woman : ?
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
19/05/2022
4
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : Queen
ā€¢ Man : Computer programmer as Woman : Homemaker
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : Queen
ā€¢ Man : Computer programmer as Woman : Homemaker
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
Computer programmer
Associating woman as a homemaker while man as
a computer programmer is unhealthy stereotyping.
Man can be a computer programmer, or a homemaker, or both of them.
Woman is no different from man!
19/05/2022
5
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 9
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : Queen
ā€¢ Man : Computer programmer as Woman : Homemaker
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
Computer programmer
Man: (1,1)
1 2 3 4 5
1
2
3
4
5
Man
Computer programmer: (3,2)
Computer programmer
Woman: (2,3)
Woman
?
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 10
Example of analogy
ā€¢ Man : Woman as Father : Mother
ā€¢ Man : Woman as King : Queen
ā€¢ Man : Computer programmer as Woman : Homemaker
T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
Computer programmer
Man: (1,1)
1 2 3 4 5
1
2
3
4
5
Man
Computer programmer: (3,2)
Computer programmer
Woman: (2,3)
Woman
Homemaker: (4,4)
Homemaker
19/05/2022
6
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 11
Combating bias in AI
ā€¢ Technical solutions:
ā€¢ Removing bias in words (ā€zero outā€ the bias)
ā€¢ Checking inclusivity of the data
ā€¢ Diverse workforce:
ā€¢ Recruiting more representative ML engineers from different
background, cultures, as well as balancing the gender.
ā€¢ Transparency and auditing in ML workflow ļƒ  explainable AI
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 12
12
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Explainable Artificial Intelligence
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Handling bias in AI
ā€¢ One approach to solve bias in AI is by investigating
accuracy of the input data through the lens of non-
technical person (social and ethical point of view).
ā€¢ However, bias may also come from methodological
mistakes.
ā€¢ Machine Learning models are often thought of as
black boxes that are impossible to interpret.
ā€¢ In the end, these models are used by humans who
need to trust them, understand the errors they make,
and the reasoning behind their predictions.
ā€¢ Giving them some kind of explainability is very
important.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
ML workflow from training to deployment
Source:
https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
The problem of ML workflow
ā€¢ The problem here, as we can see by the doubts of the
user, is that the prediction comes with no justification.
ā€¢ Before deploying any ML model we are more or less aware
of its error.
ā€¢ But this only gives us a certain number in the loss scale, or
quantifies a certain numerical distance between the labels
in the data and the predicted labels before deployment.
ā€¢ Can we trust this error above everything?
ā€¢ Even if there is no actual problem with the predictions, we
would like to understand why the model is saying what it
is saying. You can have good results on test data, and get
pretty accurate predictions, but sometimes that is not
enough.
We use some data to train a model through an specific learning process.
This learning process results in a learned function, which can be then fed
inputs, and it outputs a prediction in an specific interface, which is what the
final user sees and interacts with.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
The shifting trend of AI research
The focus of AI research is slowly turning towards the transparency and explainability of these models.
We want to know why they come up with the predictions they output.
Source:
https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
6
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Explainable Artificial Intelligence (Part 02)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
#1: Verifying that AI model works as expected
Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
#2: Understand weakness and improve AI model
Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
#3: Interpretability in sciences
Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
#4: Learn new things from a learning machine
Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Explainability vs Interpretability
Features Value
Feature 1 0.03
Feature 2 0.5
Feature 3 0.71
Feature 4 0.52
Feature 5 0.11
Interpretable AI
Features Value Interpretation
Feature 1 0.03 30% represents N
Feature 2 0.5 20% represents A
Feature 3 0.71 15% represents N
Feature 4 0.52 10% represents N
Feature 5 0.11 15% represents A
Classes:
Normal (N) and Abnormal (A)
Explainable AI
Determined based
on probability
of the perturbation
data to the real data
Interpretation
Features Value Interpretation
Feature 1 0.03 30% strongly indicates N
Feature 2 0.5 20% indicates A
Feature 3 0.71 15% indicates N
Feature 4 0.52 10% indicates N
Feature 5 0.11 15% strongly indicates A
Determined based
on important
feature score
between each score
to the class
Explanation
We can determine how strong the
feature gives impact to the class
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
ML workflow with explainable model
Source:
https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/
The ML model not only has the capacity of giving us a prediction, but also of explaining why it
makes that prediction. The new explanation interface displays additional information that can give
our user some insights into why such prediction was made.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8
8
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Malicious Use of AI: Deepfakes (Part 01)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
What is Deepfakes?
ā€¢ Deepfakes are artificially created videos,
images, or audio files created using deep
learning models.
ā€¢ For example, existing video sequences are
used and faked by replacing faces.
ā€¢ They are intended to appear as realistic as
possible, even though they were generated
by a machine learning model.
ā€¢ In addition to using deepfakes for private
videos, they can also be used to disseminate
targeted misinformation.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Types of Deepfakes
ā€¢ Face Swapping: The face and facial expressions
of person A should be projected onto the body of
person B. This can even go as far as replacing
the entire body of person B in a video or image
with the body of person A.
ā€¢ Body Puppetry: Movements, gestures, or facial
expressions of person A are recorded and these
are then to be artificially taken over by person B.
ā€¢ Voice Swapping: A freely written text is to be
performed as authentically as possible with the
voice of a person. This method can also be
combined with body puppetry, for example.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Basic concept
ā€¢ Autoencoders are machine learning models that
consist of an encoder part and a decoder part.
ā€¢ We can use the same image as input and output.
ā€¢ This would allow the autoencoder to learn a vector
representation of the image that is as compressed
as possible and stores all the important features.
ā€¢ This vector is then in turn used by the decoder to
generate the original image from it again.
ā€¢ The better the learned vector representation of the
autoencoder, the more realistic the generated
image.
Source:
https://jonathan-hui.medium.com/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9
https://towardsdatascience.com/what-are-deepfakes-and-how-do-you-recognize-them-f9ab1a143456
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Basic concept
ā€¢ To decode the features, we use separate decoders for
person A and person B.
ā€¢ After the training, we process the video frame-by-frame
to swap a person's face with another.
ā€¢ Using face detection, we extract the face of person A out
and feed it into the encoder.
ā€¢ However, instead of feeding to its original decoder, we
use the decoder of the person B to reconstruct the
picture.
ā€¢ Thus, we draw person B with the features of A in the
original video. Then we merge the newly created face
into the original image.
Source:
https://jonathan-hui.medium.com/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9
https://towardsdatascience.com/what-are-deepfakes-and-how-do-you-recognize-them-f9ab1a143456
Intuitively, the encoder is detecting face angle, skin tone,
facial expression, lighting and other information that is
important to reconstruct the person A. When we use the
second decoder to reconstruct the image, we are drawing
person B but with the context of A.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
6
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Malicious Use of AI: Deepfakes (Part 02)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Using neural networks for synthesizing Obama (1)
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Using neural networks for synthesizing Obama (2)
ā€¢ On the right side, we can see the workflow of
the lip sync paper.
