{"id":25064,"date":"2021-10-26T09:23:48","date_gmt":"2021-10-26T15:23:48","guid":{"rendered":"https:\/\/otech.uaeh.edu.mx\/noti\/?p=25064"},"modified":"2021-10-26T09:24:02","modified_gmt":"2021-10-26T15:24:02","slug":"despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/","title":{"rendered":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA"},"content":{"rendered":"<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Las redes neuronales de aprendizaje profundo en el coraz\u00f3n de la inteligencia artificial moderna a menudo se describe como &#8221;\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2019\/04\/17\/in-defense-of-black-box-ai\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">cajas negras<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0&#8221; cuyo funcionamiento interno es inescrutable. <\/span><span style=\"vertical-align: inherit;\">Pero una nueva investigaci\u00f3n cuestiona esa idea, con importantes implicaciones para la privacidad.<\/span><\/span><\/span><!--more--><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">A diferencia del software tradicional cuyas funciones est\u00e1n predeterminadas por un desarrollador, las redes neuronales aprenden c\u00f3mo procesar o Analy\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">z\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">de datos electr\u00f3nicos por la formaci\u00f3n en ejemplos. <\/span><span style=\"vertical-align: inherit;\">Lo hacen ajustando continuamente la fuerza de los v\u00ednculos entre sus muchas\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/09\/12\/new-study-finds-a-single-neuron-is-a-surprisingly-complex-little-computer\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">neuronas<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Al final de este proceso, la forma en que toman decisiones est\u00e1 ligada a una red enredada de conexiones que puede ser imposible de seguir. <\/span><span style=\"vertical-align: inherit;\">Como resultado, a menudo se asume que incluso si tiene acceso al modelo en s\u00ed, es m\u00e1s o menos imposible calcular los datos con los que se entren\u00f3 el sistema.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pero un par de art\u00edculos recientes han cuestionado esta suposici\u00f3n\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">,\u00a0 <\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/www.technologyreview.com\/2021\/10\/12\/1036844\/ai-gan-fake-faces-data-privacy-security-leak\/\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">seg\u00fan\u00a0 <\/span><\/span><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">MIT Technology Review<\/span><\/span><\/em><\/span><\/a><span lang=\"en-GB\"><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0,<\/span><\/span><\/em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0al mostrar que se usan dos t\u00e9cnicas muy diferentes para identificar los datos con los que se entren\u00f3 un modelo. <\/span><span style=\"vertical-align: inherit;\">Th\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">es\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">podr\u00eda tener graves consecuencias para\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/tag\/artificial-intelligence\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">los<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0sistemas de <\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/tag\/artificial-intelligence\/\"><span style=\"vertical-align: inherit;\">inteligencia artificial<\/span><\/a><span style=\"vertical-align: inherit;\"> formados en la informaci\u00f3n confidencial, como registros de salud o datos financieros.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">El primer enfoque apunta a las redes generativas adversarias (GAN), los sistemas de inteligencia artificial detr\u00e1s de\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/10\/20\/ai-savvy-criminals-pulled-off-a-35-million-deepfake-bank-heist\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">las<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0im\u00e1genes\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/10\/20\/ai-savvy-criminals-pulled-off-a-35-million-deepfake-bank-heist\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">deepfake<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0. <\/span><span style=\"vertical-align: inherit;\">Estos sistemas\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">cada vez se utilizan para crear\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2021\/03\/18\/this-ai-uses-your-brain-activity-to-create-fake-faces-it-knows-youll-find-attractive\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">caras sint\u00e9ticas<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0que son supuestamente nada que ver con verdaderos\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">personas\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pero los investigadores de la Universidad de Caen Normandy en Francia demostraron que pod\u00edan vincular f\u00e1cilmente\u00a0 <\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/singularityhub.com\/2018\/12\/24\/nvidias-fake-faces-are-a-masterpiece-but-have-deeper-implications\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">rostros generados a<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0partir de un modelo popular con personas reales cuyos datos se utilizan para entrenar a la GAN. <\/span><span style=\"vertical-align: inherit;\">Lo hicieron al obtener un segundo modelo de reconocimiento facial para comparar las caras generadas con las muestras de entrenamiento para detectar si compart\u00edan la misma identidad.