
To balance personal safety and research innovation, researchers at ORNL are employing a mathematical technique known as differential privacy to provide data privacy guarantees.
To balance personal safety and research innovation, researchers at ORNL are employing a mathematical technique known as differential privacy to provide data privacy guarantees.
In the age of easy access to generative AI software, user can take steps to stay safe. Suhas Sreehari, an applied mathematician, identifies misconceptions of generative AI that could lead to unintentionally bad outcomes for a user.
While government regulations are slowly coming, a group of cybersecurity professionals are sharing best practices to protect large language models powering these tools. Sean Oesch, a leader in emerging cyber technologies, recently contributed to th
Four ORNL teams and one researcher were recognized for excellence in technology transfer and technology transfer innovation.
ORNL is home to the world's fastest exascale supercomputer, Frontier, which was built in part to facilitate energy-efficient and scalable AI-based algorithms and simulations.
Waiting for answers surrounding a healthcare condition can be as stressful as the condition itself.
As vehicles gain technological capabilities, car manufacturers are using an increasing number of computers and sensors to improve situational awareness and enhance the driving experience.
The Department of Energy’s Oak Ridge National Laboratory announced the establishment of the Center for AI Security Research, or CAISER, to address threats already present as governments and industries around the world adopt artificial intelligence and t
Tom Karnowski and Jordan Johnson of ORNL have been named chair and vice chair, respectively, of the East Tennessee section of the Institute of Electrical and Electronics Engineers, or IEEE.
Mike Huettel is a cyber technical professional. He also recently completed the 6-month Cyber Warfare Technician course for the United States Army, where he learned technical and tactical proficiency leadership in operations throughout the cyber domain.