SlideShare a Scribd company logo
1 of 32
Download to read offline
Dr. S D Sudarsan
Executive Director (C-DAC, Bangalore)
19 February 2024
Generative AI
Opportunities & Challenges
Centre for Development of Advanced Computing (C-DAC)
Vision
To emerge as the premier R&D
Institution for the design,
development and deployment of
world class electronic and ICT
solutions for economic & human
advancement.
Professionals
Locations
Year Established
1988 12 6000+
Premier R&D organization of the Ministry of
Electronics & Information Technology (MeitY) to
carry out R&D in ICT, Electronics & Associated
Domains
C-DAC Bangalore
C-DAC, Knowledge Park
No.1, Old Madras Road
Byappanahalli
Bengaluru - 560038
C-DAC, Electronic City
No 68, 1st Phase
Electronics City
Bangalore - 560100
Supercomputer @ C-DAC Bangalore - PARAM Utkarsh
India’s first 20 PF Data Centre @ C-DAC, Bengaluru
Groundbreaking ceremony was Organized in December-2023
1. Introduction
Evolution of AI
What is Generative AI? (Contd.)
Generative Artificial Intelligence (AI) is type of AI that are designed to generate novel, original content
including text, images, audio, code, and videos, in response to prompts.
GenAI
DL
ANN
Statistical
ML
What is Generative AI? (contd.)
Ref: R Bommasani et al., 2021
GenAI – Taxonomy of Applications
Type Example Application
01 – Advisory AI that, given access to a
company’s financials, can provide
fiscal/tax guidance.
02 – Assistive An AI that can book all aspects of
business travel based on a calendar
invite.
03 – Cooperative Involves a “back and forth”
protocol where generative AI and
the user work collaboratively
towards a goal. (e.g. Github
Copilot)
04 – Augmentative AI that equips a UX designer to
produce a functioning app from
their design tool for smart policing.
05 – Digitally
Autonomous
An AI agent that acts as an elite
cybersecurity officer.
06 – Physically
Autonomous
A humanoid AI capable of
performing Policing.
Moving towards digitally and/or physically
autonomous systems… Source: nuvalence.io
Can you Recognize this Gentleman?
“This Person Does not Exist”
Generated by AI
https://thispersondoesnotexist.com/
What is the next scene?
GenAI assisted screenplay
18
RNN – Image Captioning
IMAGE CAPTIONING & DUBBING
19
2. GenAI &
Cybersecurity
GenAI – Cybersecurity Market Trends
Source: marketresearch.biz
GenAI and Cybersecurity Opportunities
By learning the patterns of network traffic,
generative models can flag unusual behavior
that might indicate a cyberattack.
Generative adversarial networks (GANs) models
can create realistic phishing pages to test an
organization’s defenses or identify phishing
websites in real time.
Simulating cyberattack to train organization's
incident response teams and practice responses
to different cyber threats.
Creates synthetic datasets for training the
models in a controlled and privacy-preserving
manner. Test and evaluate security solutions
without using real, potentially sensitive data.
Creates decoy assets or honeypots within a
network to attract attackers.
Anonymize sensitive data before it is shared or
analyzed, ensuring that privacy regulations are
followed while still allowing for meaningful
analysis.
Create visual representations of complex
cybersecurity data, making it easier for security
analysts to identify patterns and anomalies in
large datasets.
Identifies and blocks inappropriate or harmful
content in emails, chat messages, or social
media.
Generative models can analyze patterns in
passwords and generate recommendations for
stronger, more secure passwords.
Generates variations of known malware
samples to stay ahead of evolving malware
threats by creating new signatures and
improving detection capabilities.
GenAI and Cybersecurity – A Tale of Attackers & Defenders
Source: cyberdom.blog
Gen AI – Challenges
Emilio Ferrara, 2023
Case Study 3: GenAI Attacks on Tuberculosis Detection using CT Scan
Ref: Li Y eta al, 2023
Invisible Data
Perturbation
Original CT scan Poisoned CT scan
GenAI
“Between hopes and fears for mankind”
5. The Way Ahead…
Gartner’s Hype Cycle – Aug’2023
GenAI may reach
peak in 2-5 years
Source: Gartner
AI – The Way Ahead
More Opportunities
More Challenges…
GenAI Threat Mitigation
GenAI Stakeholders shall
focus on:
AI Trust, Risk and Security
Management (AI TRiSM)
Democratization of
Generative AI
Continuous Threat Exposure
Management (CTEM)
Governance Frameworks
Source: Gartner
Thank you!
Questions?

