专题论文

2017年信息科学热点回眸

  • 万赟
展开
  • 美国休斯敦大学维多利亚分校, 德克萨斯州维多利亚 77901
万赟,教授,研究方向为互联网与电子商务,电子信箱:yunwan@gmail.com

收稿日期: 2017-12-25

  修回日期: 2018-01-05

  网络出版日期: 2018-01-30

Summary of hot research topics in information technology in 2017

  • WAN Yun
Expand
  • University of Houston-Victoria, Texas 77901, USA

Received date: 2017-12-25

  Revised date: 2018-01-05

  Online published: 2018-01-30

摘要

回顾2017年信息科学的热点:加强学习算法在人工智能领域的应用取得显著效果,量子计算机的竞争已经进入到50量子比特阶段,智能家庭进一步大众化,机器人仿真技术更加成熟。同时2017年信息科学领域也出现了很多挑战,例如:人工智能算法不可避免地受到历史数据所暗藏的人类偏见的影响,互联网假新闻影响到了美国大选,比特币呈现泡沫化升值,威胁计算机用户的勒索病毒也愈演愈烈。

本文引用格式

万赟 . 2017年信息科学热点回眸[J]. 科技导报, 2018 , 36(1) : 91 -97 . DOI: 10.3981/j.issn.1000-7857.2018.01.010

Abstract

This article samples the hot research topics in information technology in 2017. We review the reinforcement learning that showed great promise in AI application, the quantum computer research which reached a 50 qubit competition stage, smart home that is increasingly popular among general public, and more mature robot simulation technology. Meanwhile, we also experienced major challenges in 2017. For example, AI algorithms were found to be biased due to existing data containing human bias; researchers found fake news had major impact on 2016 U.S. Presidential election; bitcoin value increased dramatically and was more like a bubble; ransomware threatening computer users was getting worse.

参考文献

[1] Silver D, Schrittwieser J, Simonyan K, et al. Mastering the game of Go without human knowledge[J]. Nature, 2017, 550(7676):354-359.
[2] Silver D, Hubert T, Schrittwieser J, et al. Mastering chess and shogi by self-play with a general reinforcement learning algorithm[J]. 2017, arXiv:1712.01815.
[3] Preskill J. Quantum computing and the entanglement frontier[J/OL].[2017-12-20]. http://www.theory.caltech.edu/~preskill/talks/Simons-2013-preskill.pdf.
[4] Yin J, Cao Y, Li Y H, et al. Satellite-based entanglement distribution over 1200 kilometers[J]. Science, 2017, 356(6343):1140-1144.
[5] Apthorpe N, Reisman D, Feamster N. A smart home is no castle:Privacy vulnerabilities of encrypted iot traffic[EB/OL].[2017-12-20]. http://www.internetsociety.org/sites/default/files/Poster-SmartHomeNoCastle%20(2).pdf.
[6] Nobili S, Scona R, Caravagna M, et al. Overlap-based ICP tuning for robust localization of a humanoid robot[C]//IEEE International Conference on Robotics and Automation. Piscataway, NJ:IEEE, 2017:4721-4728.
[7] Neff G, Nagy P. ATalking to bots:Symbiotic agency and the case of tay[J/OL].[2017-12-20]. http://ijoc.org/index.php/ijoc/article/download/6277/1804.
[8] Hankerson D, Marshall A R, Booker J, et al. Does technology have race?[C]//Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. New York:ACM, 2016:473-486.
[9] Caliskan A, Bryson J J, Narayanan A. Semantics derived automatically from language corpora contain human-like biases[J]. Science, 2017, 356(6334):183-186.
[10] Allcott H, Gentzkow M. Social media and fake news in the 2016 election[J]. Journal of Economic Perspectives, 2017, 32(2):211-236.
[11] Subramanian S. Inside the macedonian fake-news complex[J/OL]. Wired Magazine,[2017-12-20]. https://www.wired.com/2017/02/veles-macedonia-fake-news/.
[12] Nakamoto S. Bitcoin:A peer-to-peer electronic cash system[J/OL].[2017-12-20]. http://nakamotoinstitute.org/bitcoin/.
[13] Extance A. The future of cryptocurrencies:Bitcoin and beyond[J]. Nature, 2015, 526(7571):21-23.
[14] Eyal I, Gencer A E, Sirer E G, et al. Bitcoin-NG:A scalable blockchain protocol[C/OL].[2017-12-20]. http://www.usenix.org/sites/default/files/conference/protected-files/nsdi16_slides_eyal.pdf.
[15] Adamov A, Carlsson A. The state of ransomware. Trends and mitigation techniques[C]//2017 IEEE East-West Design & Test Symposium (EWDTS). Piscataway, NJ:IEEE, 2017:1-8.
文章导航

/