SlideShare a Scribd company logo
1 of 14
Fake News in the Age of Artification
Intelligence: Challenges and Solutions
Assoc. Prof. Hoang Viet Long
Faculty of Information Technology
University of Technology and Logistics of Public Security, Vietnam
Contents
 “DeepFakes: “Fake News 2.0” in the Age of Artificial Intelligence
 Do ChatGPT and other AI Chatbots Pose Fake News?
 Can We Stop Fake News?
Definitions
Term Definition Source
Misinformation “false information that is
spread, regardless of whether
there is intent to mislead.”
Dictionary.com
Disinformation “all forms of false, inaccurate, or
misleading information
designed, presented and
promoted to intentionally cause
public harm or for profit”
European Commission
Fake news "purposefully crafted, sensational,
emotionally charged, misleading
or totally fabricated information
that mimics the form of
mainstream news"
https://www.buzzfeed.co
m/craigsilverman/how-
macedonia-became-a-
global-hub-for-pro-
trump-misinfo
“tất cả các dạng thông tin sai lệch, không chính xác hoặc gây nhầm lẫn được tạo ra, trình bày
và phát tán nhằm cố ý gây tổn hại cho cộng đồng hoặc vì lợi nhuận.
This includes
- fake website
- fake picture
- fake video
- fake voice
- networks of fake followers
...
- information generated or manipulated by AI”: Deepfakes
Existing types
StyleGAN’s Generator Architecture
Source: https://theaisummer.com/deepfakes/#what-is-deepfakes
DEEPFAKES = DEEP LEARNING & FAKE
Deepfakes picture
Deepfakes voice
Deepfakes video
2 million deepfakes are online
96% were non-consensual pornography featuring women
Deepfakes Impact on the Crime and Legal Process
 Impact on Crime
Disinformation
Non-consensual pornography
Document fraud: Passport, Identity card,..
Deepfake as a service
 Impact on Police Work
 Fake digital electronic evidence
 Impact on the Legal Process
 New regulations on electronic evidence
Source: https://www.europol.europa.eu/
https://antoanthongtin.vn/chinh-sach-chien-luoc/thach-thuc-cua-deepfake-va-van-
de-thuc-thi-phap-luat-108352
Le Viet Quoc – Cofounder of Google Brain
Ilya Sutskever, Oriol Vinyals, Quoc V Le , Sequence to Sequence Learning with Neural Networks,
Advances in neural information processing systems, 2014 (21580 citations)
https://lena-voita.github.io/nlp_course/seq2seq_and_attention.html
Challenges with ChatGPT
1. Social engineering attacks: Cyber criminals can use chatGPT to socially
engineer victims into divulging confidential information.
2. Malware threats: Malicious software can be installed on a user’s device
through a malicious link or file received via chatGPT.
3. Phishing attacks: Cyber criminals can use chatGPT to send malicious links
or messages to trick victims into revealing sensitive information or
downloading malware.
4. Identity theft: ChatGPT conversations can be used to gain access to a
person’s identity, allowing cyber criminals to steal data or commit fraud.
5. Data leakage: If data is shared on chatGPT, it can be accessed by
unauthorized users, leading to data leakage.
6. This tool is going to be the most powerful tool for spreading
misinformation that has ever been on the internet
Disinformation Researchers Raise Alarms About A.I. Chatbots
Source: https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html
Can we stop fake news?
with author
with publisher
with platform
with amplifier
with reader
Stopping “fake news” when published
deny hosting
deny listing in
DNS directory
block internet
traffic to “fake
news” site
Label „fake news“ on Facebook
Stopping fake news at platforms
needs collaboration of platforms
Facebook: just released a database of 100,000 deepfakes
pictures to teach AI how to spot them.
Google: released 3,000 AI-generated videos
Deepfake Colab Projects: TPUs and GPUs
Source: Dauer, Lieutenant, Emeryville Police Department, California, Law
Enforcement in the Era of Deepfakes, Police Chief Magazine
References
1. Phạm Thị Ánh, Đoàn Ngọc Tú, Nguyễn Văn Căn, Nguyễn Đăng Tiến, Hoàng
Việt Long, Đề xuất một mô hình học sâu trong phát hiện Video deepfakes,
Hội thảo quốc gia về Một số vấn đề chọn lọc trong CNTT & truyền thông
2020.
2. Tong Anh Tuan, Hoang Viet Long, David Taniar, On Detecting and Classifying
DGA Botnets and their Families, Computers & Security, Volume
113, February 2022, 102549.
3. Nguyen Phuong Dong, Hoang Viet Long, Nguyen Thi Kim Son, The dynamical
behaviors of fractional-order SE1E2IQR epidemic model for malware
propagation on Wireless Sensor Network, Communications in Nonlinear
Science and Numerical Simulation, Volume 111, August 2022, 106428.
4. Žiga Turk, Technology as Enabler of Fake News and a Potential Tool to
Combat it, Research commissioned by Policy Department A on the request
of IMCO Committee.
HoangVietLong_FakeNews.pptx

