Name: Towards AI Legal Name: Towards AI, Inc. Description: Towards AI is the world's leading artificial intelligence (AI) and technology publication. Read by thought-leaders and decision-makers around the world. Phone Number: +1-650-246-9381 Email: pub@towardsai.net
228 Park Avenue South New York, NY 10003 United States
Website: Publisher: https://towardsai.net/#publisher Diversity Policy: https://towardsai.net/about Ethics Policy: https://towardsai.net/about Masthead: https://towardsai.net/about
Name: Towards AI Legal Name: Towards AI, Inc. Description: Towards AI is the world's leading artificial intelligence (AI) and technology publication. Founders: Roberto Iriondo, , Job Title: Co-founder and Advisor Works for: Towards AI, Inc. Follow Roberto: X, LinkedIn, GitHub, Google Scholar, Towards AI Profile, Medium, ML@CMU, FreeCodeCamp, Crunchbase, Bloomberg, Roberto Iriondo, Generative AI Lab, Generative AI Lab Denis Piffaretti, Job Title: Co-founder Works for: Towards AI, Inc. Louie Peters, Job Title: Co-founder Works for: Towards AI, Inc. Louis-François Bouchard, Job Title: Co-founder Works for: Towards AI, Inc. Cover:
Towards AI Cover
Logo:
Towards AI Logo
Areas Served: Worldwide Alternate Name: Towards AI, Inc. Alternate Name: Towards AI Co. Alternate Name: towards ai Alternate Name: towardsai Alternate Name: towards.ai Alternate Name: tai Alternate Name: toward ai Alternate Name: toward.ai Alternate Name: Towards AI, Inc. Alternate Name: towardsai.net Alternate Name: pub.towardsai.net
5 stars – based on 497 reviews

Frequently Used, Contextual References

TODO: Remember to copy unique IDs whenever it needs used. i.e., URL: 304b2e42315e

Resources

Take our 85+ lesson From Beginner to Advanced LLM Developer Certification: From choosing a project to deploying a working product this is the most comprehensive and practical LLM course out there!

Publication

The AI Race for Industrial Cybersecurity
Artificial Intelligence   Latest   Machine Learning

The AI Race for Industrial Cybersecurity

Last Updated on May 9, 2023 by Editorial Team

Author(s): Jorge Alcántara Barroso

Originally published on Towards AI.

State of the art, insights, and advice for the future

AI in industrial cybersecurity is not a question. It will protect our critical infrastructures in an increasingly connected world. By learning from real-world examples, addressing challenges, and leveraging AI’s capabilities, companies & governments should be able to safeguard their systems and our privacy. Not using these tools will be a disservice to their users or citizens.

Source: Midjourney v5

As our interconnected world accelerates and technology empowers developers to achieve more with fewer resources, the importance of robust Operational Technology (OT) cybersecurity in safeguarding infrastructure–such as energy, transportation, and communication sectors–has never been more critical. Criminals and hostile actors are deploying increasingly sophisticated and high-volume attacks. Artificial Intelligence (AI) has emerged as the game-changing solution for both enhancing organizations’ ability to prevent industrial cyberattacks & the potential of bad actors to run havoc in these systems.

The Evolving AI Threat Landscape

As technology advances, so do the threats that the cybersecurity industry must contend with. Some threats may not be considered significant until the first major attack has occurred. Still, we can prepare for those traditional threats that are already a growing challenge due to AI:

  1. Personalized Social Engineering Attacks: The development of generative language and image models, like GPT-4 & Midjourney v5, enables sophisticated and personalized social engineering attacks that are still automated. Cybercriminals can use these AI models to craft highly convincing phishing emails, impersonating trusted individuals, or generate context-aware scams, making it increasingly difficult for users and security solutions to detect malicious content or patterns to identify bot-like behavior. [1]
  2. Opinion Shifters & Biometric Hazards: Fraudsters can now easily use deep fake technology to create videos or images geared to manipulate public opinion, blackmail individuals, or even bypass facial recognition security systems. [2]
  3. AI-powered Cyber Weapons: As these models improve in efficiency and accuracy, they can be weaponized to create advanced malware or attack vectors. Adversaries can use ML algorithms to optimize their attacks just as cybersecurity companies do the same to detect threats in an unending tug-of-war, making them more effective at evading detection and increasing their success rate. [3]
  4. Adversarial Attacks on AI Systems: The increased reliance on AI for security measures is giving rise to adversarial attacks targeting AI systems themselves. These attacks often involve feeding deceptive inputs–or prompt injection–to AI models to cause them to misclassify data, behave unexpectedly, or reveal sensitive information. The new models we’re so excited about also have the potential to be fooled or manipulated by bad actors, undermining the integrity of the systems they protect or interact with. [4]
  5. Automated Vulnerability Discovery and Exploitation: AI-driven tools can be employed to identify vulnerabilities in software and infrastructure more rapidly than human analysts. Once vulnerabilities are discovered, AI models can be used to create tailored exploits or launch coordinated attacks, significantly reducing the time between vulnerability discovery and exploitation. [5]

