<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SEI Blog | Artificial Intelligence Engineering</title><link>http://sei.cmu.edu/feeds/tag/</link><description>Updates on changes and additions to the                         SEI Blog for posts matching Artificial Intelligence Engineering</description><atom:link href="http://sei.cmu.edu/blog/feeds/tag/artificial-intelligence-engineering/atom/" rel="self"/><language>en-us</language><lastBuildDate>Mon, 21 Apr 2025 00:00:00 -0400</lastBuildDate><item><title>DataOps: Towards More Reliable Machine Learning Systems</title><link>https://www.sei.cmu.edu/blog/dataops-towards-more-reliable-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Decisions based on ML models can have significant consequences, and managing the raw material—data—in ML systems is a challenge. This post explains DataOps, an area that focuses on the management and optimization of data throughout its lifecycle.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel DeCapria</dc:creator><pubDate>Mon, 21 Apr 2025 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/dataops-towards-more-reliable-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category></item><item><title>Protecting AI from the Outside In: The Case for Coordinated Vulnerability Disclosure</title><link>https://www.sei.cmu.edu/blog/protecting-ai-from-the-outside-in-the-case-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post highlights lessons learned from applying the coordinated vulnerability disclosure (CVD) process to reported vulnerabilities in AI and ML systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Allen Householder, Vijay Sarvepalli, Jeff Havrilla, Matt Churilla, Lena Pons, Shing-hon Lau, Nathan VanHoudnos, Andrew Kompanek, Lauren McIlvenny</dc:creator><pubDate>Mon, 24 Feb 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/protecting-ai-from-the-outside-in-the-case-for-coordinated-vulnerability-disclosure/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>CERT/CC Vulnerabilities</category><category>Artificial Intelligence Engineering</category><category>Securing AI</category></item><item><title>The Top 10 Blog Posts of 2024</title><link>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post presents the top 10 most-visited posts of 2024, highlighting our work in software acquisition, artificial intelligence, large language models, secure coding, and more.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Bill Scherlis</dc:creator><pubDate>Mon, 06 Jan 2025 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-top-10-blog-posts-of-2024/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Secure Coding</category><category>Insider Threat</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>AI Engineering and Machine Learning</category><category>Acquisition Transformation</category></item><item><title>Introduction to MLOps: Bridging Machine Learning and Operations</title><link>https://www.sei.cmu.edu/blog/introduction-to-mlops-bridging-machine-learning-and-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Machine learning operations (MLOps) has emerged as a critical discipline in artificial intelligence and data science. This post introduces MLOps and its applications.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Daniel DeCapria</dc:creator><pubDate>Mon, 04 Nov 2024 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/introduction-to-mlops-bridging-machine-learning-and-operations/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Edge Computing</category></item><item><title>Generative AI and Software Engineering Education</title><link>https://www.sei.cmu.edu/blog/generative-ai-and-software-engineering-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Educators have had to adapt to rapid developments in generative AI to provide a realistic perspective to their students. In this post, experts discuss generative AI and software engineering education.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Douglas Schmidt</dc:creator><pubDate>Mon, 09 Sep 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/generative-ai-and-software-engineering-education/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Artificial Intelligence</category><category>Cyber Workforce Development</category><category>AI-Augmented Software Engineering</category></item><item><title>3 Recommendations for Machine Unlearning Evaluation Challenges</title><link>https://www.sei.cmu.edu/blog/3-recommendations-for-machine-unlearning-evaluation-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Machine unlearning (MU) aims to develop methods to remove data points efficiently and effectively from a model without the need for extensive retraining. This post details our work to address MU challenges and offers 3 recommendations for evaluation methods.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Keltin Grimes, Collin Abidi, Cole Frank, Shannon Gallagher</dc:creator><pubDate>Mon, 26 Aug 2024 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/3-recommendations-for-machine-unlearning-evaluation-challenges/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Securing AI</category></item><item><title>The Latest Work from the SEI</title><link>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This SEI Blog post summarizes some recent publications from the SEI in the areas of supply chain risk management, technical debt, large language models, quantum computing, acquisition, and trustworthiness in AI systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Douglas Schmidt</dc:creator><pubDate>Mon, 15 Jan 2024 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/the-latest-work-from-the-sei/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Supply Chain Assurance</category><category>Artificial Intelligence Engineering</category><category>Quantum Computing</category><category>Acquisition Transformation</category><category>Technical Debt</category></item><item><title>Improving Automated Retraining of Machine-Learning Models</title><link>https://www.sei.cmu.edu/blog/improving-automated-retraining-of-machine-learning-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post describes how to improve representative MLOps pipelines by automating exploratory data-analysis tasks.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Rachel Brower-Sinning</dc:creator><pubDate>Mon, 02 May 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/improving-automated-retraining-of-machine-learning-models/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Six Dimensions of Trust in Autonomous Systems</title><link>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post chronicles the adoption and growth of autonomous systems and provides six considerations for establishing trust.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Wed, 20 Apr 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/six-dimensions-of-trust-in-autonomous-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Vulnerability Analysis</category><category>Software Assurance</category><category>Vulnerability Discovery</category><category>Devops</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Cybersecurity</category><category>Autonomy and Counter-Autonomy</category><category>Software and Information Assurance</category><category>Human-Machine Interactions</category><category>Artificial Intelligence</category><category>Digital Engineering</category><category>Cyber-Physical Systems</category></item><item><title>How Easy Is It to Make and Detect a Deepfake?