Dr. Charles Kamhoua
Senior Electronics Engineer
Network Security Branch
AI for Cybersecurity
UNCLASSIFIED
UNCLASSIFIED
U.S. ARMY COMBAT CAPABILITIES DEVELOPMENT COMMAND – ARMY RESEARCH LABORATORY
UNCLASSIFIED
UNCLASSIFIED
1
CONTENTS
UNCLASSIFIED
UNCLASSIFIED
2
WHAT IS AI
UNCLASSIFIED
UNCLASSIFIED
3
APPLICATIONS
UNCLASSIFIED
UNCLASSIFIED
4
ADVERSARIAL MACHINE LEARNING
UNCLASSIFIED
UNCLASSIFIED
5
ADVERSARIAL MACHINE LEARNING
UNCLASSIFIED
UNCLASSIFIED
6
ADVERSARIAL MACHINE LEARNING
Adding a tiny magnitude of noise makes a huge difference for the Neural Network Classifier
This attack Can be Untargeted 🡪 misclassify the panda
In the case of Targeted attack 🡪 The goal is to classify the panda as another specific class!
UNCLASSIFIED
UNCLASSIFIED
7
ADVERSARIAL MACHINE LEARNING
does not have access to the model parameters
UNCLASSIFIED
UNCLASSIFIED
8
GENERATIVE ADVERSARIAL NETWORKS
Such as unreal face images
Try: www.thispersondoesnotexist.com
Restore New Videos from Old recordings.
UNCLASSIFIED
UNCLASSIFIED
9
GAN’S STRUCTURE
UNCLASSIFIED
UNCLASSIFIED
10
GAN SCENARIO
UNCLASSIFIED
UNCLASSIFIED
11
GAN SCENARIO
UNCLASSIFIED
UNCLASSIFIED
12
BEYOND ML SECURITY
Reinforcement Learning with MATLAB
UNCLASSIFIED
UNCLASSIFIED
13
REINFORCEMENT LEARNING
Reinforcement Learning with MATLAB
UNCLASSIFIED
UNCLASSIFIED
14
FROM RL TO GAME THEORY
Reinforcement Learning with MATLAB
UNCLASSIFIED
UNCLASSIFIED
15
GAME THEORY FOR CYBERSECURITY
UNCLASSIFIED
UNCLASSIFIED
16
GAME THEORY FOR CYBERSECURITY
A Survey of Game Theoretic Methods for Cyber Security Yuan Wang, Yongjun Wang, Jing Liu, Zhijian Huang and Peidai Xie, 2016
UNCLASSIFIED
UNCLASSIFIED
17
MORE-GENERAL MODEL POSG
UNCLASSIFIED
UNCLASSIFIED
18
INTRUSION DETECTION USING ML
UNCLASSIFIED
UNCLASSIFIED
19
EXAMPLE: SPAM FILTER
UNCLASSIFIED
UNCLASSIFIED
20
GAME THEORY FOR RESOURCE ALLOCATION
UNCLASSIFIED
UNCLASSIFIED
21
GAME THEORY FOR RESOURCE ALLOCATION
UNCLASSIFIED
UNCLASSIFIED
22
OPEN PROBLEMS
UNCLASSIFIED
UNCLASSIFIED
23
THANK YOU
charles.a.kamhoua.civ@army.mil
UNCLASSIFIED
UNCLASSIFIED
24