More Related Content

Similar to HoangVietLong_FakeNews.pptx

Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Security of WhatsApp 1 Christophe Bassono Su.docx
Security of WhatsApp  1  Christophe Bassono       Su.docxSecurity of WhatsApp  1  Christophe Bassono       Su.docx
Security of WhatsApp 1 Christophe Bassono Su.docxjeffreye3
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)Chris Marsden
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfCiente
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?CPPGroup Plc
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent Mwando
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 

Similar to HoangVietLong_FakeNews.pptx (20)

Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Security of WhatsApp 1 Christophe Bassono Su.docx
Security of WhatsApp  1  Christophe Bassono       Su.docxSecurity of WhatsApp  1  Christophe Bassono       Su.docx
Security of WhatsApp 1 Christophe Bassono Su.docx
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Surveillance Software.docx
Surveillance Software.docxSurveillance Software.docx
Surveillance Software.docx
 
Polinter11
Polinter11Polinter11
Polinter11
 
2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)2019: Regulating disinformation with artificial intelligence (AI)
2019: Regulating disinformation with artificial intelligence (AI)
 
What are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdfWhat are the challenges of deepfakes.pdf
What are the challenges of deepfakes.pdf
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
L017146571
L017146571L017146571
L017146571
 
Hacking - how accessible is it?
Hacking - how accessible is it?Hacking - how accessible is it?
Hacking - how accessible is it?
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
Vincent O. Mwando - Encryption
Vincent O. Mwando - EncryptionVincent O. Mwando - Encryption
Vincent O. Mwando - Encryption
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 

Recently uploaded

Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsCEPTES Software Inc
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictJack Cole
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group MeetingAlison Pitt
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeralNABLAS株式会社
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Jon Hansen
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfscitechtalktv
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理pyhepag
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Valters Lauzums
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...ssuserf63bd7
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdfvyankatesh1
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Calllward7
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonPayment Village
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp onlinebalibahu1313
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyRafigAliyev2
 

Recently uploaded (20)

Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPsWebinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
Webinar One View, Multiple Systems No-Code Integration of Salesforce and ERPs
 
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflictSupply chain analytics to combat the effects of Ukraine-Russia-conflict
Supply chain analytics to combat the effects of Ukraine-Russia-conflict
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting2024 Q2 Orange County (CA) Tableau User Group Meeting
2024 Q2 Orange County (CA) Tableau User Group Meeting
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
Machine Learning for Accident Severity Prediction
Machine Learning for Accident Severity PredictionMachine Learning for Accident Severity Prediction
Machine Learning for Accident Severity Prediction
 
Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)Atlantic Grupa Case Study (Mintec Data AI)
Atlantic Grupa Case Study (Mintec Data AI)
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
Artificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdfArtificial_General_Intelligence__storm_gen_article.pdf
Artificial_General_Intelligence__storm_gen_article.pdf
 
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
一比一原版(Monash毕业证书)莫纳什大学毕业证成绩单如何办理
 