How AI is Revolutionizing Industrial Cybersecurity

Still, not all is bleak. As threats emerge, so do tools to address these new issues and improve protection against more traditional attacks. AI-driven technologies have demonstrated superiority in detecting and responding to security threats compared to traditional methods. Let’s explore together various ways AI is transforming these systems, alongside real-world examples you can learn from today:

Anomaly Detection and Behavioral Analysis

AI leverages machine learning to analyze massive volumes of data (millions of security events) and identify patterns (behavioral analysis), enabling the prevention of cyberattacks and improving response times.

Real-World Example: Darktrace, a cybersecurity firm, utilizes AI to detect abnormal behavior patterns in control systems [6]. Its AI-powered tool can identify and prevent potential cyberattacks before they wreak havoc, and way before a team of humans would’ve been able to detect an issue.

Predictive Maintenance and Optimization

AI solutions are already monitoring and predicting industrial needs, scheduling maintenance, and averting future equipment issues that could lead to unscheduled production downtime and significant financial losses or worse. Long-term cyber-attacks on infrastructure may be limited to routinely overusing resources to produce system failures.

Real-World Example: Siemens employs AI-based solutions to anticipate equipment failures and optimize maintenance schedules across various industries, such as power generation, oil, gas, and manufacturing [7]. This approach reduces downtime and costs and can help you track misuse.

Automation of Security Tasks

Automating security tasks, like network monitoring, patch application, and firewall rule creation and updates, frees up security analysts to tackle more complex tasks.

Real-World Example: IBM’s Watson for Cyber Security [8] automates threat detection and response, enabling analysts to address high-priority threats more efficiently.

Navigating the Implementation of AI

The rapidly changing threat landscape demands CISOs (chief information security officers) to be proactive and stay ahead of the curve, especially when it comes to AI. Companies must recognize the need for AI-savvy CISOs to face the challenges that arise from the integration of AI in industrial cybersecurity. Let’s look at the most obvious of those hurdles:

  1. Data Quality: AI is as good as its training data, any implementation that uses your logs or sensitive data to learn will face a challenge balancing the amount, quality v.s. the privacy and security of your internal information.
  2. Statistical limitations – Handling Falsehood: Managing potential alert overloads or missed threats due to the generation of false positives or negatives by improperly applied AI.
  3. Auto-fitting: Identifying changes made to industrial processes without human intervention (operators) by the processes themselves. The models may grow to overfit the historical precedence and will need resets and human supervision to maintain protection against old attack methods that may become uncommon.
  4. Who watches the watchman? Guarding against attackers deceiving or manipulating the models or algorithms themselves. Potentially chaining layers of protection, where a simpler model may check for the I/O of another, more advanced model.
  5. At what cost? The cost of these tools is usually not negligible. Large models take a lot of computing power and vendors will pass all the cost and more to the client. Your company will need to cautiously decide to address these new threats without drowning in high market costs.

