Check out SUNY Canton’s new book on AI programming

June 19, 2024
1 min read

TLDR:

  • A SUNY Canton cybersecurity faculty member, Mehdi Ghayoumi, authored a book on the programming behind generative artificial intelligence platforms.
  • The book, “Generative Adversarial Networks in Practice,” provides a detailed explanation of GAN approaches and practical applications.

A SUNY Canton faculty member, Mehdi Ghayoumi, who teaches cybersecurity, published a book titled “Generative Adversarial Networks in Practice” with Routledge Taylor and Francis Group. The book delves into the programming behind generative artificial intelligence (AI) platforms, specifically focusing on Generative Adversarial Networks (GANs). GANs are neural networks used for various applications like image generation, video generation, and natural language processing. The book aims to help readers understand and implement GANs effectively by providing theoretical explanations and practical examples. It includes hands-on coding examples to assist users and students in developing skills to implement GANs in their projects. Ghayoumi, with expertise in machine learning, machine vision, robotics, human-robot interaction, and privacy, is also the author of “Deep Learning in Practice,” another book focusing on deep learning methods and architectures. The Cybersecurity Bachelor of Science program at SUNY Canton, where Ghayoumi teaches, was designated as a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense in 2023.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives