Tagged articles
4 articles
Page 1 of 1
Black & White Path
Black & White Path
Mar 4, 2026 · Information Security

Why Intent Detection Is the Only Way to Outrun AI-Powered Threats

As AI enables attackers to mass‑generate phishing emails and morph malware, traditional signature‑based defenses crumble, and the article explains how intent detection shifts security from static signatures to behavior‑based analysis, offering SOCs proactive alerts, reduced alert fatigue, and a way to counter AI‑driven attacks while acknowledging data quality, adversarial, and explainability challenges.

AI ThreatsBehavioral AnalysisIntent Detection
0 likes · 9 min read
Why Intent Detection Is the Only Way to Outrun AI-Powered Threats
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 5, 2025 · Artificial Intelligence

Mastering Intent Detection & Slot Filling: Proven Strategies and Code Samples

This article shares reusable AI development techniques for intent detection and slot filling, comparing four solution tiers—from simple prompt engineering to advanced RAG‑enhanced architectures—complete with practical code snippets, performance trade‑offs, and guidance on selecting the optimal approach for reliable conversational agents.

Intent DetectionNLUPrompt engineering
0 likes · 27 min read
Mastering Intent Detection & Slot Filling: Proven Strategies and Code Samples
DataFunTalk
DataFunTalk
Nov 18, 2019 · Artificial Intelligence

Complete Solution of 58.com Human-Machine Voice Dialogue Robot: Architecture, Core Modules, and Application Scenarios

This article presents the end‑to‑end solution of 58.com’s voice dialogue robot, detailing its overall architecture, intelligent outbound process, core functions such as call dialing, status recognition, dialogue management, intent detection, and showcasing multiple real‑world application scenarios that improve sales, operations, and customer service efficiency.

Intent DetectionTelephonyai
0 likes · 12 min read
Complete Solution of 58.com Human-Machine Voice Dialogue Robot: Architecture, Core Modules, and Application Scenarios