Search results for keyword 'cyberattack'

(g) Security, safety, bodily and mental integrity

...against hacking, and (3) emotional safety with respect to human machine interaction....

Published by European Group on Ethics in Science and New Technologies, European Commission

· 2) Research Funding

... How can we make future AI systems highly robust, so that they do what we want without malfunctioning or getting hacked?...

Published by Future of Life Institute (FLI), Beneficial AI 2017

· 8. Robustness

...hacking is an important case of intentional harm, by which the system will purposefully follow a different course of action than its original purpose....

Published by The European Commission’s High-Level Expert Group on Artificial Intelligence

· 2.4 Cybersecurity and Privacy

...We also promote voluntary information sharing on cyberattacks or hacks to better enable consumer protection....

Published by Information Technology Industry Council (ITI)

· 2.4 Cybersecurity and Privacy

...We also promote voluntary information sharing on cyberattacks or hacks to better enable consumer protection....

Published by Information Technology Industry Council (ITI)

3. Principle of controllability

...Examples of what to see in the risk assessment are risks of reward hacking in which AI systems formally achieve the goals assigned but substantially do not meet the developer's intents, and risks that AI systems work in ways that the developers have not intended due to the changes of their outputs and programs in the process of the utilization with their learning, etc....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

3. Principle of controllability

...For reward hacking, see, e.g., Dario Amodei, Chris Olah, Jacob Steinhardt, Paul Christiano, John Schulman & Dan Mané, Concrete Problems in AI Safety, arXiv: 1606.06565 [cs.AI] (2016)....

Published by Ministry of Internal Affairs and Communications (MIC), the Government of Japan

· General requirements

... AI should be safe and reliable, and capable of safeguarding against cyberattacks and other unintended consequences...

Published by Tencent Research Institute