AI-Savvy CISOs: A Necessity in the Age of Generative AI

An AI-savvy CISO is not just a technical expert but a strategic leader who understands the value of AI in bolstering a company’s cybersecurity posture. Here’s how CISOs should approach the problem and why companies should prioritize AI expertise in their hiring and development strategies:

  1. Embrace AI-driven security solutions: CISOs must be well-versed in the latest AI technologies and understand how to effectively leverage them to enhance their organization’s security measures. This includes anomaly detection, predictive maintenance, and automation of security tasks. They should actively seek out AI-powered tools and platforms, ensuring seamless integration with their existing security infrastructure.
  2. Stay informed: Keeping up-to-date with emerging threats and attack vectors powered by AI is crucial. AI-savvy CISOs should continuously monitor the latest research, developing their own understanding of potential risks and vulnerabilities before they become commonplace.
  3. Foster collaboration: promote a culture of collaboration and knowledge-sharing within and between the technical teams in the company. Encouraging security & engineering professionals to stay informed and educated on AI advancements will help build a robust defense against upcoming threats. CISOs should facilitate training programs and workshops to keep their teams up-to-date and engaged.
  4. Advocate for ethical AI development: If your company is building its own AI tools or models (you likely should), your CISO should champion responsible AI development by ensuring adherence to ethical guidelines and regulations. They must advocate for transparency, privacy, and security.
  5. Strategize for long-term AI implementation: CISOs should start by developing a long-term AI implementation strategy that outlines the organization’s goals, objectives, and potential challenges. This should include plans for acquiring and deploying AI tools, budget allocation, talent management, and addressing potential regulatory concerns.

The role of the CISO is evolving, and companies must prioritize the integration of AI expertise in their cybersecurity leadership. As AI continues to reshape industrial cybersecurity, AI-savvy CISOs will be critical to navigating the challenges and opportunities that lie ahead.

The present: Big Tech getting involved

At the RSA Conference 2023, Google unveiled its Cloud Security AI Workbench [10], a comprehensive cybersecurity suite powered by a specialized AI language model named Sec-PaLM. Designed specifically for security applications, Sec-PaLM draws on a wealth of security intelligence, including software vulnerability research, malware analysis, threat indicators, and behavioral threat actor profiles.

The Cloud Security AI Workbench boasts a suite of cutting-edge AI-driven tools. For instance, Mandiant’s Threat Intelligence AI [11], acquired by Google in 2022, will leverage Sec-PaLM to identify, summarize, and address security threats. VirusTotal, another Google-owned service, will harness Sec-PaLM to assist subscribers in analyzing and understanding malicious scripts’ behavior.

Furthermore, Sec-PaLM will aid Chronicle, Google’s cloud cybersecurity service, in searching for security events and facilitating conversational interactions with results. Google’s Security Command Center AI users will receive easily digestible explanations of attack exposure from Sec-PaLM, including information on impacted assets, recommended mitigations, and risk summaries for security, compliance, and privacy findings.

Source: Midjourney v5

The Future: AI’s Pivotal Role

As information and communication technologies continue to evolve and integrate more deeply into critical infrastructures, the risk of cyberattacks will only grow. Consequently, there is a need to enhance the solutions currently employed in the OT realm.

AI-driven solutions can significantly improve organizations’ ability to detect abnormal behavior patterns and alert operators to potential threats. Additionally, AI can be used to predict the risk of an attack, offering mitigation recommendations before it occurs. It can also fortify authentication and authorization of access to critical systems and identify OT system vulnerabilities before attackers exploit them.

In conclusion, as these tools become widely available, it is paramount to utilize them for threat protection or risk falling behind cyber criminals in technological capabilities.

Appropriate regulation will be crucial to mitigating the potential misuse of AI and machine learning in industrial cybersecurity [9]. Regulation is written in blood, and although we will not see relevant work from public sources in the short term, we see the private sector running to fill the gap.

 

Sources

  1. Xorlab — How AI is enabling ‘hyperpersonal’ phishing attacks
  2. The Brookings Institution — Deepfakes and International Conflict (pdf)
  3. The Conversation — AI and the Cybersecurity Arms Race
  4. VentureBeat — How to Protect Artificial Intelligence from Itself
  5. Prosegur — AI’s Double-Edged Role in Cybersecurity
  6. Darktrace — Self-Learning Asset Identification, Industrial Immune System
  7. Siemens Predictive Services — Assesment, Connectivity, Analytics
  8. IBM Watson for Cyber Security — AI-Powered Cybersecurity Solutions
  9. E.U. Guidelines for Trustworthy AI — Ensuring Ethical AI Development
  10. Google AI Workbench — AI for Cybersecurity
  11. Mandiant — Threat Intelligence

Join thousands of data leaders on the AI newsletter. Join over 80,000 subscribers and keep up to date with the latest developments in AI. From research to projects and ideas. If you are building an AI startup, an AI-related product, or a service, we invite you to consider becoming a sponsor.