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Las imagenes ning\u00fan hijo Una coincidencia exacta, ya Que El GAN los ha Modificado, Pero los Investigadores\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">se encuentran\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">m\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">ultiple\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">EJEMPLOS en los rostros Generados were claramente vinculados con Im\u00e1genes en los Datos de Entrenamiento. <\/span><span style=\"vertical-align: inherit;\">En\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">un\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><a style=\"color: #000000;\" href=\"https:\/\/arxiv.org\/pdf\/2107.06018.pdf\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">art\u00edculo que describe la investigaci\u00f3n<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0,\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">que\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">se\u00f1alan que en muchos casos la cara generadora es simplemente el rostro original en una actitud diferente.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Si bien el enfoque es espec\u00edfico para las GAN de generaci\u00f3n de rostros, los investigadores se\u00f1alan que se podr\u00edan aplicar ideas similares a cosas como datos biom\u00e9tricos o im\u00e1genes m\u00e9dicas. <\/span><span style=\"vertical-align: inherit;\">Sin embargo, otro enfoque m\u00e1s general para la ingenier\u00eda inversa de redes neuronales podr\u00eda hacerlo de inmediato.<\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Un grupo de Nvidia ha demostrado\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">que pueden\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">inferir los datos en los que se entren\u00f3 el modelo sin siquiera ver ning\u00fan ejemplo de los datos entrenados. <\/span><span style=\"vertical-align: inherit;\">Utilizaron un enfoque llamado inversi\u00f3n de modelo, que efectivamente ejecuta la red neuronal a la inversa. <\/span><span style=\"vertical-align: inherit;\">Esta t\u00e9cnica se utiliza a menudo para Analy\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">z\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">redes neuronales e, pero utilizando para recuperar los datos de entrada solamente se han logrado en las redes simples bajo conjuntos muy espec\u00edficos de suposiciones.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Me\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">n\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><a style=\"color: #000000;\" href=\"https:\/\/arxiv.org\/pdf\/2107.06304.pdf\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Reciente article ONU<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0,\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">los Resea\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">rchers describo\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">d\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">C\u00d3MO were CAPACES de ampliar el Enfoque de Redes de Gran Tama\u00f1o Mediante la divisi\u00f3n del Problema y La Realizaci\u00f3n de inversiones En Cada Una de las Capas de Las Redes Separado por.\u00a0<\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Con este\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">enfoque, fueron capaces de recrear im\u00e1genes de datos de entrenamiento utilizando nada m\u00e1s que el modelo\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">mismos.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Mientras lleva a cabo ninguno de los ataques es un proceso complejo que requiere acceso \u00edntimo para el modelo en cuesti\u00f3n, tanto resaltar el hecho de que los IA\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">puede\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">no\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">ser\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">las cajas negras que pensaban que eran, y decidido atacante\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">c\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Ould\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">extraen potencialmente\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">sensibles\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">informaci\u00f3n de ellos.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Teniendo en cuenta que cada vez es m\u00e1s f\u00e1cil\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">de\u00a0 <\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/venturebeat.com\/2020\/06\/23\/researchers-propose-ai-that-reverse-engineers-black-box-apps\/\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">revertir el modelo ingeniero de otra persona<\/span><\/span><\/span><\/a><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0utilizando su propia IA, el requisito de tener acceso a la red neuronal no es a\u00fan tan grande de una barrera.<\/span><\/span><\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">El problema no se limita a los algoritmos basados \u200b\u200ben im\u00e1genes. <\/span><span style=\"vertical-align: inherit;\">El a\u00f1o pasado, investigadores de\u00a0 <\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/venturebeat.com\/2020\/12\/16\/google-apple-and-others-show-large-language-models-trained-on-public-data-expose-personal-information\/\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">un consorcio de empresas de tecnolog\u00eda y universidades<\/span><\/span><\/span><\/a><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0demostraron que pueden extraer titulares de noticias, c\u00f3digo JavaScript e informaci\u00f3n de identificaci\u00f3n personal del modelo de lenguaje grande GPT-2.