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
Data Analytics for Digital Marketing Lecture for Advanced Digital & Social Me...
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call2024 Q1 Tableau User Group Leader Quarterly Call
2024 Q1 Tableau User Group Leader Quarterly Call
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
How I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prisonHow I opened a fake bank account and didn't go to prison
How I opened a fake bank account and didn't go to prison
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 
Fuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertaintyFuzzy Sets decision making under information of uncertainty
Fuzzy Sets decision making under information of uncertainty
 
Slip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp ClaimsSlip-and-fall Injuries: Top Workers' Comp Claims
Slip-and-fall Injuries: Top Workers' Comp Claims
 

HoangVietLong_FakeNews.pptx

  • 1. Fake News in the Age of Artification Intelligence: Challenges and Solutions Assoc. Prof. Hoang Viet Long Faculty of Information Technology University of Technology and Logistics of Public Security, Vietnam
  • 2. Contents  “DeepFakes: “Fake News 2.0” in the Age of Artificial Intelligence  Do ChatGPT and other AI Chatbots Pose Fake News?  Can We Stop Fake News?
  • 3. Definitions Term Definition Source Misinformation “false information that is spread, regardless of whether there is intent to mislead.” Dictionary.com Disinformation “all forms of false, inaccurate, or misleading information designed, presented and promoted to intentionally cause public harm or for profit” European Commission Fake news "purposefully crafted, sensational, emotionally charged, misleading or totally fabricated information that mimics the form of mainstream news" https://www.buzzfeed.co m/craigsilverman/how- macedonia-became-a- global-hub-for-pro- trump-misinfo “tất cả các dạng thông tin sai lệch, không chính xác hoặc gây nhầm lẫn được tạo ra, trình bày và phát tán nhằm cố ý gây tổn hại cho cộng đồng hoặc vì lợi nhuận.
  • 4. This includes - fake website - fake picture - fake video - fake voice - networks of fake followers ... - information generated or manipulated by AI”: Deepfakes Existing types
  • 5. StyleGAN’s Generator Architecture Source: https://theaisummer.com/deepfakes/#what-is-deepfakes DEEPFAKES = DEEP LEARNING & FAKE Deepfakes picture Deepfakes voice Deepfakes video 2 million deepfakes are online 96% were non-consensual pornography featuring women
  • 6. Deepfakes Impact on the Crime and Legal Process  Impact on Crime Disinformation Non-consensual pornography Document fraud: Passport, Identity card,.. Deepfake as a service  Impact on Police Work  Fake digital electronic evidence  Impact on the Legal Process  New regulations on electronic evidence Source: https://www.europol.europa.eu/ https://antoanthongtin.vn/chinh-sach-chien-luoc/thach-thuc-cua-deepfake-va-van- de-thuc-thi-phap-luat-108352
  • 7. Le Viet Quoc – Cofounder of Google Brain Ilya Sutskever, Oriol Vinyals, Quoc V Le , Sequence to Sequence Learning with Neural Networks, Advances in neural information processing systems, 2014 (21580 citations) https://lena-voita.github.io/nlp_course/seq2seq_and_attention.html
  • 8. Challenges with ChatGPT 1. Social engineering attacks: Cyber criminals can use chatGPT to socially engineer victims into divulging confidential information. 2. Malware threats: Malicious software can be installed on a user’s device through a malicious link or file received via chatGPT. 3. Phishing attacks: Cyber criminals can use chatGPT to send malicious links or messages to trick victims into revealing sensitive information or downloading malware. 4. Identity theft: ChatGPT conversations can be used to gain access to a person’s identity, allowing cyber criminals to steal data or commit fraud. 5. Data leakage: If data is shared on chatGPT, it can be accessed by unauthorized users, leading to data leakage. 6. This tool is going to be the most powerful tool for spreading misinformation that has ever been on the internet Disinformation Researchers Raise Alarms About A.I. Chatbots Source: https://www.nytimes.com/2023/02/08/technology/ai-chatbots-disinformation.html
  • 9. Can we stop fake news? with author with publisher with platform with amplifier with reader
  • 10. Stopping “fake news” when published deny hosting deny listing in DNS directory block internet traffic to “fake news” site
  • 11. Label „fake news“ on Facebook
  • 12. Stopping fake news at platforms needs collaboration of platforms Facebook: just released a database of 100,000 deepfakes pictures to teach AI how to spot them. Google: released 3,000 AI-generated videos Deepfake Colab Projects: TPUs and GPUs Source: Dauer, Lieutenant, Emeryville Police Department, California, Law Enforcement in the Era of Deepfakes, Police Chief Magazine
  • 13. References 1. Phạm Thị Ánh, Đoàn Ngọc Tú, Nguyễn Văn Căn, Nguyễn Đăng Tiến, Hoàng Việt Long, Đề xuất một mô hình học sâu trong phát hiện Video deepfakes, Hội thảo quốc gia về Một số vấn đề chọn lọc trong CNTT & truyền thông 2020. 2. Tong Anh Tuan, Hoang Viet Long, David Taniar, On Detecting and Classifying DGA Botnets and their Families, Computers & Security, Volume 113, February 2022, 102549. 3. Nguyen Phuong Dong, Hoang Viet Long, Nguyen Thi Kim Son, The dynamical behaviors of fractional-order SE1E2IQR epidemic model for malware propagation on Wireless Sensor Network, Communications in Nonlinear Science and Numerical Simulation, Volume 111, August 2022, 106428. 4. Žiga Turk, Technology as Enabler of Fake News and a Potential Tool to Combat it, Research commissioned by Policy Department A on the request of IMCO Committee.

