From 27340ac4cd43f8eec7414495b541a65566ae2656 Mon Sep 17 00:00:00 2001 From: adamhrv Date: Tue, 8 Oct 2019 16:02:47 +0200 Subject: update site, white --- site/public/research/index.html | 2 +- site/public/research/munich_security_conference/index.html | 5 ++--- 2 files changed, 3 insertions(+), 4 deletions(-) (limited to 'site/public/research') diff --git a/site/public/research/index.html b/site/public/research/index.html index f4f90531..2fb87df3 100644 --- a/site/public/research/index.html +++ b/site/public/research/index.html @@ -60,7 +60,7 @@

28 June 2019

-

Analyzing Transnational Flows of Face Recognition Image Training Data

+

Transnational Flows of Face Recognition Image Training Data

Where does face data originate and who's using it?

Read more...

diff --git a/site/public/research/munich_security_conference/index.html b/site/public/research/munich_security_conference/index.html index fc44bfd8..b43df151 100644 --- a/site/public/research/munich_security_conference/index.html +++ b/site/public/research/munich_security_conference/index.html @@ -55,9 +55,8 @@
-
Transnational Flows of Face Recognition Image Training Data
Where does face data originate and who's using it? -

A case study on publicly available facial recognition datasets for the Munich Security Conference's Transnational Security Report

-

National AI strategies often rely on transnational data sources to capitalize on recent advancements in deep learning and neural networks. Researchers benefiting from these transnational data flows can yield quick and significant gains across diverse sectors from health care to biometrics. But new challenges emerge when national AI strategies collide with national interests.

+

A case study on publicly available facial recognition datasets for the Munich Security Conference's Transnational Security Report

+

National AI strategies often rely on transnational data sources to capitalize on recent advancements in deep learning and neural networks. Researchers benefiting from these transnational data flows can yield quick and significant gains across diverse sectors from health care to biometrics. But new challenges emerge when national AI strategies collide with national interests.

Our earlier research on the MS Celeb and Duke datasets published with the Financial Times revealed that several computer vision image datasets created by US companies and universities were unexpectedly also used for research by the National University of Defense Technology in China, along with top Chinese surveillance firms including SenseTime, SenseNets, CloudWalk, Hikvision, and Megvii/Face++ which have all been linked to oppressive surveillance in the Xinjiang region of China.

In this new research for the Munich Security Conference's Transnational Security Report we provide summary statistics about the origins and endpoints of facial recognition information supply chains. To make it more personal, we gathered additional data on the number of public photos from embassies that are currently being used in facial recognition training datasets.

-- cgit v1.2.3-70-g09d2