Published via Towards AI

Feedback ↓

Sign Up for the Course
`; } else { console.error('Element with id="subscribe" not found within the page with class "home".'); } } }); // Remove duplicate text from articles /* Backup: 09/11/24 function removeDuplicateText() { const elements = document.querySelectorAll('h1, h2, h3, h4, h5, strong'); // Select the desired elements const seenTexts = new Set(); // A set to keep track of seen texts const tagCounters = {}; // Object to track instances of each tag elements.forEach(el => { const tagName = el.tagName.toLowerCase(); // Get the tag name (e.g., 'h1', 'h2', etc.) // Initialize a counter for each tag if not already done if (!tagCounters[tagName]) { tagCounters[tagName] = 0; } // Only process the first 10 elements of each tag type if (tagCounters[tagName] >= 2) { return; // Skip if the number of elements exceeds 10 } const text = el.textContent.trim(); // Get the text content const words = text.split(/\s+/); // Split the text into words if (words.length >= 4) { // Ensure at least 4 words const significantPart = words.slice(0, 5).join(' '); // Get first 5 words for matching // Check if the text (not the tag) has been seen before if (seenTexts.has(significantPart)) { // console.log('Duplicate found, removing:', el); // Log duplicate el.remove(); // Remove duplicate element } else { seenTexts.add(significantPart); // Add the text to the set } } tagCounters[tagName]++; // Increment the counter for this tag }); } removeDuplicateText(); */ // Remove duplicate text from articles function removeDuplicateText() { const elements = document.querySelectorAll('h1, h2, h3, h4, h5, strong'); // Select the desired elements const seenTexts = new Set(); // A set to keep track of seen texts const tagCounters = {}; // Object to track instances of each tag // List of classes to be excluded const excludedClasses = ['medium-author', 'post-widget-title']; elements.forEach(el => { // Skip elements with any of the excluded classes if (excludedClasses.some(cls => el.classList.contains(cls))) { return; // Skip this element if it has any of the excluded classes } const tagName = el.tagName.toLowerCase(); // Get the tag name (e.g., 'h1', 'h2', etc.) // Initialize a counter for each tag if not already done if (!tagCounters[tagName]) { tagCounters[tagName] = 0; } // Only process the first 10 elements of each tag type if (tagCounters[tagName] >= 10) { return; // Skip if the number of elements exceeds 10 } const text = el.textContent.trim(); // Get the text content const words = text.split(/\s+/); // Split the text into words if (words.length >= 4) { // Ensure at least 4 words const significantPart = words.slice(0, 5).join(' '); // Get first 5 words for matching // Check if the text (not the tag) has been seen before if (seenTexts.has(significantPart)) { // console.log('Duplicate found, removing:', el); // Log duplicate el.remove(); // Remove duplicate element } else { seenTexts.add(significantPart); // Add the text to the set } } tagCounters[tagName]++; // Increment the counter for this tag }); } removeDuplicateText(); //Remove unnecessary text in blog excerpts document.querySelectorAll('.blog p').forEach(function(paragraph) { // Replace the unwanted text pattern for each paragraph paragraph.innerHTML = paragraph.innerHTML .replace(/Author\(s\): [\w\s]+ Originally published on Towards AI\.?/g, '') // Removes 'Author(s): XYZ Originally published on Towards AI' .replace(/This member-only story is on us\. Upgrade to access all of Medium\./g, ''); // Removes 'This member-only story...' }); //Load ionic icons and cache them if ('localStorage' in window && window['localStorage'] !== null) { const cssLink = 'https://code.ionicframework.com/ionicons/2.0.1/css/ionicons.min.css'; const storedCss = localStorage.getItem('ionicons'); if (storedCss) { loadCSS(storedCss); } else { fetch(cssLink).then(response => response.text()).then(css => { localStorage.setItem('ionicons', css); loadCSS(css); }); } } function loadCSS(css) { const style = document.createElement('style'); style.innerHTML = css; document.head.appendChild(style); } //Remove elements from imported content automatically function removeStrongFromHeadings() { const elements = document.querySelectorAll('h1, h2, h3, h4, h5, h6, span'); elements.forEach(el => { const strongTags = el.querySelectorAll('strong'); strongTags.forEach(strongTag => { while (strongTag.firstChild) { strongTag.parentNode.insertBefore(strongTag.firstChild, strongTag); } strongTag.remove(); }); }); } removeStrongFromHeadings(); "use strict"; window.onload = () => { /* //This is an object for each category of subjects and in that there are kewords and link to the keywods let keywordsAndLinks = { //you can add more categories and define their keywords and add a link ds: { keywords: [ //you can add more keywords here they are detected and replaced with achor tag automatically 'data science', 'Data science', 'Data Science', 'data Science', 'DATA SCIENCE', ], //we will replace the linktext with the keyword later on in the code //you can easily change links for each category here //(include class="ml-link" and linktext) link: 'linktext', }, ml: { keywords: [ //Add more keywords 'machine learning', 'Machine learning', 'Machine Learning', 'machine Learning', 'MACHINE LEARNING', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, ai: { keywords: [ 'artificial intelligence', 'Artificial