Editor's Notes

  1. - Dictionary.com là tử điển Anh-Anh online do NXB Rock Holdings, Michigan xây dựng - “thông tin sai lệch được lan truyền, bất kể có ý định đánh lừa hay không.” - “cố tình gây hiểu lầm hoặc sai lệch thông tin; câu chuyện hoặc sự kiện bị thao túng; tuyên truyền.” - thông tin được tạo ra có chủ đích, giật gân, gây xúc động, gây hiểu lầm hoặc hoàn toàn bịa đặt bắt chước dạng tin tức chính thống - Thuật ngữ “Fake news” được sử dụng rộng rãi từ năm 2016, ngay trước kỳ bầu cử tổng thống lần thứ 45 của Hoa Kỳ, về sau thuật ngữ này được Donal Trump sử dụng gán nhãn cho những thông tin viết về ông ấy mà ông cho là không đúng nhằm hạ uy tín của ông ấy. Chính vì được Donal Trump sử dụng nhiều nên thuật ngữ “Fake news” cũng trở nên rất phổ biến. - Vào năm 2018: Ủy ban Châu âu giao cho một nhóm chuyên viên cao cấp tổ chức một nghiên cứu về tin giả, các dạng tồn tại của tin giả, nhằm có những cảnh báo cho khách hàng hoặc công dân của EU, và nhóm chuyên viên cao cấp đó đề xuất không sử dụng từ Fake news, dùng từ Disinformation “tất cả các dạng thông tin sai lệch, không chính xác hoặc gây nhầm lẫn được thiết kế, trình bày và quảng bá nhằm cố ý gây tổn hại cho cộng đồng hoặc vì lợi nhuận”
  2. GAN mạng đối nghịch tạo sinh GAN cấu tạo gồm 2 mạng là Generator và Discriminator. Trong khi Generator sinh ra các dữ liệu giống như thật thì Discriminator cố gắng phân biệt đâu là dữ liệu được sinh ra từ Generator và đâu là dữ liệu thật có.
  3. Policy Department for Economic, Scientific and Quality of Life Policies Author: Dr. Žiga TURK, University of Ljubljana, Slovenia Directorate-General for Internal Policies
  4. https://www.technologyreview.com/2020/06/12/1003475/facebooks-deepfake-detection-challenge-neural-network-ai/