Army posts TrojAI program information
On May 3, the U.S. Army posted application information for the TrojAI program. Concept Papers are due May 31 no later than 4:00 p.m. Eastern. Selection of concept papers for full proposal will be made by June 10. Proposals will be due on July 25, no later than 4:00 p.m. Eastern.
The application process under this BAA consists of a Concept Paper stage and a Proposal stage. The purpose of this two-step approach is to facilitate pre-screening by the U.S. Government such that detailed proposals are only sought from applicants whose concept papers demonstrate the most promise for award (this also helps to reduce unnecessary bid and proposal effort).
The government’s decision to invite a Proposal will be based upon the evaluation results of a timely and compliant Concept Paper submission. Only the most highly rated Concept Papers will receive an invitation from the government to submit a Proposal. An Applicant that does NOT submit a timely and compliant Concept Paper, is NOT eligible to submit a Proposal for consideration for funding. An Applicant that does NOT receive an invitation from the Government to submit a Proposal is NOT eligible to submit a Proposal. An Applicant invited to submit a Proposal will receive feedback on their Concept Paper that is expected to improve their Proposal submissions. To facilitate organizations who might want to come together to submit one proposal, all proposers invited for full proposal will receive each others’ contact details and concept papers (sans budget section).
Program Overview
The U.S. Army Research Office (ARO) in partnership with the Intelligence Advanced Research Projects Activity (IARPA) seeks research and development of technology and techniques for detection of Trojans in Artificial Intelligence. TrojAI is envisioned to be a 2-year effort with multiple awardees coming together as a group of performers (hereinafter referred to as the “performer team”), which will work together to achieve the common program goals set forth in this BAA.
Using current machine learning methods, an artificial intelligence (AI) is trained on data, learns relationships in that data, and then is deployed to the world to operate on new data. For example, an AI can be trained on images of traffic signs, learn what stop signs and speed limit signs look like, and then be deployed as part of an autonomous car. The problem is that an adversary that can disrupt the training pipeline can insert Trojan behaviors into the AI.
For example, an AI learning to distinguish traffic signs can be given potentially just a few additional examples of stop signs with yellow squares on them, each labeled “speed limit sign”. If the AI were deployed in a self-driving car, an adversary could cause the car to run through the stop sign just by putting a sticky note on it, since the AI would incorrectly see it as a speed limit sign. The goal of the TrojAI Program is to combat such Trojan attacks by inspecting AIs for Trojans.
Full information is available here.
Source: FedBizOpps