intelligence', 'Artificial Intelligence', 'artificial Intelligence', 'ARTIFICIAL INTELLIGENCE', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, nl: { keywords: [ 'NLP', 'nlp', 'natural language processing', 'Natural Language Processing', 'NATURAL LANGUAGE PROCESSING', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, des: { keywords: [ 'data engineering services', 'Data Engineering Services', 'DATA ENGINEERING SERVICES', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, td: { keywords: [ 'training data', 'Training Data', 'training Data', 'TRAINING DATA', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, ias: { keywords: [ 'image annotation services', 'Image annotation services', 'image Annotation services', 'image annotation Services', 'Image Annotation Services', 'IMAGE ANNOTATION SERVICES', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, l: { keywords: [ 'labeling', 'labelling', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, pbp: { keywords: [ 'previous blog posts', 'previous blog post', 'latest', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, mlc: { keywords: [ 'machine learning course', 'machine learning class', ], //Change your article link (include class="ml-link" and linktext) link: 'linktext', }, }; //Articles to skip let articleIdsToSkip = ['post-2651', 'post-3414', 'post-3540']; //keyword with its related achortag is recieved here along with article id function searchAndReplace(keyword, anchorTag, articleId) { //selects the h3 h4 and p tags that are inside of the article let content = document.querySelector(`#${articleId} .entry-content`); //replaces the "linktext" in achor tag with the keyword that will be searched and replaced let newLink = anchorTag.replace('linktext', keyword); //regular expression to search keyword var re = new RegExp('(' + keyword + ')', 'g'); //this replaces the keywords in h3 h4 and p tags content with achor tag content.innerHTML = content.innerHTML.replace(re, newLink); } function articleFilter(keyword, anchorTag) { //gets all the articles var articles = document.querySelectorAll('article'); //if its zero or less then there are no articles if (articles.length > 0) { for (let x = 0; x < articles.length; x++) { //articles to skip is an array in which there are ids of articles which should not get effected //if the current article's id is also in that array then do not call search and replace with its data if (!articleIdsToSkip.includes(articles[x].id)) { //search and replace is called on articles which should get effected searchAndReplace(keyword, anchorTag, articles[x].id, key); } else { console.log( `Cannot replace the keywords in article with id ${articles[x].id}` ); } } } else { console.log('No articles found.'); } } let key; //not part of script, added for (key in keywordsAndLinks) { //key is the object in keywords and links object i.e ds, ml, ai for (let i = 0; i < keywordsAndLinks[key].keywords.length; i++) { //keywordsAndLinks[key].keywords is the array of keywords for key (ds, ml, ai) //keywordsAndLinks[key].keywords[i] is the keyword and keywordsAndLinks[key].link is the link //keyword and link is sent to searchreplace where it is then replaced using regular expression and replace function articleFilter( keywordsAndLinks[key].keywords[i], keywordsAndLinks[key].link ); } } function cleanLinks() { // (making smal functions is for DRY) this function gets the links and only keeps the first 2 and from the rest removes the anchor tag and replaces it with its text function removeLinks(links) { if (links.length > 1) { for (let i = 2; i < links.length; i++) { links[i].outerHTML = links[i].textContent; } } } //arrays which will contain all the achor tags found with the class (ds-link, ml-link, ailink) in each article inserted using search and replace let dslinks; let mllinks; let ailinks; let nllinks; let deslinks; let tdlinks; let iaslinks; let llinks; let pbplinks; let mlclinks; const content = document.querySelectorAll('article'); //all articles content.forEach((c) => { //to skip the articles with specific ids if (!articleIdsToSkip.includes(c.id)) { //getting all the anchor tags in each article one by one dslinks = document.querySelectorAll(`#${c.id} .entry-content a.ds-link`); mllinks = document.querySelectorAll(`#${c.id} .entry-content a.ml-link`); ailinks = document.querySelectorAll(`#${c.id} .entry-content a.ai-link`); nllinks = document.querySelectorAll(`#${c.id} .entry-content a.ntrl-link`); deslinks = document.querySelectorAll(`#${c.id} .entry-content a.des-link`); tdlinks = document.querySelectorAll(`#${c.id} .entry-content a.td-link`); iaslinks = document.querySelectorAll(`#${c.id} .entry-content a.ias-link`); mlclinks = document.querySelectorAll(`#${c.id} .entry-content a.mlc-link`); llinks = document.querySelectorAll(`#${c.id} .entry-content a.l-link`); pbplinks = document.querySelectorAll(`#${c.id} .entry-content a.pbp-link`); //sending the anchor tags list of each article one by one to remove extra anchor tags removeLinks(dslinks); removeLinks(mllinks); removeLinks(ailinks); removeLinks(nllinks); removeLinks(deslinks); removeLinks(tdlinks); removeLinks(iaslinks); removeLinks(mlclinks); removeLinks(llinks); removeLinks(pbplinks); } }); } //To remove extra achor tags of each category (ds, ml, ai) and only have 2 of each category per article cleanLinks(); */ //Recommended Articles var ctaLinks = [ /* ' ' + '

