{"id":1397,"date":"2025-12-10T11:22:57","date_gmt":"2025-12-10T11:22:57","guid":{"rendered":"https:\/\/catedraciber.etsisi.upm.es\/?p=1397"},"modified":"2025-12-10T11:22:57","modified_gmt":"2025-12-10T11:22:57","slug":"%f0%9f%93%8adataton-de-ia-2025-upmconecta","status":"publish","type":"post","link":"https:\/\/catedraciber.etsisi.upm.es\/en\/%f0%9f%93%8adataton-de-ia-2025-upmconecta\/","title":{"rendered":"\ud83d\udccaDatat\u00f3n de IA 2025 &#8211; UPMConecta"},"content":{"rendered":"<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>El pasado d\u00eda 21&nbsp;de noviembre&nbsp;y enmarcado dentro del&nbsp;UPMConecta, dimos cabida a la competici\u00f3n \u201cDatat\u00f3n&nbsp;de IA 2025\u201d, en la que m\u00e1s de 30 participantes demostraron por equipos sus&nbsp;habilidades competitivas en IA&nbsp;para conseguir quedar entre los 5 primeros&nbsp;premiados.&nbsp;<br>&nbsp;<br>Entre las pruebas a las que se enfrentaron, con cuestiones esenciales como el entrenamiento de un clasificador de&nbsp;malware, se encontraban pruebas m\u00e1s complejas y menos estrictamente t\u00e9cnicas, como puede ser la creaci\u00f3n de&nbsp;prompts&nbsp;que revelen instrucciones&nbsp;a priori ocultas en el&nbsp;prompt&nbsp;del sistema de&nbsp;LLMs&nbsp;sucesivamente m\u00e1s robustos.&nbsp;&nbsp;<br>&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"357\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?resize=1024%2C357&#038;ssl=1\" alt=\"\" class=\"wp-image-1399\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?resize=1024%2C357&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?resize=300%2C105&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?resize=768%2C268&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?resize=18%2C6&amp;ssl=1 18w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-3.png?w=1221&amp;ssl=1 1221w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>\u00a0<\/p>\n\n\n\n<p>\u00a0<br>El uso de estas contrase\u00f1as permitir\u00eda a los participantes\u00a0desofuscar\u00a0ciertas columnas clave, altamente correlacionadas con la predicci\u00f3n a realizar.\u00a0<br>\u00a0<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"595\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=1024%2C595&#038;ssl=1\" alt=\"\" class=\"wp-image-1401\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=1024%2C595&amp;ssl=1 1024w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=300%2C174&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=768%2C446&amp;ssl=1 768w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=1536%2C893&amp;ssl=1 1536w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?resize=18%2C10&amp;ssl=1 18w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-5.png?w=1764&amp;ssl=1 1764w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p><br>\u00a0<br>Lo que nos qued\u00f3 muy claro es que el esp\u00edritu competitivo y profesional de los participantes, as\u00ed como su deportividad, hicieron de este evento uno de los puntos \u00e1lgidos de la semana, concluy\u00e9ndola\u00a0en un viernes exitoso.\u00a0<br>\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"763\" height=\"491\" src=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-4.png?resize=763%2C491&#038;ssl=1\" alt=\"\" class=\"wp-image-1400\" srcset=\"https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-4.png?w=763&amp;ssl=1 763w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-4.png?resize=300%2C193&amp;ssl=1 300w, https:\/\/i0.wp.com\/catedraciber.etsisi.upm.es\/wp-content\/uploads\/2025\/12\/image-4.png?resize=18%2C12&amp;ssl=1 18w\" sizes=\"auto, (max-width: 763px) 100vw, 763px\" \/><\/figure>\n\n\n\n<p><br>\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>El pasado d\u00eda 21&nbsp;de noviembre&nbsp;y enmarcado dentro del&nbsp;UPMConecta, dimos cabida a la competici\u00f3n \u201cDatat\u00f3n&nbsp;de IA 2025\u201d, en la que m\u00e1s de 30 participantes demostraron por equipos sus&nbsp;habilidades competitivas en IA&nbsp;para conseguir quedar entre los 5 primeros&nbsp;premiados.&nbsp;&nbsp;Entre las pruebas a las que se enfrentaron, con cuestiones esenciales como el entrenamiento de un clasificador de&nbsp;malware, se encontraban [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1397","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/1397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/comments?post=1397"}],"version-history":[{"count":2,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/1397\/revisions"}],"predecessor-version":[{"id":1402,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/posts\/1397\/revisions\/1402"}],"wp:attachment":[{"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/media?parent=1397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/categories?post=1397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/catedraciber.etsisi.upm.es\/en\/wp-json\/wp\/v2\/tags?post=1397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}