How-To


Microsoft Researchers Use Neural Transformer Architecture for Cybersecurity

Transformer architecture (TA) is designed to handle long sequences of words, such as a paragraph of text.

globe illustration

Researchers Demonstrate Transformer Architecture-Based Anomaly Detection for Cybersecurity

The new technique is based on deep neural transformer architecture (TA), originally intended for natural language processing but successfully adapted for other problem scenarios.

Collage of Colors

Researchers Generate Realistic Images from Text

Researchers at Google have demonstrated a "quite remarkable" new technique that generates photo-realistic images from arbitrary text.

Contrastive Loss Representation for Anomaly Detection Has Cybersecurity Implications

This and other research seems to be making good progress toward our ability to detect and defend against malicious attacks on computer systems.

Researchers Discover New Technique for Training Huge Neural Networks

It can train huge neural networks in a fraction of the time and cost required for standard training techniques.

Rainbow LED Graphic

Researchers Explore Neural Network Slot Machine Technique Training

"Slot machine and quantum annealing training techniques might be useful in scenarios where neural networks must be retrained frequently and in scenarios where training must occur on devices with limited processing power, such as mobile phones," says Microsoft AI scientist engineer.

blue and yellow lights graphic

Researchers Explore Quantum-Inspired Optimization

Quantum-inspired optimization starts with a standard algorithm, such as particle swarm optimization or simulated annealing, and modifies the algorithm by using one of many ideas adapted from physics quantum behavior.

Light Blue Shape Graphic

Researchers Explore Differential Privacy

Differential privacy consists of a set of techniques designed to prevent the leakage of sensitive data.

neuron graphic

Researchers Explore Differential Evolution Optimization for Machine Learning

Differential evolution may allow the creation of neural prediction systems that are more powerful than the current generation of systems.

Researchers Use Machine Learning Techniques to Detect Compromised Network Accounts

Researchers and engineers at Microsoft have developed a successful system that detects compromised enterprise network user accounts.

Featured