ā€¢ It substitutes the audio of a weekly
presidential address with another audio
(input audio).
ā€¢ In the process, it re-synthesizes the mouth
and the chin area so its movement is in-sync
with the fake audio.
ā€¢ Note that the final composite considers
proper 3D pose so that what Obama
appears to be saying in a target video
matches with the input audio track.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Using neural networks for synthesizing Obama (3)
ā€¢ First, using an LSTM network, the
audio is transformed into a
sequence of 18 landmark points in
the lip. This LSTM outputs a sparse
mouth shape for each output video
frame.
ā€¢ Given the mouth shape ,
it synthesizes mouth texture for the
mouth and the chin area. These
mouth textures are then composed
with the target video to recreate the
target frame.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Using neural networks for synthesizing Obama (4)
ā€¢ We want the mouth texture to look real but also have a
temporal smoothness.
ā€¢ So the application looks over the target videos to search for
candidates' frames that have the same calculated mouth
shape as what we want.
ā€¢ Then we merge the candidates together using a median
function. As shown in the images, if we use more candidate
frames to do the averaging, the image gets blurred while the
temporal smoothness improves (no flicking).
ā€¢ On the other hand, the image can be less blurry but we may
see flicking when transiting from one frame to another.
ā€¢ To compensate for the blurry, teeth enhancement and
sharpening is performed. But obviously, the sharpness
cannot be completely restored for the lower lip.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
Using neural networks for synthesizing Obama (5)
ā€¢ Finally, we need to retime the frame so we know where
to insert the fake mouth texture.
ā€¢ This helps us to sync with the head movement. In
particular, Obama's head usually stops moving when he
pauses his speech.
ā€¢ In the second figure, the top row below is the original
video frames for the input audio we used. We insert this
input audio to our target video (the second row).
ā€¢ When compare it side-by-side, we realize the mouth
movement from the original video is very close to the
fabricated mouth movement.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8
8
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
AI Based Cyberattacks (Part 01)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Cybersecurity
ā€¢ Cybersecurity is an arms race, where attackers
and defenders play a constantly evolving cat-
and-mouse game.
ā€¢ In the PC era, we witnessed malware threats
emerging from viruses and worms, and the
security industry responded with antivirus
software.
ā€¢ In the web era, attacks such as cross-site
request forgery (CSRF) and cross-site scripting
(XSS) were challenging web applications.
ā€¢ What about the era of Artificial Intelligence?
What kind of threat that we may face in this era?
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
How AI can be used in cybersecurity
ā€¢ Think about what would happen when attackers
start using the power of deep learning and
machine learning for their advantage?
ā€¢ The malware operates AI algorithms as an
integral part of its business logic.
ā€¢ For example, using AI based anomaly detection
algorithms to indicate irregular user and system
activity patterns.
ā€¢ An interesting use case can be found in
DeepLocker, presented by IBM Security
researches in Black Hat USA 2018.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
DeepLocker
ā€¢ IBM Research developed DeepLocker to better understand how several existing AI models can be combined with
current malware techniques to create a particularly challenging new breed of malware.
ā€¢ This class of AI-powered evasive malware conceals its intent until it reaches a specific victim.
ā€¢ It unleashes its malicious action as soon as the AI model identifies the target through indicators like facial recognition,
geolocation and voice recognition.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
DeepLocker Mechanism (1)
ā€¢ DeepLocker uses a deep neural network (DNN) model to accurately
identify the target attributes and conceal the intent of the malicious
payload. The two core functions are implemented through the two
processes: concealment and unlocking.
Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
DeepLocker Mechanism (2)
ā€¢ During concealment: DeepLocker uses the deep neural networks
(DNN) to conduct dynamic concealment of the symmetric key. The key
is employed to encrypt a plain payload into a cipher payload.
Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
DeepLocker Mechanism (3)
ā€¢ During unlocking: the DNN first accurately identifies the target
attribute (as shown by the facial image of Tom Cruise) to assist
generating the key for decoding the cipher payload, and then
unleashes an attack.
Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8
8
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
AI Based Cyberattacks (Part 02)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Adversarial machine learning
ā€¢ Adversarial machine learning is a machine learning
method that aims to trick machine learning models by
providing deceptive input or stealing parameters of
model.
ā€¢ Hence, it includes both the generation and detection
of adversarial examples, which are inputs specially
created to deceive classifiers.
ā€¢ Adversarial machine learning have been extensively
explored in some areas, such as image classification
and spam detection.
ā€¢ The most extensive studies of adversarial machine
learning have been conducted in the area of image
recognition.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Why adversarial attack is dangerous?
Imagine you are riding a self-driving car. During your riding, your self-driving car ā€œseesā€
Banksyā€™s popular Girl with Balloon big sticker on the lane. Performing an adversarial attack
requires taking an input image (left), purposely perturbing it with a noise vector (middle),
which forces the AI system to misclassify the input image, ultimately resulting in an
incorrect classification, potentially with major consequences (right).
Source: https://pyimagesearch.com/2020/10/19/adversarial-images-and-attacks-with-keras-and-tensorflow/
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Adversarial attack and steganography
ā€¢ The adversarial images are images that have pixels purposely
and intentionally perturbed to confuse and deceive AI models.
At the same time, these images look harmless and innocent to
humans.
ā€¢ The concept is similar to steganography.
ā€¢ Using steganography algorithms, we can embed data (such as
plaintext messages) in an image without distorting the
appearance of the image itself. This image can be innocently
transmitted to the receiver, who can then extract the hidden
message from the image.
ā€¢ Similarly, adversarial attacks embed a message in an input
image ā€” but instead of a plaintext message meant for human
consumption, an adversarial attack instead embeds a noise
vector in the input image. This noise vector is purposely
constructed to fool and confuse AI models.
https://www.commonlounge.com/discussion/4bc16dbc2c7145ff87ad0f0d5401a242
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Example of adversarial attack
Finlayson, S. G., Bowers, J. D., Ito, J., Zittrain, J. L., Beam, A. L., & Kohane, I. S. (2019). Adversarial attacks on medical machine learning. Science, 363(6433), 1287-1289.
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
6
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
AI Based Cyberattacks (Part 03)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
Types of adversarial attacks
and how to protect machine learning system
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Poisoning attack
ā€¢ A poisoning attack focuses on the data used to
train a model.
ā€¢ An attacker will change existing data or introduce
incorrectly labelled data.
ā€¢ The model trained on this data will then make
incorrect predictions on correctly labelled data.
ā€¢ For example, an attacker could relabel fraud cases
as not fraud.
ā€¢ The attacker could do this for only specific fraud
cases so when they attempt to commit fraud in the
same way the system will not reject them.
Source: https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Evasion attack
ā€¢ These types of attacks are more
associated with fields like image
recognition.
