Advanced Computing
Blog Posts
How Easy Is It to Make and Detect a Deepfake?
The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels
Read More• By Catherine Bernaciak , Dominic A. Ross
In Artificial Intelligence Engineering
How to Build a Trustworthy Free/Libre Linux Capable 64-bit RISC-V Computer
The attack surface for commercial hardware now spans all stages of the development lifecycle. Even in the presence of secure, bug-free software, the growing threat of hardware Trojans and backdoors …
Read More• By Gabriel Somlo
The Promise of Deep Learning on Graphs
A growing number of Department of Defense (DoD) data problems are graph problems: the data from sources such as sensor feeds, web traffic, and supply chains are full of irregular …
Read More• By Oren Wright
In Artificial Intelligence Engineering
Obsidian: A New, More Secure Programming Language for Blockchain
Billions of dollars in venture capital, industry investments, and government investments are going into the technology known as blockchain....
Read More• By Eliezer Kanal
In Secure Development
Automated Code Generation for Future Compatible High-Performance Graph Libraries
For many DoD missions, our ability to collect information has outpaced our ability to analyze that information. Graph algorithms and large-scale machine learning algorithms are a key to analyzing the …
Read More