Advanced Computing
Blog Posts
How Easy Is It to Make and Detect a Deepfake?
The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels
• By Catherine Bernaciak, Dominic A. Ross
In Artificial Intelligence Engineering
![Catherine A Bernaciak](/media/images/thumb_big_c-bernaciak_blog_auth.max-180x180.format-webp.webp)
![Dominic Ross](/media/images/thumb_big_d-ross_blog_authors_5.max-180x180.format-webp.webp)
How to Build a Trustworthy Free/Libre Linux Capable 64-bit RISC-V Computer
The attack surface for commercial hardware now spans all stages of the development lifecycle. Even in the presence of secure, bug-free software, the growing threat of hardware Trojans and backdoors …
• By Gabriel Somlo
![Headshot of Gabriel Somlo](/media/images/thumb_big_g-somlo_blog_authors_.max-180x180.format-webp.webp)
The Promise of Deep Learning on Graphs
A growing number of Department of Defense (DoD) data problems are graph problems: the data from sources such as sensor feeds, web traffic, and supply chains are full of irregular …
• By Oren Wright
In Artificial Intelligence Engineering
![Oren Wright](/media/images/thumb_big_o-wright_blog_authors.max-180x180.format-webp.webp)
Obsidian: A New, More Secure Programming Language for Blockchain
Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....
• By Eliezer Kanal
In Secure Development
![Eliezer Kanal](/media/images/thumb_big_e-kanal_blog_authors_.max-180x180.format-webp.webp)
Automated Code Generation for Future Compatible High-Performance Graph Libraries
For many DoD missions, our ability to collect information has outpaced our ability to analyze that information. Graph algorithms and large-scale machine learning algorithms are a key to analyzing the …
• By Scott McMillan
In Artificial Intelligence Engineering
![Scott McMillan](/media/images/thumb_big_s-mcmillan_blog_autho.max-180x180.format-webp.webp)