ā€¢ Attackers can create images that look
perfectly normal to a human but results in
completely incorrect predictions.
ā€¢ The attacker modifies data used by a
model to make predictions and not data
used to train models.
Source:
https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6
Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Model stealing
ā€¢ Model stealing attacks also focus on the
model after it has been trained.
ā€¢ Specifically, an attacker wants to learn
about the structure of the model or or
even a modelā€™s hyperparameters.
ā€¢ For example, an attacker could identify
exactly what words a spam filtering
model will flag.
ā€¢ The attacker could then alter spam/
phishing emails to ensure they are
delivered to the inbox.
Source: https://towardsdatascience.com/how-to-attack-machine-learning-evasion-poisoning-inference-trojans-backdoors-a7cb5832595c
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Protecting machine learning system
ā€¢ Adversarial training: train the model to identify
adversarial examples. By training/ retraining a model
using these examples, it will be able to identify future
adversarial attacks.
ā€¢ Switching models: the second approach is to use
multiple models within your system. The model used to
make predictions is changed randomly. Poisoning or
findings adversarial examples for multiple models is
much harder than for just one.
ā€¢ Generalised model: instead of switching models, they
are combined to create one generalized model. This
means all the individual models would contribute to the
final prediction. An adversarial example may be able to
trick one model but it would likely not be effective against
all of them
Source: https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
7
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Ethics in Artificial Intelligence (Part 01)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
Some concerns on AI technology
ā€¢ Bias: AI systems can be biased because they're designed to
look for patterns in data and favour those patterns.
ā€¢ Liability: AI systems can't be perfect. When mistakes are
made, who's responsible?
ā€¢ Security: As AI systems advance, how do we stop bad actors
from weaponizing them? What happens if robots can fight and
drones can attack?
ā€¢ Human Interaction: There's already a decline in person-to-
person interactions. Are we sacrificing humanity's social
aspect?
ā€¢ Employment: Repetitive, predictable jobs that can be
automated will be automated. Those replaced have to retrain
themselves in areas where robots can't come in easily, such
as, creative or critical thinking.
ā€¢ Wealth Inequality: Companies rich enough to invest in AI will
get richer by reducing cost and being more efficient.
ā€¢ Power & Control: Big companies that use AI can control and
manipulate how society thinks and acts.
Source:
https://www.weforum.org/agenda/2016/10/top-10-ethical-issues-in-artificial-intelligence/
https://www.wbpro.com/ethics-in-artificial-intelligence/
https://devopedia.org/ethical-ai#The-Institute-for-Ethical-AI-&-ML-2019
https://www.fast.ai/2018/09/24/ai-ethics-resources/
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Guiding principal for ethical AI
Source:
https://www.wbpro.com/ethics-in-artificial-intelligence/
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
5
End of File
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1
Sunu Wibirama
sunu@ugm.ac.id
Department of Electrical and Information Engineering
Faculty of Engineering
Universitas Gadjah Mada
INDONESIA
Ethics in Artificial Intelligence (Part 02)
Kecerdasan Buatan | Artificial Intelligence
Version: January 2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
How can we use
AI for social good?
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4
Some of AI capabilities for societal benefit
Source: McKinsey Global Institute analysis
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5
Some of AI capabilities for societal benefit
Source: McKinsey Global Institute analysis
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6
Some of AI capabilities for societal benefit
Source: McKinsey Global Institute analysis
19/05/2022
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7
Some of AI capabilities for societal benefit
Source: McKinsey Global Institute analysis
sunu@ugm.ac.id
Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8
8
End of File

More Related Content

Similar to Modul Topik 3 - Kecerdasan Buatan

[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AIDataScienceConferenc1
Ā 
Human Rights Beyond the Code | Emergence of AI
Human Rights Beyond the Code | Emergence of AIHuman Rights Beyond the Code | Emergence of AI
Human Rights Beyond the Code | Emergence of AIHarsh Kumar
Ā 
Modul Topik 6 - Kecerdasan Buatan.pdf
Modul Topik 6 - Kecerdasan Buatan.pdfModul Topik 6 - Kecerdasan Buatan.pdf
Modul Topik 6 - Kecerdasan Buatan.pdfSunu Wibirama
Ā 
The Future is in Responsible Generative AI
The Future is in Responsible Generative AIThe Future is in Responsible Generative AI
The Future is in Responsible Generative AISaeed Al Dhaheri
Ā 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...Willy Marroquin (WillyDevNET)
Ā 
Modul Topik 1 - Kecerdasan Buatan
Modul Topik 1 - Kecerdasan BuatanModul Topik 1 - Kecerdasan Buatan
Modul Topik 1 - Kecerdasan BuatanSunu Wibirama
Ā 
Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Vladimir Kanchev
Ā 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018Peerasak C.
Ā 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data Driven Innovation
Ā 
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdf
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdfARTIFICIAL_INTELLIGENCE_Zain ALi.pdf
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdfzain basra
Ā 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...IJCI JOURNAL
Ā 
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptx
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptxCATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptx
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptxJOHNCARLOBAYBAYON1
Ā 
Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardLilian Edwards
Ā 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsSonja Aits
Ā 
DANGER OF AI (1).pptx
DANGER OF AI (1).pptxDANGER OF AI (1).pptx
DANGER OF AI (1).pptxAshwinKushwaha2
Ā 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6APNIC
Ā 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World OrderThe Future Society
Ā 

Similar to Modul Topik 3 - Kecerdasan Buatan (20)

[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
[DSC Europe 23] Shahab Anbarjafari - Generative AI: Impact of Responsible AI
Ā 
Human Rights Beyond the Code | Emergence of AI
Human Rights Beyond the Code | Emergence of AIHuman Rights Beyond the Code | Emergence of AI
Human Rights Beyond the Code | Emergence of AI
Ā 
Modul Topik 6 - Kecerdasan Buatan.pdf
Modul Topik 6 - Kecerdasan Buatan.pdfModul Topik 6 - Kecerdasan Buatan.pdf
Modul Topik 6 - Kecerdasan Buatan.pdf
Ā 
The Future is in Responsible Generative AI
The Future is in Responsible Generative AIThe Future is in Responsible Generative AI
The Future is in Responsible Generative AI
Ā 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...
Ā 
Modul Topik 1 - Kecerdasan Buatan
Modul Topik 1 - Kecerdasan BuatanModul Topik 1 - Kecerdasan Buatan
Modul Topik 1 - Kecerdasan Buatan
Ā 
Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)Ethical Issues in Machine Learning Algorithms (Part 2)
Ethical Issues in Machine Learning Algorithms (Part 2)
Ā 
AI NOW REPORT 2018
AI NOW REPORT 2018AI NOW REPORT 2018
AI NOW REPORT 2018
Ā 
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Data ethics and machine learning: discrimination, algorithmic bias, and how t...