Subscribe to our AI newsletter!

' + */ '

Take our 85+ lesson From Beginner to Advanced LLM Developer Certification: From choosing a project to deploying a working product this is the most comprehensive and practical LLM course out there!

'+ '

Towards AI has published Building LLMs for Production—our 470+ page guide to mastering LLMs with practical projects and expert insights!

' + '
' + '' + '' + '

Note: Content contains the views of the contributing authors and not Towards AI.
Disclosure: This website may contain sponsored content and affiliate links.

' + 'Discover Your Dream AI Career at Towards AI Jobs' + '

Towards AI has built a jobs board tailored specifically to Machine Learning and Data Science Jobs and Skills. Our software searches for live AI jobs each hour, labels and categorises them and makes them easily searchable. Explore over 10,000 live jobs today with Towards AI Jobs!

' + '
' + '

🔥 Recommended Articles 🔥

' + 'Why Become an LLM Developer? Launching Towards AI’s New One-Stop Conversion Course'+ 'Testing Launchpad.sh: A Container-based GPU Cloud for Inference and Fine-tuning'+ 'The Top 13 AI-Powered CRM Platforms
' + 'Top 11 AI Call Center Software for 2024
' + 'Learn Prompting 101—Prompt Engineering Course
' + 'Explore Leading Cloud Providers for GPU-Powered LLM Training
' + 'Best AI Communities for Artificial Intelligence Enthusiasts
' + 'Best Workstations for Deep Learning
' + 'Best Laptops for Deep Learning
' + 'Best Machine Learning Books
' + 'Machine Learning Algorithms
' + 'Neural Networks Tutorial
' + 'Best Public Datasets for Machine Learning
' + 'Neural Network Types
' + 'NLP Tutorial
' + 'Best Data Science Books
' + 'Monte Carlo Simulation Tutorial
' + 'Recommender System Tutorial
' + 'Linear Algebra for Deep Learning Tutorial
' + 'Google Colab Introduction
' + 'Decision Trees in Machine Learning
' + 'Principal Component Analysis (PCA) Tutorial
' + 'Linear Regression from Zero to Hero
'+ '

', /* + '

Join thousands of data leaders on the AI newsletter. It’s free, we don’t spam, and we never share your email address. Keep up to date with the latest work in AI. From research to projects and ideas. If you are building an AI startup, an AI-related product, or a service, we invite you to consider becoming a sponsor.

