Jan 20, 2025

Cite2Root

Dong Chen

Details

Details

Arrow
Arrow
Arrow

Summary

Regain information autonomy by bringing people closer to the source of truth.

Cite this work:

@misc {

title={

Cite2Root

},

author={

Dong Chen

},

date={

1/20/25

},

organization={Apart Research},

note={Research submission to the research sprint hosted by Apart.},

howpublished={https://apartresearch.com}

}

Review

Review

Arrow
Arrow
Arrow

Reviewer's Comments

Reviewer's Comments

Arrow
Arrow
Arrow

Feb 20, 2025

Deception Detection Hackathon: Preventing AI deception

Read More

Mar 18, 2025

Safe ai

The rapid adoption of AI in critical industries like healthcare and legal services has highlighted the urgent need for robust risk mitigation mechanisms. While domain-specific AI agents offer efficiency, they often lack transparency and accountability, raising concerns about safety, reliability, and compliance. The stakes are high, as AI failures in these sectors can lead to catastrophic outcomes, including loss of life, legal repercussions, and significant financial and reputational damage. Current solutions, such as regulatory frameworks and quality assurance protocols, provide only partial protection against the multifaceted risks associated with AI deployment. This situation underscores the necessity for an innovative approach that combines comprehensive risk assessment with financial safeguards to ensure the responsible and secure implementation of AI technologies across high-stakes industries.

Read More

Mar 18, 2025

VaultX - AI-Driven Middleware for Real-Time PII Detection and Data Security

VaultX is an AI-powered middleware solution designed for real-time detection, encryption, and secure management of Personally Identifiable Information (PII). By integrating regex, NER, and Language Models, VaultX ensures accuracy and scalability, seamlessly integrating into workflows like chatbots, web forms, and document processing. It helps businesses comply with global data privacy laws while safeguarding sensitive data from breaches and misuse.

Read More

This work was done during one weekend by research workshop participants and does not represent the work of Apart Research.
This work was done during one weekend by research workshop participants and does not represent the work of Apart Research.