Ā 
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdf
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdfARTIFICIAL_INTELLIGENCE_Zain ALi.pdf
ARTIFICIAL_INTELLIGENCE_Zain ALi.pdf
Ā 
TecnologĆ­as emergentes: priorizando al ciudadano
TecnologĆ­as emergentes: priorizando al ciudadanoTecnologĆ­as emergentes: priorizando al ciudadano
TecnologĆ­as emergentes: priorizando al ciudadano
Ā 
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
A REVIEW OF THE ETHICS OF ARTIFICIAL INTELLIGENCE AND ITS APPLICATIONS IN THE...
Ā 
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptx
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptxCATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptx
CATCH UP FRIDAY COMPUTER PPT FOR GRADE 7.pptx
Ā 
Global Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way ForwardGlobal Governance of Generative AI: The Right Way Forward
Global Governance of Generative AI: The Right Way Forward
Ā 
Ethics in Technology Handout
Ethics in Technology HandoutEthics in Technology Handout
Ethics in Technology Handout
Ā 
Teacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implicationsTeacher Education: AI - Ethical, legal and societal implications
Teacher Education: AI - Ethical, legal and societal implications
Ā 
Presentation: Perry de Jager, Principa
Presentation: Perry de Jager, PrincipaPresentation: Perry de Jager, Principa
Presentation: Perry de Jager, Principa
Ā 
DANGER OF AI (1).pptx
DANGER OF AI (1).pptxDANGER OF AI (1).pptx
DANGER OF AI (1).pptx
Ā 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Ā 
AI and its Effects on the Global World Order
AI and its Effects on the Global World OrderAI and its Effects on the Global World Order
AI and its Effects on the Global World Order
Ā 

More from Sunu Wibirama

Modul Topik 9 - Kecerdasan Buatan
Modul Topik 9 - Kecerdasan BuatanModul Topik 9 - Kecerdasan Buatan
Modul Topik 9 - Kecerdasan BuatanSunu Wibirama
Ā 
Modul Topik 8 - Kecerdasan Buatan
Modul Topik 8 - Kecerdasan BuatanModul Topik 8 - Kecerdasan Buatan
Modul Topik 8 - Kecerdasan BuatanSunu Wibirama
Ā 
Modul Topik 7 - Kecerdasan Buatan
Modul Topik 7 - Kecerdasan BuatanModul Topik 7 - Kecerdasan Buatan
Modul Topik 7 - Kecerdasan BuatanSunu Wibirama
Ā 
Modul Topik 5 - Kecerdasan Buatan
Modul Topik 5 - Kecerdasan BuatanModul Topik 5 - Kecerdasan Buatan
Modul Topik 5 - Kecerdasan BuatanSunu Wibirama
Ā 
Modul Topik 4 - Kecerdasan Buatan.pdf
Modul Topik 4 - Kecerdasan Buatan.pdfModul Topik 4 - Kecerdasan Buatan.pdf
Modul Topik 4 - Kecerdasan Buatan.pdfSunu Wibirama
Ā 
Modul Topik 2 - Kecerdasan Buatan.pdf
Modul Topik 2 - Kecerdasan Buatan.pdfModul Topik 2 - Kecerdasan Buatan.pdf
Modul Topik 2 - Kecerdasan Buatan.pdfSunu Wibirama
Ā 
Pengantar Mata Kuliah Kecerdasan Buatan.pdf
Pengantar Mata Kuliah Kecerdasan Buatan.pdfPengantar Mata Kuliah Kecerdasan Buatan.pdf
Pengantar Mata Kuliah Kecerdasan Buatan.pdfSunu Wibirama
Ā 
Introduction to Artificial Intelligence - Pengenalan Kecerdasan Buatan
Introduction to Artificial Intelligence - Pengenalan Kecerdasan BuatanIntroduction to Artificial Intelligence - Pengenalan Kecerdasan Buatan
Introduction to Artificial Intelligence - Pengenalan Kecerdasan BuatanSunu Wibirama
Ā 
Mengenal Eye Tracking (Introduction to Eye Tracking Research)
Mengenal Eye Tracking (Introduction to Eye Tracking Research)Mengenal Eye Tracking (Introduction to Eye Tracking Research)
Mengenal Eye Tracking (Introduction to Eye Tracking Research)Sunu Wibirama
Ā 

More from Sunu Wibirama (9)

Modul Topik 9 - Kecerdasan Buatan
Modul Topik 9 - Kecerdasan BuatanModul Topik 9 - Kecerdasan Buatan
Modul Topik 9 - Kecerdasan Buatan
Ā 
Modul Topik 8 - Kecerdasan Buatan
Modul Topik 8 - Kecerdasan BuatanModul Topik 8 - Kecerdasan Buatan
Modul Topik 8 - Kecerdasan Buatan
Ā 
Modul Topik 7 - Kecerdasan Buatan
Modul Topik 7 - Kecerdasan BuatanModul Topik 7 - Kecerdasan Buatan
Modul Topik 7 - Kecerdasan Buatan
Ā 
Modul Topik 5 - Kecerdasan Buatan
Modul Topik 5 - Kecerdasan BuatanModul Topik 5 - Kecerdasan Buatan
Modul Topik 5 - Kecerdasan Buatan
Ā 
Modul Topik 4 - Kecerdasan Buatan.pdf
Modul Topik 4 - Kecerdasan Buatan.pdfModul Topik 4 - Kecerdasan Buatan.pdf
Modul Topik 4 - Kecerdasan Buatan.pdf
Ā 
Modul Topik 2 - Kecerdasan Buatan.pdf
Modul Topik 2 - Kecerdasan Buatan.pdfModul Topik 2 - Kecerdasan Buatan.pdf
Modul Topik 2 - Kecerdasan Buatan.pdf
Ā 
Pengantar Mata Kuliah Kecerdasan Buatan.pdf
Pengantar Mata Kuliah Kecerdasan Buatan.pdfPengantar Mata Kuliah Kecerdasan Buatan.pdf
Pengantar Mata Kuliah Kecerdasan Buatan.pdf
Ā 
Introduction to Artificial Intelligence - Pengenalan Kecerdasan Buatan
Introduction to Artificial Intelligence - Pengenalan Kecerdasan BuatanIntroduction to Artificial Intelligence - Pengenalan Kecerdasan Buatan
Introduction to Artificial Intelligence - Pengenalan Kecerdasan Buatan
Ā 
Mengenal Eye Tracking (Introduction to Eye Tracking Research)
Mengenal Eye Tracking (Introduction to Eye Tracking Research)Mengenal Eye Tracking (Introduction to Eye Tracking Research)
Mengenal Eye Tracking (Introduction to Eye Tracking Research)
Ā 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
Ā 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdfssuser54595a
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
Ā 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
Ā 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
Ā 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
Ā 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Ā 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
Ā 
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAŠ”Y_INDEX-DM_23-1-final-eng.pdf
Ā 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
Ā 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
Ā 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
Ā 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Ā 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Ā 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
Ā 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Ā 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
Ā 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
Ā 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Ā 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
Ā 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Ā 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Ā 
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļøcall girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
call girls in Kamla Market (DELHI) šŸ” >ą¼’9953330565šŸ” genuine Escort Service šŸ”āœ”ļøāœ”ļø
Ā 
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
ā€œOh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Ā 