',*/ ]; var replaceText = { '': '', '': '', '
': '
' + ctaLinks + '
', }; Object.keys(replaceText).forEach((txtorig) => { //txtorig is the key in replacetext object const txtnew = replaceText[txtorig]; //txtnew is the value of the key in replacetext object let entryFooter = document.querySelector('article .entry-footer'); if (document.querySelectorAll('.single-post').length > 0) { //console.log('Article found.'); const text = entryFooter.innerHTML; entryFooter.innerHTML = text.replace(txtorig, txtnew); } else { // console.log('Article not found.'); //removing comment 09/04/24 } }); var css = document.createElement('style'); css.type = 'text/css'; css.innerHTML = '.post-tags { display:none !important } .article-cta a { font-size: 18px; }'; document.body.appendChild(css); //Extra //This function adds some accessibility needs to the site. function addAlly() { // In this function JQuery is replaced with vanilla javascript functions const imgCont = document.querySelector('.uw-imgcont'); imgCont.setAttribute('aria-label', 'AI news, latest developments'); imgCont.title = 'AI news, latest developments'; imgCont.rel = 'noopener'; document.querySelector('.page-mobile-menu-logo a').title = 'Towards AI Home'; document.querySelector('a.social-link').rel = 'noopener'; document.querySelector('a.uw-text').rel = 'noopener'; document.querySelector('a.uw-w-branding').rel = 'noopener'; document.querySelector('.blog h2.heading').innerHTML = 'Publication'; const popupSearch = document.querySelector$('a.btn-open-popup-search'); popupSearch.setAttribute('role', 'button'); popupSearch.title = 'Search'; const searchClose = document.querySelector('a.popup-search-close'); searchClose.setAttribute('role', 'button'); searchClose.title = 'Close search page'; // document // .querySelector('a.btn-open-popup-search') // .setAttribute( // 'href', // 'https://medium.com/towards-artificial-intelligence/search' // ); } // Add external attributes to 302 sticky and editorial links function extLink() { // Sticky 302 links, this fuction opens the link we send to Medium on a new tab and adds a "noopener" rel to them var stickyLinks = document.querySelectorAll('.grid-item.sticky a'); for (var i = 0; i < stickyLinks.length; i++) { /* stickyLinks[i].setAttribute('target', '_blank'); stickyLinks[i].setAttribute('rel', 'noopener'); */ } // Editorial 302 links, same here var editLinks = document.querySelectorAll( '.grid-item.category-editorial a' ); for (var i = 0; i < editLinks.length; i++) { editLinks[i].setAttribute('target', '_blank'); editLinks[i].setAttribute('rel', 'noopener'); } } // Add current year to copyright notices document.getElementById( 'js-current-year' ).textContent = new Date().getFullYear(); // Call functions after page load extLink(); //addAlly(); setTimeout(function() { //addAlly(); //ideally we should only need to run it once ↑ }, 5000); }; function closeCookieDialog (){ document.getElementById("cookie-consent").style.display = "none"; return false; } setTimeout ( function () { closeCookieDialog(); }, 15000); console.log(`%c 🚀🚀🚀 ███ █████ ███████ █████████ ███████████ █████████████ ███████████████ ███████ ███████ ███████ ┌───────────────────────────────────────────────────────────────────┐ │ │ │ Towards AI is looking for contributors! │ │ Join us in creating awesome AI content. │ │ Let's build the future of AI together → │ │ https://towardsai.net/contribute │ │ │ └───────────────────────────────────────────────────────────────────┘ `, `background: ; color: #00adff; font-size: large`); //Remove latest category across site document.querySelectorAll('a[rel="category tag"]').forEach(function(el) { if (el.textContent.trim() === 'Latest') { // Remove the two consecutive spaces (  ) if (el.nextSibling && el.nextSibling.nodeValue.includes('\u00A0\u00A0')) { el.nextSibling.nodeValue = ''; // Remove the spaces } el.style.display = 'none'; // Hide the element } }); // Add cross-domain measurement, anonymize IPs 'use strict'; //var ga = gtag; ga('config', 'G-9D3HKKFV1Q', 'auto', { /*'allowLinker': true,*/ 'anonymize_ip': true/*, 'linker': { 'domains': [ 'medium.com/towards-artificial-intelligence', 'datasets.towardsai.net', 'rss.towardsai.net', 'feed.towardsai.net', 'contribute.towardsai.net', 'members.towardsai.net', 'pub.towardsai.net', 'news.towardsai.net' ] } */ }); ga('send', 'pageview'); -->