More Related Content

Similar to CDAC presentation as part of Global AI Festival and Future

International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...ijscai
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityTechinator
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)gerogepatton
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)ijscai
 
Call for Research Articles - International Conference on AI, Data Mining and ...
Call for Research Articles - International Conference on AI, Data Mining and ...Call for Research Articles - International Conference on AI, Data Mining and ...
Call for Research Articles - International Conference on AI, Data Mining and ...ijistjournal
 
Digital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfDigital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfGeeta Adhikari
 
Artificial Intelligence in Organizations
Artificial Intelligence in OrganizationsArtificial Intelligence in Organizations
Artificial Intelligence in OrganizationsIRJET Journal
 
Submit Your Research Articles - International Conference on AI, Data Mining a...
Submit Your Research Articles - International Conference on AI, Data Mining a...Submit Your Research Articles - International Conference on AI, Data Mining a...
Submit Your Research Articles - International Conference on AI, Data Mining a...IJNSA Journal
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)mlaij
 
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...IJDKP
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdfseotechinator
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurityArjitDas2
 
Will Data Science Replaced by AI?- GICSEH.pptx
Will Data Science Replaced by AI?- GICSEH.pptxWill Data Science Replaced by AI?- GICSEH.pptx
Will Data Science Replaced by AI?- GICSEH.pptxGICSEH
 
Quant university MRM and machine learning
Quant university MRM and machine learningQuant university MRM and machine learning
Quant university MRM and machine learningQuantUniversity
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 

Similar to CDAC presentation as part of Global AI Festival and Future (20)

International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
1.pdf
1.pdf1.pdf
1.pdf
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)
 
Call for Research Articles - International Conference on AI, Data Mining and ...
Call for Research Articles - International Conference on AI, Data Mining and ...Call for Research Articles - International Conference on AI, Data Mining and ...
Call for Research Articles - International Conference on AI, Data Mining and ...
 
Digital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdfDigital Evidence Analysing Industry in India.pdf
Digital Evidence Analysing Industry in India.pdf
 
Artificial Intelligence in Organizations
Artificial Intelligence in OrganizationsArtificial Intelligence in Organizations
Artificial Intelligence in Organizations
 
Submit Your Research Articles - International Conference on AI, Data Mining a...
Submit Your Research Articles - International Conference on AI, Data Mining a...Submit Your Research Articles - International Conference on AI, Data Mining a...
Submit Your Research Articles - International Conference on AI, Data Mining a...
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)International Conference on AI, Data Mining and Data Science (AIDD 2023)
International Conference on AI, Data Mining and Data Science (AIDD 2023)
 
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...
CALL FOR PAPERS - International Conference on AI, Data Mining and Data Scienc...
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Sudharmendra's Resume_02.pdf
Sudharmendra's Resume_02.pdfSudharmendra's Resume_02.pdf
Sudharmendra's Resume_02.pdf
 
Will Data Science Replaced by AI?- GICSEH.pptx
Will Data Science Replaced by AI?- GICSEH.pptxWill Data Science Replaced by AI?- GICSEH.pptx
Will Data Science Replaced by AI?- GICSEH.pptx
 
Quant university MRM and machine learning
Quant university MRM and machine learningQuant university MRM and machine learning
Quant university MRM and machine learning
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 

More from Object Automation

RTL DESIGN IN ML WORLD_OBJECT AUTOMATION Inc
RTL DESIGN IN ML WORLD_OBJECT AUTOMATION IncRTL DESIGN IN ML WORLD_OBJECT AUTOMATION Inc
RTL DESIGN IN ML WORLD_OBJECT AUTOMATION IncObject Automation
 
CHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshopCHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshopObject Automation
 
RTL Design Methodologies_Object Automation Inc
RTL Design Methodologies_Object Automation IncRTL Design Methodologies_Object Automation Inc
RTL Design Methodologies_Object Automation IncObject Automation
 
High-Level Synthesis for the Design of AI Chips
High-Level Synthesis for the Design of AI ChipsHigh-Level Synthesis for the Design of AI Chips
High-Level Synthesis for the Design of AI ChipsObject Automation
 
AI-Inspired IOT Chiplets and 3D Heterogeneous Integration
AI-Inspired IOT Chiplets and 3D Heterogeneous IntegrationAI-Inspired IOT Chiplets and 3D Heterogeneous Integration
AI-Inspired IOT Chiplets and 3D Heterogeneous IntegrationObject Automation
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncObject Automation
 
Global AI Festivla and Future one day event
Global AI Festivla and Future one day eventGlobal AI Festivla and Future one day event
Global AI Festivla and Future one day eventObject Automation
 
