J. McIntire, P. Havig, L. McIntire, Henry M. Jackson
{"title":"Ideas on authenticating humanness in collaborative systems using AI-hard problems in perception and cognition","authors":"J. McIntire, P. Havig, L. McIntire, Henry M. Jackson","doi":"10.1109/NAECON.2009.5426651","DOIUrl":null,"url":null,"abstract":"Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.","PeriodicalId":305765,"journal":{"name":"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2009.5426651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.