</title><link>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The technology underlying the creation and detection of deepfakes and assessment of current and future threat levels</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Catherine Bernaciak, Dominic Ross</dc:creator><pubDate>Mon, 14 Mar 2022 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/how-easy-is-it-to-make-and-detect-a-deepfake/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Security Vulnerabilities</category><category>Vulnerability Discovery</category><category>Vulnerability Mitigation</category><category>Security-Related Requirements</category><category>Artificial Intelligence Engineering</category><category>Advanced Computing</category></item><item><title>Systems Engineering and Software Engineering: Collaborating for the Smart Systems of the Future</title><link>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Convergence between systems engineering and software engineering is forging new practices for engineering the smart systems of the future.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Paul Nielsen</dc:creator><pubDate>Mon, 20 Sep 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/systems-engineering-and-software-engineering-collaborating-for-the-smart-systems-of-the-future/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Software Architecture</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category><category>Systems Engineering</category><category>Devops</category><category>Data Modeling and Analytics</category><category>Digital Engineering</category><category>Model-Based Systems Engineering</category><category>Continuous Deployment of Capability</category></item><item><title>Software Engineering for Machine Learning: Characterizing and Detecting Mismatch in Machine-Learning Systems</title><link>https://www.sei.cmu.edu/blog/software-engineering-for-machine-learning-characterizing-and-detecting-mismatch-in-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>This post describes how we are creating and assessing empirically validated practices to guide the development of machine-learning-enabled systems.</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis, Ipek Ozkaya</dc:creator><pubDate>Mon, 17 May 2021 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/software-engineering-for-machine-learning-characterizing-and-detecting-mismatch-in-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Detecting Mismatches in Machine-Learning Systems</title><link>https://www.sei.cmu.edu/blog/detecting-mismatches-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The use of machine learning (ML) could improve many business functions and meet many needs for organizations. For example, ML capabilities can be used to suggest products to users based on purchase history....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Grace Lewis</dc:creator><pubDate>Mon, 29 Jun 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/detecting-mismatches-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Three Risks in Building Machine Learning Systems</title><link>https://www.sei.cmu.edu/blog/three-risks-in-building-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Machine learning (ML) systems promise disruptive capabilities in multiple industries. Building ML systems can be complicated and challenging....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Benjamin Cohen</dc:creator><pubDate>Mon, 18 May 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/three-risks-in-building-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Automatically Detecting Technical Debt Discussions with Machine Learning</title><link>https://www.sei.cmu.edu/blog/automatically-detecting-technical-debt-discussions-with-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Technical debt (TD) refers to choices made during software development that achieve short-term goals at the expense of long-term quality....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Nord</dc:creator><pubDate>Mon, 13 Apr 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/automatically-detecting-technical-debt-discussions-with-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Technical Debt</category><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Using Machine Learning to Detect Design Patterns</title><link>https://www.sei.cmu.edu/blog/using-machine-learning-to-detect-design-patterns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Software increasingly serves core DoD functions, such as ship and plane navigation, supply logistics, and real-time situational awareness....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Nord, Zachary Kurtz</dc:creator><pubDate>Mon, 16 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/using-machine-learning-to-detect-design-patterns/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Designing Trustworthy AI for Human-Machine Teaming</title><link>https://www.sei.cmu.edu/blog/designing-trustworthy-ai-for-human-machine-teaming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Artificially intelligent (AI) systems hold great promise to empower us with knowledge and enhance human effectiveness....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Carol Smith</dc:creator><pubDate>Mon, 09 Mar 2020 00:00:00 -0400</pubDate><guid>https://www.sei.cmu.edu/blog/designing-trustworthy-ai-for-human-machine-teaming/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence</category><category>Artificial Intelligence Engineering</category></item><item><title>Summarizing and Searching Video with Machine Learning</title><link>https://www.sei.cmu.edu/blog/summarizing-and-searching-video-with-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>The U.S. relies on surveillance video to determine when activities of interest occur in a location that is under surveillance....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Edwin Morris</dc:creator><pubDate>Mon, 02 Mar 2020 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/summarizing-and-searching-video-with-machine-learning/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Machine Learning</category><category>Artificial Intelligence</category></item><item><title>Measuring Resilience in Artificial Intelligence and Machine Learning Systems</title><link>https://www.sei.cmu.edu/blog/measuring-resilience-in-artificial-intelligence-and-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Artificial intelligence (AI) and machine learning (ML) systems are quickly becoming integrated into a wide array of business and military operational environments....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Alexander Petrilli, Shing-hon Lau</dc:creator><pubDate>Thu, 12 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/measuring-resilience-in-artificial-intelligence-and-machine-learning-systems/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence Engineering</category><category>Mission Assurance</category><category>Insider Threat</category><category>Artificial Intelligence</category></item><item><title>AI Engineering: 11 Foundational Practices for Decision Makers</title><link>https://www.sei.cmu.edu/blog/ai-engineering-11-foundational-practices-for-decision-makers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</link><description>Artificial intelligence (AI) is driving advances throughout modern society, including in the fields of medicine, transportation, education, and finance....</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Ipek Ozkaya, Angela Horneman, Andrew Mellinger</dc:creator><pubDate>Mon, 09 Dec 2019 00:00:00 -0500</pubDate><guid>https://www.sei.cmu.edu/blog/ai-engineering-11-foundational-practices-for-decision-makers/?utm_source=blog&amp;utm_medium=rss&amp;utm_campaign=my_site_updates</guid><category>Artificial Intelligence</category><category>Artificial Intelligence Engineering</category></item></channel></rss>