J. McIntire, P. Havig, L. McIntire, Henry M. Jackson
{"title":"基于ai的协作系统人性认证思路——感知与认知难题","authors":"J. McIntire, P. Havig, L. McIntire, Henry M. Jackson","doi":"10.1109/NAECON.2009.5426651","DOIUrl":null,"url":null,"abstract":"Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.","PeriodicalId":305765,"journal":{"name":"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Ideas on authenticating humanness in collaborative systems using AI-hard problems in perception and cognition\",\"authors\":\"J. McIntire, P. Havig, L. McIntire, Henry M. Jackson\",\"doi\":\"10.1109/NAECON.2009.5426651\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.\",\"PeriodicalId\":305765,\"journal\":{\"name\":\"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NAECON.2009.5426651\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAECON.2009.5426651","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ideas on authenticating humanness in collaborative systems using AI-hard problems in perception and cognition
Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.