Generative AI In Logistics_Object Automation
Generative AI In Logistics_Object AutomationGenerative AI In Logistics_Object Automation
Generative AI In Logistics_Object AutomationObject Automation
 
Gen AI_Object Automation_TechnologyWorkshop
Gen AI_Object Automation_TechnologyWorkshopGen AI_Object Automation_TechnologyWorkshop
Gen AI_Object Automation_TechnologyWorkshopObject Automation
 
Deploying Pretrained Model In Edge IoT Devices.pdf
Deploying Pretrained Model In Edge IoT Devices.pdfDeploying Pretrained Model In Edge IoT Devices.pdf
Deploying Pretrained Model In Edge IoT Devices.pdfObject Automation
 
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdfAI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdfObject Automation
 
5G Edge Computing_Object Automation workshop
5G Edge Computing_Object Automation workshop5G Edge Computing_Object Automation workshop
5G Edge Computing_Object Automation workshopObject Automation
 
Course_Object Automation.pdf
Course_Object Automation.pdfCourse_Object Automation.pdf
Course_Object Automation.pdfObject Automation
 
Enterprise AI by using IBM DB2
Enterprise AI by using IBM DB2Enterprise AI by using IBM DB2
Enterprise AI by using IBM DB2Object Automation
 

More from Object Automation (20)

RTL DESIGN IN ML WORLD_OBJECT AUTOMATION Inc
RTL DESIGN IN ML WORLD_OBJECT AUTOMATION IncRTL DESIGN IN ML WORLD_OBJECT AUTOMATION Inc
RTL DESIGN IN ML WORLD_OBJECT AUTOMATION Inc
 
CHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshopCHIPS Alliance_Object Automation Inc_workshop
CHIPS Alliance_Object Automation Inc_workshop
 
RTL Design Methodologies_Object Automation Inc
RTL Design Methodologies_Object Automation IncRTL Design Methodologies_Object Automation Inc
RTL Design Methodologies_Object Automation Inc
 
High-Level Synthesis for the Design of AI Chips
High-Level Synthesis for the Design of AI ChipsHigh-Level Synthesis for the Design of AI Chips
High-Level Synthesis for the Design of AI Chips
 
AI-Inspired IOT Chiplets and 3D Heterogeneous Integration
AI-Inspired IOT Chiplets and 3D Heterogeneous IntegrationAI-Inspired IOT Chiplets and 3D Heterogeneous Integration
AI-Inspired IOT Chiplets and 3D Heterogeneous Integration
 
GenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation IncGenAI and AI GCC State of AI_Object Automation Inc
GenAI and AI GCC State of AI_Object Automation Inc
 
Global AI Festivla and Future one day event
Global AI Festivla and Future one day eventGlobal AI Festivla and Future one day event
Global AI Festivla and Future one day event
 
Generative AI In Logistics_Object Automation
Generative AI In Logistics_Object AutomationGenerative AI In Logistics_Object Automation
Generative AI In Logistics_Object Automation
 
Gen AI_Object Automation_TechnologyWorkshop
Gen AI_Object Automation_TechnologyWorkshopGen AI_Object Automation_TechnologyWorkshop
Gen AI_Object Automation_TechnologyWorkshop
 
Deploying Pretrained Model In Edge IoT Devices.pdf
Deploying Pretrained Model In Edge IoT Devices.pdfDeploying Pretrained Model In Edge IoT Devices.pdf
Deploying Pretrained Model In Edge IoT Devices.pdf
 
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdfAI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
AI-INSPIRED IOT CHIPLETS AND 3D HETEROGENEOUS INTEGRATION.pdf
 
5G Edge Computing_Object Automation workshop
5G Edge Computing_Object Automation workshop5G Edge Computing_Object Automation workshop
5G Edge Computing_Object Automation workshop
 
COE AI Lab Universities
COE AI Lab UniversitiesCOE AI Lab Universities
COE AI Lab Universities
 
Bootcamp_AIApps.pdf
Bootcamp_AIApps.pdfBootcamp_AIApps.pdf
Bootcamp_AIApps.pdf
 
Bootcamp_AIApps.pdf
Bootcamp_AIApps.pdfBootcamp_AIApps.pdf
Bootcamp_AIApps.pdf
 
Bootcamp_AIAppsUCSD.pptx
Bootcamp_AIAppsUCSD.pptxBootcamp_AIAppsUCSD.pptx
Bootcamp_AIAppsUCSD.pptx
 
Course_Object Automation.pdf
Course_Object Automation.pdfCourse_Object Automation.pdf
Course_Object Automation.pdf
 
Enterprise AI_New.pdf
Enterprise AI_New.pdfEnterprise AI_New.pdf
Enterprise AI_New.pdf
 
