3. AI OFFERS TO
WRITE FAKE
NEWS
3
• GPT-2 is the name of the machine
learning model that was trained on a
dataset of 8 million web pages.
• It was able to adapt the style and content
of some of the first pages that it was
given from the data.
• Open AI created an AI algorithm that
has been fed with a really large
amount of data.
• The AI program “learned” through this
information how words are assembled
and aim to predict the next word.
5. LETS CREATE A FAKE NEWS
President of Pakistan will be launching --------------
President of Pakistan will be launching the aircraft carrier at first and after
that he will chair a grand ship naming ceremony at the Karachi Shipyard and Works
Company on August 12.
5
• This is much more complex that I would
have expected
• Is closer to written English literature than
spoken English language
• Is generated extremely quickly (less than a
second maximum for each paragraph)
• Can significantly differ even with the same
input
6. FAKE NEWS FOR AUDIO AND
VIDEO
• The Descript software developed by the company Lyrebird allows a
user to clone a voice based on data samples.
• The amount of information needed to train the algorithm has been
drastically reducing over the years making it possible to create a cloned
voice with minimal amount of data.
• Deepfake type of software uses artificial intelligence to allow a user
to create fake videos of someone by substituting faces.
Add a Footer 6
7. Data poisoning
• Use machine learning against
machine learning
• Data is blood for machine learning.
• Give some misleading blood .
• Research suggests that a 3% training
data set poisoning leads to an 11%
drop in accuracy.
AI-Supported Password
Guessing
• HashCat and John the Ripper
• Generative Adversarial Networks
(GANs)
• This will lead to more accurate and
targeted password guesses and
higher chances for profit.
7
8. HUMAN IMPERSONATION
ON SOCIAL NETWORKING
PLATFORMS
An AI-supported Spotify bot on a forum called
nulled[.]to claims to have the capability to mimic
several Spotify users simultaneously.
It makes use of multiple proxies.
To further evade detection, it also creates playlists
with other songs that follow human-like musical
tastes rather than playlists with random songs, as
the latter might hint at bot-like behavior.
11%
19%
17%
29%
24%
CHART TITLE
Jan Feb Mar Apr May
8
9. PWNAGOTCHI 1.0.0
• Tool that was originally developed for Wi-Fi
hacking through de-authentication attacks.
• Uses a neural network model to improve its
hacking performance via a gamification strategy
• When the system successfully de-authenticates
Wi-Fi credentials, it gets rewarded and learns to
autonomously improve its operation.
9
11. • The next generation AI malware that reach to target
using face recognition.
• The malicious payload will only be unlocked if the
intended target is reached. It achieves this by using a
deep neural network (DNN) AI model.
• It reaches to the target by watching every person face,
face recognition identification.
DEEP LOCKER BY IBM
11