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at šŸ”9953056974šŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at šŸ”9953056974šŸ”
Ā 

Modul Topik 3 - Kecerdasan Buatan

  • 1. Topik 3 Etika dan Dampak Sosial Teknologi Kecerdasan Buatan Dr. Sunu Wibirama Modul Kuliah Kecerdasan Buatan Kode mata kuliah: UGMx 001001132012 May 23, 2022
  • 2. May 23, 2022 1 Capaian Pembelajaran Mata Kuliah Topik ini akan memenuhi CPMK 3, yakni mampu menjelaskan dampak sosial yang ditim- bulkan dari perkembangan teknologi kecerdasan buatan serta etika dalam pengembangan solusi berbasis kecerdasan buatan. Adapun indikator tercapainya CPMK tersebut adalah mampu memahami kelemahan teknologi kecedasan buatan dalam kasus rasial, maupun kelemahan karena tidak akuratnya dataset, serta etika-etika yang perlu diperhatikan dalam hal pengambilan data dan privasi data. 2 Cakupan Materi Cakupan materi dalam topik ini sebagai berikut: a) Racial and Gender Bias in Artificial Intelligence: materi ini menjelaskan kasus-kasus bias rasial dan bias gender yang terjadi dalam dunia penelitian dan implementasi praktis teknologi kecerdasan buatan. Salah satu kasus yang diangkat adalah kelema- han teknologi face recognition dari tiga perusahaan besar duniaā€”Microsoft, IBM, dan Megviiā€”dalam mengidentifikasi wajah berkulit gelap. Selain itu akan dibahas juga sumber-sumber munculnya bias gender dan bias rasial dalam teknologi kecerdasan buatan. b) How AI Learns Unhealthy Stereotypes: materi ini akan membahas bagaimana teknologi kecerdasan buatan mempelajari data yang memiliki kecenderugan stereotipe negatif dan bias gender. Teknologi berbasis AI yang menjadi contoh kajian dalam materi ini adalah word embedding model. c) Explainable Artificial Intelligence: materi ini membahas tentang dasar-dasar explain- ability dalam teknologi kecerdasan buatan. Explainable AI menjadi salah satu so- lusi untuk membuat teknologi kecerdasan buatan menjadi lebih transparan dan hasil pengambilan keputusannya dapat dipertanggungjawabkan. d) Deepfakes: materi ini membahas tentang cara kerja Deepfakes, yakni sebuah proses untuk membuat video, suara atau gambar sintetis dengan menggunakan deep learning. Teknologi Deepfakes biasa digunakan dalam dunia hiburan dan produksi film layar lebar. Meskipun demikian, teknologi ini menyimpan potensi penyalahgunaan informasi apabila tidak diawasi dengan ketat. e) AI Based Cyberattacks: materi ini membahas tentang bentuk-bentuk serangan pada sistem berbasis kecerdasan buatan, mulai dari malware yang diberi kemampuan untuk melakukan serangan pada target spesifik dan menyembunyikan informasi serangan tersebut, sampai dengan adversarial machine learning yang biasa digunakan untuk mengecoah sistem berbasis machine learning. f) Ethics in Artificial Intelligence: materi ini membahas tentang etika dalam pengem- bangan teknologi kecerdasan buatan. Ada enam prinsip utama dalam etika teknologi kecerdasan buatan, yakni transparency, respect for human values, fairness, safety, 1
  • 3. May 23, 2022 accountability, dan privacy. Selain itu, materi ini menjelaskan bagaimana teknologi ke- cerdasan buatan berperan dalam rangka memecahkan problem-problem sosial kemasyarakatanā€” penanggulangan bencana lapar, pencarian warga masyarakat yang hilang, pembuatan materi edukatif, sampai dengan deteksi hoax dalam berita internet. 2
  • 4. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Racial and Gender Bias in Artificial Intelligence (Part 1) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Some stories on gender biasā€¦ ā€¢ In 2011, during her undergraduate degree at Georgia Institute of Technology, Ghanaian-US computer scientist Joy Buolamwini discovered that getting a robot to play a simple game of peek-a-boo with her was impossible ā€“ the machine was incapable of seeing her dark-skinned faceā€¦. ā€¢ Later, in 2015, as a Masterā€™s student at Massachusetts Institute of Technologyā€™s Media Lab working on a scienceā€“art project called Aspire Mirror, she had a similar issue with facial analysis software: it detected her face only when she wore a white mask. Was this a coincidence? Source: https://physicsworld.com/a/fighting-algorithmic-bias-in-artificial-intelligence/
  • 5. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Some stories on gender biasā€¦ ā€¢ She then decided to test 1270 faces of politicians from 3 African and 3 European countries, with different features, skin tones and gender, which became her Masterā€™s thesis project ā€¢ This evaluation focuses on gender classification as a motivating example to show the need for increased transparency in the performance of any AI products and services that focused on human subjects. Source: https://dam-prod.media.mit.edu/x/2018/02/06/Gender%20Shades%20Intersectional%20Accuracy%20Disparities.pdf http://gendershades.org/overview.html sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Some stories on gender biasā€¦ ā€¢ The dermatologist approved Fitzpatrick skin type classification system was used to label faces as Fitzpatrick Types I, II, III, IV, V, or VI. ā€¢ Then faces labelled Fitzpatrick Types I, II, and III were grouped in a lighter category and faces labelled Fitzpatrick Types IV, V, and VI were grouped into a darker category.
  • 6. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Some stories on gender biasā€¦ ā€¢ Buolamwini uncovered that three commercially available facial-recognition technologies made by Microsoft, IBM and Megvii misidentified darker female faces nearly 35% of the time, while they worked almost perfectly (99%) on white men ā€¢ What is beyond these results? sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Bias in artificial intelligence ā€¢ We often assume that machines can create smarter, better and more objective decisions, ā€¢ However, this algorithmic bias is one of many examples that dispels the notion of machine neutrality and replicates existing inequalities in society. ā€¢ A key factor in the accuracy differences is the lack of diversity in training images and benchmark data sets.
  • 7. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 7 End of File
  • 8. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Racial and Gender Bias in Artificial Intelligence (Part 2) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Another story of racial issues in AI ā€¢ Dr. Latanya Sweeney is a professor at Harvard and director of their Data Privacy Lab, Sweeneyā€™s research examines technological solutions to societal, political and governance challenges. ā€¢ One of her important contributions: discrimination in online advertising, where she discovered internet searches of names ā€œracially associatedā€ with the black community are 25% more likely to yield sponsored ads suggesting that the person has a criminal record.
