当前位置:网站首页>The first artificial intelligence security competition starts. Three competition questions are waiting for you to fight
The first artificial intelligence security competition starts. Three competition questions are waiting for you to fight
2022-07-28 04:43:00 【TechWeb】
【TechWeb】7 month 13 Daily news , In order to speed up the construction of artificial intelligence security innovation environment , With “ Build together AI Security Enjoy smart future ” As the theme of 2022 The AI security competition was officially launched . As a special competition of Zhongguancun Forum International Frontier Science and technology innovation competition , This competition focuses on the security challenges faced by the AI industry , It aims to solve security problems in a competitive way , Cultivate a high-level AI security team , At the same time, we should strengthen the construction of artificial intelligence governance system and safety evaluation capacity , Help the high-quality development of artificial intelligence industry .

According to introducing , The competition is divided into registration and online preliminary (7 month 13 Japan ~8 month 31 Japan )、 Preliminary evaluation (9 month 1 Japan ~9 month 10 Japan )、 Offline finals and award ceremony (2022 During the Zhongguancun Forum ) Three stages . From now on , The competition is for colleges and universities across the country 、 Scientific research institutes 、 Technology enterprises recruit teams .
As the first event with AI security as the theme in China , There are four highlights in this competition :
Highlight one : Authorities 、 Top universities 、 Innovative enterprises strive to build
This competition is sponsored by Beijing Municipal Commission of science and Technology 、 Zhongguancun Science and Technology Park Management Committee , Under the guidance of Beijing Municipal Bureau of economy and information technology , Zhongguancun National Laboratory 、 National Industrial Information Security Development Research Center 、 Institute of artificial intelligence, Tsinghua University 、 Co sponsored by Beijing Ruilai Intelligent Technology Co., Ltd , Co organized by the artificial intelligence Working Committee of China Electronic Information Industry Federation , Ensure the authority of the competition 、 Academic and professional .
Highlight 2 : Super luxurious academician presidium , The top review lineup in the industry
This competition brings together top experts in the industry , Zhang cymbal, academician of the Chinese Academy of Sciences 、 Ni guangnan, academician of Chinese academy of engineering 、 Shen Changxiang, academician of Chinese Academy of engineering 、 Yu Quan, academician of the Chinese Academy of Engineering 、 Five academicians, including Wu Jianping, an academician of the Chinese Academy of engineering, were invited to serve as the chairman of the Organizing Committee of this competition , It aims to create the highest level competitive communication platform in the field of artificial intelligence security .