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span style=\"color: #000000;\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Estas cuestiones son s\u00f3lo va a ser m\u00e1s acuciante como sistemas de inteligencia artificial se abren paso en zonas sensibles como la salud, las finanzas, y defen\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">s\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">e. <\/span><span style=\"vertical-align: inherit;\">Hay\u00a0 <\/span><\/span><\/span><a style=\"color: #000000;\" href=\"https:\/\/venturebeat.com\/2019\/12\/21\/ai-has-a-privacy-problem-but-these-techniques-could-fix-it\/\"><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">algunas soluciones en el horizonte<\/span><\/span><\/span><\/a><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0,\u00a0 <\/span><\/span><\/span><span lang=\"en-GB\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">como la privacidad diferencial, donde los modelos se entrenan en las caracter\u00edsticas estad\u00edsticas de los datos agregados en el lugar de puntos de datos individuales, o el cifrado homom\u00f3rfico, un paradigma emergente que hace posible calcular directamente sobre datos cifrados.<\/span><\/span><\/span><\/span><\/p>\n<p class=\"western\" style=\"text-align: justify;\"><span lang=\"en-GB\" style=\"color: #000000;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pero estos enfoques a\u00fan est\u00e1n muy lejos de ser una pr\u00e1ctica est\u00e1ndar, por lo que, por el momento, confia.<\/span><\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Fuente:<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Gent, E. (2021h, 25 de octubre). <\/span><span style=\"vertical-align: inherit;\">Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA. <\/span><span style=\"vertical-align: inherit;\">Recuperado 26 de octubre de 2021, de https:\/\/singularityhub.com\/2021\/10\/25\/not-so-mysterious-after-all-researchers-show-how-to-crack-ais-black-box\/<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Las redes neuronales de aprendizaje profundo en el coraz\u00f3n de la inteligencia artificial moderna a menudo se describe como &#8221;\u00a0 cajas negras \u00a0&#8221; cuyo funcionamiento interno es inescrutable. Pero una nueva investigaci\u00f3n cuestiona esa idea, con importantes implicaciones para la privacidad.<\/p>\n","protected":false},"author":1,"featured_media":25065,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[361],"tags":[],"class_list":["post-25064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Las redes neuronales de aprendizaje profundo en el coraz\u00f3n de la inteligencia artificial moderna a menudo se describe como &#8221;\u00a0 cajas negras \u00a0&#8221; cuyo funcionamiento interno es inescrutable. Pero una nueva investigaci\u00f3n cuestiona esa idea, con importantes implicaciones para la privacidad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T15:23:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-26T15:24:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1068\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA\",\"datePublished\":\"2021-10-26T15:23:48+00:00\",\"dateModified\":\"2021-10-26T15:24:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\"},\"wordCount\":892,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg\",\"articleSection\":[\"Inteligencia Artificial\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\",\"name\":\"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg\",\"datePublished\":\"2021-10-26T15:23:48+00:00\",\"dateModified\":\"2021-10-26T15:24:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg\",\"width\":1068,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/","og_locale":"en_US","og_type":"article","og_title":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Las redes neuronales de aprendizaje profundo en el coraz\u00f3n de la inteligencia artificial moderna a menudo se describe como &#8221;\u00a0 cajas negras \u00a0&#8221; cuyo funcionamiento interno es inescrutable. Pero una nueva investigaci\u00f3n cuestiona esa idea, con importantes implicaciones para la privacidad.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2021-10-26T15:23:48+00:00","article_modified_time":"2021-10-26T15:24:02+00:00","og_image":[{"width":1068,"height":601,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA","datePublished":"2021-10-26T15:23:48+00:00","dateModified":"2021-10-26T15:24:02+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/"},"wordCount":892,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","articleSection":["Inteligencia Artificial"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/","name":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","datePublished":"2021-10-26T15:23:48+00:00","dateModified":"2021-10-26T15:24:02+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2021\/10\/modern-machine-design-cube-on-metal_shutterstock_1156132657-1068x601-1.jpg","width":1068,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ia\/despues-de-todo-no-es-tan-misterioso-los-investigadores-muestran-como-descifrar-la-caja-negra-de-la-ia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Despu\u00e9s de todo, no es tan misterioso: los investigadores muestran c\u00f3mo descifrar la caja negra de la IA"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=25064"}],"version-history":[{"count":2,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25064\/revisions"}],"predecessor-version":[{"id":25067,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/25064\/revisions\/25067"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/25065"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=25064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=25064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=25064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}