  • 9. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Google ā€™racistā€™ algorithm for image labeling ā€¢ In 2015, software engineer Jacky AlcinĆ© pointed out that the image recognition algorithms in Google Photos were classifying his black friends as ā€œgorillas.ā€ ā€¢ Google apologized for this and came out saying that Image recognition technologies were still at an early stage, but that they would solve the problem. ā€¢ If a company as powerful and technologically advanced as Google can have these sort of issues, imagine the hundreds of thousands of other businesses that create AI powered software and applications without such expertise. ā€¢ Itā€™s a good reminder of how difficult it can be to train AI software to be consistent and robust. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Important findings by AI NOW Institute ā€¢ The AI Now Institute of New York University aims to produce interdisciplinary research and public engagement to help ensure that AI systems are accountable to the communities and contexts in which theyā€™re applied. ā€¢ In 2019, AI Now Institute published a report entitled ā€œDiscriminating Systems: Gender, Race, and Power in AIā€: ā€¢ There is a diversity crisis in the AI sector across gender and race. ā€¢ Recent studies found only 18% of authors at leading AI conferences are women, and more than 80% of AI professors are men. This disparity is extreme in the AI industry. ā€¢ The overwhelming focus on ā€˜women in techā€™ is too narrow and likely to privilege white women over others.
  • 10. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Sources of algorithmic bias ā€¢ Algorithmic decision making is normally developed through scientific research, most of them are laboratory-based research. ā€¢ When the product is later used in real life setting or commercial surveillance situations, the product uses real data. ā€¢ These real data maybe inaccurate, or highly influenced by how the data are acquired in real life. ā€¢ ā€œComputers are programmed by people who ā€“ even with good intentions ā€“ are still biased and discriminate within this unequal social world, in which there is racism and sexism,ā€ (Joy Lisi Rankin, A Peopleā€™s History of Computing in the United States, Harvard University Press, 2018) sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 6 End of File
  • 11. 19/05/2022 1 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA How AI Learns Unhealthy Stereotypes Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Our study case T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
  • 12. 19/05/2022 2 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Word embedding model ā€¢ AI can represent words in vector, and make inference based on quantitative value of the vector. ā€¢ This technique is called word-vector model, or in the case of Bolukbasi et al. (2016), it is called word embedding model. ā€¢ Using this kind of representation, we may find new analogy based on the existing analogies that have been trained to the model. Source: Jon Krohn, ā€Deep Learning Illustrated,ā€ Addison-Wesley, 2020 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Example of analogy ā€¢ Man : Woman as Father : ? T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
  • 13. 19/05/2022 3 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : ? T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : Queen ā€¢ Man : Computer programmer as Woman : ? T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016
  • 14. 19/05/2022 4 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : Queen ā€¢ Man : Computer programmer as Woman : Homemaker T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : Queen ā€¢ Man : Computer programmer as Woman : Homemaker T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016 Computer programmer Associating woman as a homemaker while man as a computer programmer is unhealthy stereotyping. Man can be a computer programmer, or a homemaker, or both of them. Woman is no different from man!
  • 15. 19/05/2022 5 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 9 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : Queen ā€¢ Man : Computer programmer as Woman : Homemaker T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016 Computer programmer Man: (1,1) 1 2 3 4 5 1 2 3 4 5 Man Computer programmer: (3,2) Computer programmer Woman: (2,3) Woman ? sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 10 Example of analogy ā€¢ Man : Woman as Father : Mother ā€¢ Man : Woman as King : Queen ā€¢ Man : Computer programmer as Woman : Homemaker T. Bolukbasi et al., ā€œMan is to computer programmer as woman is to homemaker? Debiasing word embeddingsā€, arXiv, 2016 Computer programmer Man: (1,1) 1 2 3 4 5 1 2 3 4 5 Man Computer programmer: (3,2) Computer programmer Woman: (2,3) Woman Homemaker: (4,4) Homemaker
  • 16. 19/05/2022 6 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 11 Combating bias in AI ā€¢ Technical solutions: ā€¢ Removing bias in words (ā€zero outā€ the bias) ā€¢ Checking inclusivity of the data ā€¢ Diverse workforce: ā€¢ Recruiting more representative ML engineers from different background, cultures, as well as balancing the gender. ā€¢ Transparency and auditing in ML workflow ļƒ  explainable AI sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 12 12 End of File
  • 17. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Explainable Artificial Intelligence Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Handling bias in AI ā€¢ One approach to solve bias in AI is by investigating accuracy of the input data through the lens of non- technical person (social and ethical point of view). ā€¢ However, bias may also come from methodological mistakes. ā€¢ Machine Learning models are often thought of as black boxes that are impossible to interpret. ā€¢ In the end, these models are used by humans who need to trust them, understand the errors they make, and the reasoning behind their predictions. ā€¢ Giving them some kind of explainability is very important.
  • 18. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 ML workflow from training to deployment Source: https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/ sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 The problem of ML workflow ā€¢ The problem here, as we can see by the doubts of the user, is that the prediction comes with no justification. ā€¢ Before deploying any ML model we are more or less aware of its error. ā€¢ But this only gives us a certain number in the loss scale, or quantifies a certain numerical distance between the labels in the data and the predicted labels before deployment. ā€¢ Can we trust this error above everything? ā€¢ Even if there is no actual problem with the predictions, we would like to understand why the model is saying what it is saying. You can have good results on test data, and get pretty accurate predictions, but sometimes that is not enough. We use some data to train a model through an specific learning process. This learning process results in a learned function, which can be then fed inputs, and it outputs a prediction in an specific interface, which is what the final user sees and interacts with.
  • 19. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 The shifting trend of AI research The focus of AI research is slowly turning towards the transparency and explainability of these models. We want to know why they come up with the predictions they output. Source: https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/ sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 6 End of File
  • 20. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Explainable Artificial Intelligence (Part 02) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 #1: Verifying that AI model works as expected Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
  • 21. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 #2: Understand weakness and improve AI model Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 #3: Interpretability in sciences Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018
  • 22. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 #4: Learn new things from a learning machine Source: Samek and Binder, Tutorial on Interpretable Machine Learning, MICCAI 2018 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Explainability vs Interpretability Features Value Feature 1 0.03 Feature 2 0.5 Feature 3 0.71 Feature 4 0.52 Feature 5 0.11 Interpretable AI Features Value Interpretation Feature 1 0.03 30% represents N Feature 2 0.5 20% represents A Feature 3 0.71 15% represents N Feature 4 0.52 10% represents N Feature 5 0.11 15% represents A Classes: Normal (N) and Abnormal (A) Explainable AI Determined based on probability of the perturbation data to the real data Interpretation Features Value Interpretation Feature 1 0.03 30% strongly indicates N Feature 2 0.5 20% indicates A Feature 3 0.71 15% indicates N Feature 4 0.52 10% indicates N Feature 5 0.11 15% strongly indicates A Determined based on important feature score between each score to the class Explanation We can determine how strong the feature gives impact to the class
  • 23. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 ML workflow with explainable model Source: https://howtolearnmachinelearning.com/articles/explainable-artificial-intelligence/ The ML model not only has the capacity of giving us a prediction, but also of explaining why it makes that prediction. The new explanation interface displays additional information that can give our user some insights into why such prediction was made. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8 8 End of File
  • 24. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Malicious Use of AI: Deepfakes (Part 01) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 What is Deepfakes? ā€¢ Deepfakes are artificially created videos, images, or audio files created using deep learning models. ā€¢ For example, existing video sequences are used and faked by replacing faces. ā€¢ They are intended to appear as realistic as possible, even though they were generated by a machine learning model. ā€¢ In addition to using deepfakes for private videos, they can also be used to disseminate targeted misinformation.
