recommended reading

Apple’s First Research Paper Tries to Solve a Problem Facing Every Company Working on AI

Christian Lagerek/Shutterstock.com

A few days before Christmas and Hanukkah festivities began, Apple gave a little something to the artificial intelligence research community: its first research paper.

The paper, authored by six of Apple’s researchers, doesn’t focus on AI that someone with an iPhone might interact with, but rather how to create enough data to effectively train it. Specifically, the research focuses on making realistic fake images—mostly of humans—to train facial recognition AI. It addresses a core problem: training a machine takes a huge amount of data.

Moreover, training a machine on matters like faces and body language can take a ton of personal data. The ability to manufacture this kind of training data and still achieve high results could allow Apple to build AI that understand how humans function (the way we move our hands or look around a screen) without needing to use any user data while building the software.

Apple’s published research focuses on those two examples: identifying hand gestures and detecting where people are looking, examples of basic image recognition problems that could be applied to anything from tracking user behavior to a wave-to-unlock iPhone feature.

In both cases, the researchers took established datasets of synthetic images, and used a neural network trained on real images to refine them to look more realistic. The system then compares the refined image to a real image, attempts to decide which picture is real, and then updates itself based on what the system judged as fake compared to the real image.

As the researchers write, the end result is “state-of-the-art results without any labeled real data.”

The work Apple decided to present first is interesting. It’s not speech recognition for Siri, or a PR stunt for some new Maps feature. Rather, it’s research that very much falls in line with an established trend of 2016: using neural networks to generate new data instead of just identifying it.

The research also nods toward user data security, a drum that Apple beats loudly and often. While some companies like Google and Facebook use vast quantities of user data to train their algorithms, Apple’s entire pitch has been that nobody has access to what’s on an iPhone but the iPhone’s owner. This kind of work makes the statement that Apple will keep up with other tech companies and still honor the privacy it promised users.

Researchers write the next possible avenues of research could be using the same technique for videos.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    View
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View

When you download a report, your information may be shared with the underwriters of that document.