The jury of the competition is from the Chinese Academy of Sciences 、 Tsinghua University 、 Fudan University 、 Zhejiang University 、 University of science and technology of China 、 Beijing university of aeronautics and astronautics 、 Xi'an Jiaotong University 、 Beijing University of Posts and telecommunications 、 Beijing University of technology and other domestic well-known university scholars , To ensure that the competition presents a high level of competition to provide a strong guarantee .
Highlight three : The competition questions are novel and forward-looking , Deep focus on frontier safety issues
This competition is the first event with AI security as the theme in China , For face recognition security 、 Deep fake content management 、 Set competition questions in fields such as automatic driving safety , Integrate the actual needs in industrial applications with the most cutting-edge security issues , It will provide an important reference for the ability evolution of artificial intelligence . The competition questions are introduced as follows :
Deep fake security competition : At present, the algorithm of generating synthetic class is used to Forge Audio 、 The abuse of video and other phenomena is increasing , Tracing the source by analyzing the similarity of forged audio and video has become an effective response . This competition topic simulates the scene of deep forged video transmission on the Internet , Players submit traceability algorithms for forgery methods , Recognize the deep forged video with the same generation method , Finally, rank according to the accuracy . Self driving safety competition : Self driving vehicles are prone to misjudgment in extreme scenes , At the same time, it faces the threat of algorithm security , There is the possibility of malicious attack . This competition question simulates the confrontation attack under the automatic driving scene , Provide online simulation autonomous driving environment , Players submit confrontation patches , Attack test the mainstream autopilot target detection model , Finally, rank according to the attack success rate . Face recognition security competition : Face recognition system is vulnerable to sample attack , That is, by making small changes to the face image , It can deceive the identification system to make wrong judgments . This competition question simulates the confrontation attack in the face comparison scene , In the black box scenario with unknown model details , The player submits a confrontation patch , Attack test the model , Finally, rank according to the attack success rate .
Highlight four : Big bonuses are waiting for you
This competition has set up a rich bonus pool , meanwhile , The top ten teams in each track , Will receive the certificate of honor issued by the competition .
• The finals champion :50000 RMB ( Single track bonus )
• Runner up in the finals :20000 RMB ( Single track bonus )
• Third place in the finals :10000 RMB ( Single track bonus )
at present , All the work of the competition is ready , We sincerely invite domestic colleges and universities 、 Scientific research institutes 、 The algorithm developers of technology enterprises jointly participate in this attack and defense battle related to future security ( Registration method : Log in to the official website of the competition www.zgc-aisc.com), Strengthen the technological breakthrough in the frontier field of artificial intelligence security , Escort the development of artificial intelligence industry .
边栏推荐
- String 0123456789abcdef, what is the number of substrings (not empty and not the same string itself) [Hangzhou multi tester] [Hangzhou multi tester _ Wang Sir]
- Alibaba interview question [Hangzhou multi tester] [Hangzhou multi tester _ Wang Sir]
- Harmony's Application on the shelves reported an error. The solution of "please use the API of the released version to develop the application and apply for listing"
- bubble sort
- 10 more advanced open source command line tools
- Artificial intelligence and RPA technology application (I) -rpa Hongji product introduction, designer interface function explanation
- CMake使用基础汇总
- [daily one] visual studio2015 installation in ancient times
- Use Baidu developer tool 4.0 to build a dedicated applet IDE
- [record of question brushing] 9. Number of palindromes
猜你喜欢

Constructor of member function
![Geely AI interview question [Hangzhou multi tester] [Hangzhou multi tester _ Wang Sir]](/img/18/27a86595eb3a7d30df359d6b2b8d8c.png)
Geely AI interview question [Hangzhou multi tester] [Hangzhou multi tester _ Wang Sir]

ADB environment configuration

Rendering process, how the code becomes a page (2)

MySQL: data types and operators

Is low code the future of development? On low code platform

重要的 SQL Server 函数 - 字符串实用程序

Mac installs mysql5.7 through brew
![[record of question brushing] 9. Number of palindromes](/img/01/74b0f40a29aaec487898a791cc8b79.png)
[record of question brushing] 9. Number of palindromes

Full resolution of the use of go native plug-ins
随机推荐
Transformer landing | next vit realizes the real-time landing of industrial tensorrt, surpassing RESNET and cswin
MySQL: data types and operators
Practice and thinking of AI standardization engine in pink client
Cmake usage base summary
Solana「迷惑行为」:造手机、开门店
MySQL partition table transformation
吉利AI面试题【杭州多测师】【杭州多测师_王sir】
【sylar】框架篇-Chapter24-支持业务模块化
25 openwrt guest network add
pytorch_ Lightning in lightning_ The output of hparams.yaml in logs is null
String 0123456789abcdef, what is the number of substrings (not empty and not the same string itself) [Hangzhou multi tester] [Hangzhou multi tester _ Wang Sir]
printf()打印char* str
Zhejiang University and other recent review papers on deep learning new drug design
[Sylar] framework -chapter15 stream module
Cmake usage base summary
[yolov5 practice 5] traffic sign recognition system based on yolov5 -yolov5 integration pyqt5
Constructor of member function
[II. Mobile web page development] 2D & 3D conversion and animation, mobile terminal layout, responsive layout
【sylar】框架篇-Chapter10-Address 模块
【二、移动web网页开发】2D&3D转换与动画、移动端布局、响应式布局