  • 25. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Types of Deepfakes ā€¢ Face Swapping: The face and facial expressions of person A should be projected onto the body of person B. This can even go as far as replacing the entire body of person B in a video or image with the body of person A. ā€¢ Body Puppetry: Movements, gestures, or facial expressions of person A are recorded and these are then to be artificially taken over by person B. ā€¢ Voice Swapping: A freely written text is to be performed as authentically as possible with the voice of a person. This method can also be combined with body puppetry, for example. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Basic concept ā€¢ Autoencoders are machine learning models that consist of an encoder part and a decoder part. ā€¢ We can use the same image as input and output. ā€¢ This would allow the autoencoder to learn a vector representation of the image that is as compressed as possible and stores all the important features. ā€¢ This vector is then in turn used by the decoder to generate the original image from it again. ā€¢ The better the learned vector representation of the autoencoder, the more realistic the generated image. Source: https://jonathan-hui.medium.com/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9 https://towardsdatascience.com/what-are-deepfakes-and-how-do-you-recognize-them-f9ab1a143456
  • 26. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Basic concept ā€¢ To decode the features, we use separate decoders for person A and person B. ā€¢ After the training, we process the video frame-by-frame to swap a person's face with another. ā€¢ Using face detection, we extract the face of person A out and feed it into the encoder. ā€¢ However, instead of feeding to its original decoder, we use the decoder of the person B to reconstruct the picture. ā€¢ Thus, we draw person B with the features of A in the original video. Then we merge the newly created face into the original image. Source: https://jonathan-hui.medium.com/how-deep-learning-fakes-videos-deepfakes-and-how-to-detect-it-c0b50fbf7cb9 https://towardsdatascience.com/what-are-deepfakes-and-how-do-you-recognize-them-f9ab1a143456 Intuitively, the encoder is detecting face angle, skin tone, facial expression, lighting and other information that is important to reconstruct the person A. When we use the second decoder to reconstruct the image, we are drawing person B but with the context of A. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 6 End of File
  • 27. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Malicious Use of AI: Deepfakes (Part 02) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
  • 28. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Using neural networks for synthesizing Obama (1) sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Using neural networks for synthesizing Obama (2) ā€¢ On the right side, we can see the workflow of the lip sync paper. ā€¢ It substitutes the audio of a weekly presidential address with another audio (input audio). ā€¢ In the process, it re-synthesizes the mouth and the chin area so its movement is in-sync with the fake audio. ā€¢ Note that the final composite considers proper 3D pose so that what Obama appears to be saying in a target video matches with the input audio track.
  • 29. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Using neural networks for synthesizing Obama (3) ā€¢ First, using an LSTM network, the audio is transformed into a sequence of 18 landmark points in the lip. This LSTM outputs a sparse mouth shape for each output video frame. ā€¢ Given the mouth shape , it synthesizes mouth texture for the mouth and the chin area. These mouth textures are then composed with the target video to recreate the target frame. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Using neural networks for synthesizing Obama (4) ā€¢ We want the mouth texture to look real but also have a temporal smoothness. ā€¢ So the application looks over the target videos to search for candidates' frames that have the same calculated mouth shape as what we want. ā€¢ Then we merge the candidates together using a median function. As shown in the images, if we use more candidate frames to do the averaging, the image gets blurred while the temporal smoothness improves (no flicking). ā€¢ On the other hand, the image can be less blurry but we may see flicking when transiting from one frame to another. ā€¢ To compensate for the blurry, teeth enhancement and sharpening is performed. But obviously, the sharpness cannot be completely restored for the lower lip.
  • 30. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 Using neural networks for synthesizing Obama (5) ā€¢ Finally, we need to retime the frame so we know where to insert the fake mouth texture. ā€¢ This helps us to sync with the head movement. In particular, Obama's head usually stops moving when he pauses his speech. ā€¢ In the second figure, the top row below is the original video frames for the input audio we used. We insert this input audio to our target video (the second row). ā€¢ When compare it side-by-side, we realize the mouth movement from the original video is very close to the fabricated mouth movement. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8 8 End of File
  • 31. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA AI Based Cyberattacks (Part 01) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Cybersecurity ā€¢ Cybersecurity is an arms race, where attackers and defenders play a constantly evolving cat- and-mouse game. ā€¢ In the PC era, we witnessed malware threats emerging from viruses and worms, and the security industry responded with antivirus software. ā€¢ In the web era, attacks such as cross-site request forgery (CSRF) and cross-site scripting (XSS) were challenging web applications. ā€¢ What about the era of Artificial Intelligence? What kind of threat that we may face in this era?
  • 32. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 How AI can be used in cybersecurity ā€¢ Think about what would happen when attackers start using the power of deep learning and machine learning for their advantage? ā€¢ The malware operates AI algorithms as an integral part of its business logic. ā€¢ For example, using AI based anomaly detection algorithms to indicate irregular user and system activity patterns. ā€¢ An interesting use case can be found in DeepLocker, presented by IBM Security researches in Black Hat USA 2018. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 DeepLocker ā€¢ IBM Research developed DeepLocker to better understand how several existing AI models can be combined with current malware techniques to create a particularly challenging new breed of malware. ā€¢ This class of AI-powered evasive malware conceals its intent until it reaches a specific victim. ā€¢ It unleashes its malicious action as soon as the AI model identifies the target through indicators like facial recognition, geolocation and voice recognition.
  • 33. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 DeepLocker Mechanism (1) ā€¢ DeepLocker uses a deep neural network (DNN) model to accurately identify the target attributes and conceal the intent of the malicious payload. The two core functions are implemented through the two processes: concealment and unlocking. Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 DeepLocker Mechanism (2) ā€¢ During concealment: DeepLocker uses the deep neural networks (DNN) to conduct dynamic concealment of the symmetric key. The key is employed to encrypt a plain payload into a cipher payload. Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163.
