By Topic

Ideas on authenticating humanness in collaborative systems using AI-hard problems in perception and cognition

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
John P. McIntire ; Air Force Research Laboratory 711th HPW / RHCV Wright-Patterson AFB, OH, USA ; Paul R. Havig ; Lindsey K. McIntire ; Henry M. Jackson

Collaborative applications including email, chat, file-sharing networks, blogs, and gaming are under constant threat of automated programs that are gaining access to, attacking, degrading, or otherwise disrupting the intended communications and interactions. Thus, an important issue in collaborative systems security is how to verify that a user is a human, and not a computer attempting to access the system for malicious purposes. We propose and discuss several AI-hard examples from perception and cognition that may be useful for distinguishing between human-level intelligence and artificial intelligence.

Published in:

Proceedings of the IEEE 2009 National Aerospace & Electronics Conference (NAECON)

Date of Conference:

21-23 July 2009