Super AI tools
Super AI toolsSuper AI tools
Super AI tools
 
Enterprise AI by using IBM DB2
Enterprise AI by using IBM DB2Enterprise AI by using IBM DB2
Enterprise AI by using IBM DB2
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

CDAC presentation as part of Global AI Festival and Future

  • 1. Dr. S D Sudarsan Executive Director (C-DAC, Bangalore) 19 February 2024 Generative AI Opportunities & Challenges
  • 2. Centre for Development of Advanced Computing (C-DAC) Vision To emerge as the premier R&D Institution for the design, development and deployment of world class electronic and ICT solutions for economic & human advancement. Professionals Locations Year Established 1988 12 6000+ Premier R&D organization of the Ministry of Electronics & Information Technology (MeitY) to carry out R&D in ICT, Electronics & Associated Domains
  • 3.
  • 4. C-DAC Bangalore C-DAC, Knowledge Park No.1, Old Madras Road Byappanahalli Bengaluru - 560038 C-DAC, Electronic City No 68, 1st Phase Electronics City Bangalore - 560100
  • 5.
  • 6. Supercomputer @ C-DAC Bangalore - PARAM Utkarsh
  • 7. India’s first 20 PF Data Centre @ C-DAC, Bengaluru Groundbreaking ceremony was Organized in December-2023
  • 10. What is Generative AI? (Contd.) Generative Artificial Intelligence (AI) is type of AI that are designed to generate novel, original content including text, images, audio, code, and videos, in response to prompts. GenAI DL ANN Statistical ML
  • 11. What is Generative AI? (contd.) Ref: R Bommasani et al., 2021
  • 12. GenAI – Taxonomy of Applications Type Example Application 01 – Advisory AI that, given access to a company’s financials, can provide fiscal/tax guidance. 02 – Assistive An AI that can book all aspects of business travel based on a calendar invite. 03 – Cooperative Involves a “back and forth” protocol where generative AI and the user work collaboratively towards a goal. (e.g. Github Copilot) 04 – Augmentative AI that equips a UX designer to produce a functioning app from their design tool for smart policing. 05 – Digitally Autonomous An AI agent that acts as an elite cybersecurity officer. 06 – Physically Autonomous A humanoid AI capable of performing Policing. Moving towards digitally and/or physically autonomous systems… Source: nuvalence.io
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Can you Recognize this Gentleman? “This Person Does not Exist” Generated by AI https://thispersondoesnotexist.com/
  • 18. What is the next scene? GenAI assisted screenplay 18
  • 19. RNN – Image Captioning IMAGE CAPTIONING & DUBBING 19
  • 21. GenAI – Cybersecurity Market Trends Source: marketresearch.biz
  • 22. GenAI and Cybersecurity Opportunities By learning the patterns of network traffic, generative models can flag unusual behavior that might indicate a cyberattack. Generative adversarial networks (GANs) models can create realistic phishing pages to test an organization’s defenses or identify phishing websites in real time. Simulating cyberattack to train organization's incident response teams and practice responses to different cyber threats. Creates synthetic datasets for training the models in a controlled and privacy-preserving manner. Test and evaluate security solutions without using real, potentially sensitive data. Creates decoy assets or honeypots within a network to attract attackers. Anonymize sensitive data before it is shared or analyzed, ensuring that privacy regulations are followed while still allowing for meaningful analysis. Create visual representations of complex cybersecurity data, making it easier for security analysts to identify patterns and anomalies in large datasets. Identifies and blocks inappropriate or harmful content in emails, chat messages, or social media. Generative models can analyze patterns in passwords and generate recommendations for stronger, more secure passwords. Generates variations of known malware samples to stay ahead of evolving malware threats by creating new signatures and improving detection capabilities.
  • 23. GenAI and Cybersecurity – A Tale of Attackers & Defenders Source: cyberdom.blog
  • 24. Gen AI – Challenges Emilio Ferrara, 2023
  • 25. Case Study 3: GenAI Attacks on Tuberculosis Detection using CT Scan Ref: Li Y eta al, 2023 Invisible Data Perturbation Original CT scan Poisoned CT scan
  • 26. GenAI “Between hopes and fears for mankind”
  • 27. 5. The Way Ahead…
  • 28. Gartner’s Hype Cycle – Aug’2023 GenAI may reach peak in 2-5 years Source: Gartner
  • 29. AI – The Way Ahead
  • 31. GenAI Threat Mitigation GenAI Stakeholders shall focus on: AI Trust, Risk and Security Management (AI TRiSM) Democratization of Generative AI Continuous Threat Exposure Management (CTEM) Governance Frameworks Source: Gartner