  • 34. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 DeepLocker Mechanism (3) ā€¢ During unlocking: the DNN first accurately identifies the target attribute (as shown by the facial image of Tom Cruise) to assist generating the key for decoding the cipher payload, and then unleashes an attack. Ji, T., Fang, B., Cui, X., Wang, Z., Diao, J., Wang, T., & Yu, W. (2020). The First Step Towards Modeling Unbreakable Malware. arXiv preprint arXiv:2008.06163. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8 8 End of File
  • 35. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA AI Based Cyberattacks (Part 02) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Adversarial machine learning ā€¢ Adversarial machine learning is a machine learning method that aims to trick machine learning models by providing deceptive input or stealing parameters of model. ā€¢ Hence, it includes both the generation and detection of adversarial examples, which are inputs specially created to deceive classifiers. ā€¢ Adversarial machine learning have been extensively explored in some areas, such as image classification and spam detection. ā€¢ The most extensive studies of adversarial machine learning have been conducted in the area of image recognition.
  • 36. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Why adversarial attack is dangerous? Imagine you are riding a self-driving car. During your riding, your self-driving car ā€œseesā€ Banksyā€™s popular Girl with Balloon big sticker on the lane. Performing an adversarial attack requires taking an input image (left), purposely perturbing it with a noise vector (middle), which forces the AI system to misclassify the input image, ultimately resulting in an incorrect classification, potentially with major consequences (right). Source: https://pyimagesearch.com/2020/10/19/adversarial-images-and-attacks-with-keras-and-tensorflow/ sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Adversarial attack and steganography ā€¢ The adversarial images are images that have pixels purposely and intentionally perturbed to confuse and deceive AI models. At the same time, these images look harmless and innocent to humans. ā€¢ The concept is similar to steganography. ā€¢ Using steganography algorithms, we can embed data (such as plaintext messages) in an image without distorting the appearance of the image itself. This image can be innocently transmitted to the receiver, who can then extract the hidden message from the image. ā€¢ Similarly, adversarial attacks embed a message in an input image ā€” but instead of a plaintext message meant for human consumption, an adversarial attack instead embeds a noise vector in the input image. This noise vector is purposely constructed to fool and confuse AI models. https://www.commonlounge.com/discussion/4bc16dbc2c7145ff87ad0f0d5401a242
  • 37. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Example of adversarial attack Finlayson, S. G., Bowers, J. D., Ito, J., Zittrain, J. L., Beam, A. L., & Kohane, I. S. (2019). Adversarial attacks on medical machine learning. Science, 363(6433), 1287-1289. sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 6 End of File
  • 38. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA AI Based Cyberattacks (Part 03) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 Types of adversarial attacks and how to protect machine learning system
  • 39. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Poisoning attack ā€¢ A poisoning attack focuses on the data used to train a model. ā€¢ An attacker will change existing data or introduce incorrectly labelled data. ā€¢ The model trained on this data will then make incorrect predictions on correctly labelled data. ā€¢ For example, an attacker could relabel fraud cases as not fraud. ā€¢ The attacker could do this for only specific fraud cases so when they attempt to commit fraud in the same way the system will not reject them. Source: https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Evasion attack ā€¢ These types of attacks are more associated with fields like image recognition. ā€¢ Attackers can create images that look perfectly normal to a human but results in completely incorrect predictions. ā€¢ The attacker modifies data used by a model to make predictions and not data used to train models. Source: https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6 Goodfellow, I. J., Shlens, J., & Szegedy, C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.
  • 40. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Model stealing ā€¢ Model stealing attacks also focus on the model after it has been trained. ā€¢ Specifically, an attacker wants to learn about the structure of the model or or even a modelā€™s hyperparameters. ā€¢ For example, an attacker could identify exactly what words a spam filtering model will flag. ā€¢ The attacker could then alter spam/ phishing emails to ensure they are delivered to the inbox. Source: https://towardsdatascience.com/how-to-attack-machine-learning-evasion-poisoning-inference-trojans-backdoors-a7cb5832595c sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Protecting machine learning system ā€¢ Adversarial training: train the model to identify adversarial examples. By training/ retraining a model using these examples, it will be able to identify future adversarial attacks. ā€¢ Switching models: the second approach is to use multiple models within your system. The model used to make predictions is changed randomly. Poisoning or findings adversarial examples for multiple models is much harder than for just one. ā€¢ Generalised model: instead of switching models, they are combined to create one generalized model. This means all the individual models would contribute to the final prediction. An adversarial example may be able to trick one model but it would likely not be effective against all of them Source: https://towardsdatascience.com/what-is-adversarial-machine-learning-dbe7110433d6
  • 41. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 7 End of File
  • 42. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Ethics in Artificial Intelligence (Part 01) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2
  • 43. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 Some concerns on AI technology ā€¢ Bias: AI systems can be biased because they're designed to look for patterns in data and favour those patterns. ā€¢ Liability: AI systems can't be perfect. When mistakes are made, who's responsible? ā€¢ Security: As AI systems advance, how do we stop bad actors from weaponizing them? What happens if robots can fight and drones can attack? ā€¢ Human Interaction: There's already a decline in person-to- person interactions. Are we sacrificing humanity's social aspect? ā€¢ Employment: Repetitive, predictable jobs that can be automated will be automated. Those replaced have to retrain themselves in areas where robots can't come in easily, such as, creative or critical thinking. ā€¢ Wealth Inequality: Companies rich enough to invest in AI will get richer by reducing cost and being more efficient. ā€¢ Power & Control: Big companies that use AI can control and manipulate how society thinks and acts. Source: https://www.weforum.org/agenda/2016/10/top-10-ethical-issues-in-artificial-intelligence/ https://www.wbpro.com/ethics-in-artificial-intelligence/ https://devopedia.org/ethical-ai#The-Institute-for-Ethical-AI-&-ML-2019 https://www.fast.ai/2018/09/24/ai-ethics-resources/ sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Guiding principal for ethical AI Source: https://www.wbpro.com/ethics-in-artificial-intelligence/
  • 44. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 5 End of File
  • 45. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 1 Sunu Wibirama sunu@ugm.ac.id Department of Electrical and Information Engineering Faculty of Engineering Universitas Gadjah Mada INDONESIA Ethics in Artificial Intelligence (Part 02) Kecerdasan Buatan | Artificial Intelligence Version: January 2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 2 How can we use AI for social good?
  • 46. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 3 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 4 Some of AI capabilities for societal benefit Source: McKinsey Global Institute analysis
  • 47. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 5 Some of AI capabilities for societal benefit Source: McKinsey Global Institute analysis sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 6 Some of AI capabilities for societal benefit Source: McKinsey Global Institute analysis
  • 48. 19/05/2022 sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 7 Some of AI capabilities for societal benefit Source: McKinsey Global Institute analysis sunu@ugm.ac.id Copyright Ā© 2022 Sunu Wibirama | Do not distribute without permission @sunu_wibirama 8 8 End of File