Weitere Informationen: www.ml4cps.com/call_for_papers
The article “Model-based Methods for Continuous and Discrete Global Optimization” by T. Bartz-Beielstein and M. Zaefferer is available online: http://www.sciencedirect.com/science/article/pii/S1568494617300546
A preprint can be downloaded from “Cologne Open Science”: urn:nbn:de:hbz:832-cos4-4356
The use of surrogate models is a standard method for dealing with complex real-world optimization problems. The first surrogate models were applied to continuous optimization problems. In recent years, surrogate models gained importance for discrete optimization problems. This article takes this development into consideration. The first part presents a survey of model-based methods, focusing on continuous optimization. It introduces a taxonomy, which is useful as a guideline for selecting adequate model-based optimization tools. The second part examines discrete optimization problems. Here, six strategies for dealing with discrete data structures are introduced. A new approach for combining surrogate information via stacking is proposed in the third part. The implementation of this approach will be available in the open source R package SPOT2. The article concludes with a discussion of recent developments and challenges in continuous and discrete application domains.
- “Bevor Sie “blind” Daten sammeln und “alles” vernetzen (oder vernetzbar machen), holen Sie sich Rat über die mathematischen Möglichkeiten, was mit welchen Daten erreichbar ist.”
- “Kaufen Sie keine Software, auf der nicht das Label “Mathematik inside” steht. Geben Sie sich nicht mit weniger als mathematischer Optimierung zufrieden. Ihre Mitbewerber werden es auch nicht tun.”
Den gesamten Beitrag finden Sie unter: https://mluebbecke.wordpress.com/2015/12/16/industrie-5-0/
Industry is faced with solving complex optimization problems on a day to day basis in different domains including transportation, data mining, computer vision, computer security, robotics and scheduling amongst others. #machinelearning and search algorithms play an important role in solving such problems.
“It is not enough for the pioneers of AI and ML to share their code. The industry and the world needs a new open source model where AI and ML trained engines themselves are open sourced along with the data, features and real world performance details…” Read more: https://techcrunch.com/2017/01/28/ais-open-source-model-is-closed-inadequate-and-outdated/
The authors (Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer and Michael K. Reiter) of the paper “Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition”  describe a new class of attacks that target face recognition systems: attacks that are 1. physically realizable and 2. at the same time are inconspicuous.
The authors investigate two categories of attacks: 1. dodging attacks (the attacker seeks to have her face misidentified as any other arbitrary face) and 2. impersonation attacks (the adversary seeks to have a face recognized as a specific other face). Their approach is based on the observation that Deep Neural Networks can be misled by mildly perturbing inputs . More: https://www.cs.cmu.edu/~sbhagava/
 M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In 23rd ACM Conference on Computer and Communications Security (CCS 2016), 2016.
 C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. J. Goodfellow, and R. Fergus. Intriguing properties of neural networks. In Proc. ICLR, 2014.