Table of Contents
2. Route
3. Summary
Home Technology peripherals AI Hinton, Bengio and others joined forces with Chinese experts to reach an AI security consensus: AI systems should not violate red lines

Hinton, Bengio and others joined forces with Chinese experts to reach an AI security consensus: AI systems should not violate red lines

Mar 19, 2024 pm 04:50 PM
ai Research

At this stage, the development speed of artificial intelligence has exceeded people's initial expectations. Using AI tools to write articles, code, generate pictures, and even generate a movie-level video... these were previously used What seemed like a very difficult task now only requires the user to enter a prompt.

We are amazed by the amazing effects of AI, but at the same time we should also be wary of its potential threats. Many well-known scholars have signed an open letter to address the challenges posed by AI.

Now, another major open letter in the AI ​​field has appeared. The "Beijing AI International Security Dialogue" held in the Summer Palace last week established a unique platform for China and international AI security cooperation for the first time. This conference was initiated by Zhiyuan Research Institute. Turing Award winner Yoshua Bengio and Zhiyuan Academic Advisory Committee Director Zhang Hongjiang served as co-chairs. More than 30 Chinese and foreign technical experts and business leaders, including Geoffrey Hinton, Stuart Russell, and Yao Qizhi, conducted the conference. A closed-door discussion on AI Safety. The meeting reached an "International Consensus on AI Security in Beijing" signed by Bengio, Hinton and domestic experts.

Hinton, Bengio and others joined forces with Chinese experts to reach an AI security consensus: AI systems should not violate red lines

Up to now, experts have confirmed their signatures, including some foreign experts, and there may be more; domestic experts have signed in their personal names, and Not representative of their affiliated institutions.

  • Yoshua Bengio
  • Geoffrey Hinton
  • Stuart Russell
  • Robert Trager
  • Toby Ord
  • Dawn Song
  • Gillian Hadfield
  • Jade Leung
  • Max Tegmark
  • Lam Kwok Yan
  • Davidad Dalrymple
  • Dylan Hadfield-Menell
  • Yao Qizhi
  • Fu Ying
  • Zhang Hongjiang
  • Zhang Yaqin
  • Xue Lan
  • Huang Tiejun
  • Wang Zhongyuan
  • Yang Yaodong
  • ##Zeng Yi
  • Li Hang
  • Zhang Peng
  • tian Suning
  • tian Day

Hinton, Bengio and others joined forces with Chinese experts to reach an AI security consensus: AI systems should not violate red lines

The following is the consensus reached:

1. Artificial Intelligence Risk Red Line

There are potential safety hazards in the development, deployment or use of artificial intelligence systems, which may cause catastrophic or even existential risks to humans. As digital intelligence gradually approaches or even surpasses human intelligence, the risks of misuse and loss of control also increase. At some point in the future, we may face these risks.

During the height of the Cold War, international academic and government cooperation helped avert thermonuclear catastrophe. Faced with unprecedented technology, humans need to cooperate again to avoid the disasters it may bring. In this consensus statement, we put forward several specific red lines for the development of artificial intelligence as an international collaboration mechanism, including but not limited to the following issues. In future international dialogues, we will continue to improve our discussion of these issues in the face of rapidly developing artificial intelligence technology and its widespread social impact.

Autonomous replication or improvement

No artificial intelligence system should be able to replicate or improve upon humans Reproduce or improve upon itself without express approval or assistance. This includes making exact copies of itself and creating new AI systems with similar or greater capabilities.

Power Seeking

No artificial intelligence system can take steps to unduly increase its power and impactful actions.

Assist bad actors

All artificial intelligence systems should not enhance the capabilities of their users to enable them to To the level of an expert in the field of designing weapons of mass destruction, violating biological or chemical weapons conventions, or executing cyberattacks that result in severe financial losses or equivalent harm.

Deception

No artificial intelligence system can consistently cause its designers or Regulators misunderstand their possibility or ability to cross any of the aforementioned red lines.

2. Route

It is possible to ensure that these red lines are not crossed, but it requires our joint efforts: both to establish and To improve governance mechanisms, we must also develop more security technologies.

Governance

We need comprehensive governance mechanisms to ensure that the systems developed or deployed Do not violate red lines. We should immediately implement national-level registration requirements for AI models and training practices that exceed certain computational or capability thresholds. Registration should ensure governments have visibility into the most advanced AI within their borders and have the means to curb the distribution and operation of dangerous models.

National regulators should help develop and adopt globally aligned requirements to avoid crossing these red lines. A model's access to the global market should depend on whether domestic regulations meet international standards based on international audits and effectively prevent the development and deployment of systems that violate red lines.

We should take steps to prevent the proliferation of the most dangerous technologies while ensuring that the value of artificial intelligence technology is widely harvested. To this end, we should establish multilateral institutions and agreements to safely and inclusively govern the development of artificial general intelligence (AGI), and establish enforcement mechanisms to ensure that red lines are not crossed and common interests are widely shared.

Measurement and Evaluation

Before there is a substantial risk of these red lines being crossed, we should develop comprehensive methods and technologies to make these red lines concrete and preventive work operable. To ensure that detection of red lines can keep up with rapidly advancing AI, we should develop human-supervised red team testing and automated model evaluation.

Developers have the responsibility to prove through rigorous evaluation, mathematical proof, or quantitative assurance that the artificial intelligence system that meets the safety design does not cross the red line.

Technical Cooperation

The international academic community must work together to deal with advanced artificial intelligence technical and social challenges posed by the system. We encourage the establishment of stronger global technology networks, accelerate R&D and cooperation in the field of AI security through visiting scholar programs and organizing in-depth AI security conferences and workshops. Supporting the growth of this field will require more funding: we call on AI developers and government funders to devote at least one-third of their AI R&D budgets to security.

3. Summary

Avoiding the catastrophic global consequences of artificial intelligence requires us to take decisive action. A combination of collaborative technical research and prudent international regulatory mechanisms can mitigate most of the risks posed by AI and realize many of its potential values. We must continue to uphold and strengthen international academic and government cooperation on security.

##

The above is the detailed content of Hinton, Bengio and others joined forces with Chinese experts to reach an AI security consensus: AI systems should not violate red lines. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1664
14
PHP Tutorial
1266
29
C# Tutorial
1239
24
How to understand DMA operations in C? How to understand DMA operations in C? Apr 28, 2025 pm 10:09 PM

DMA in C refers to DirectMemoryAccess, a direct memory access technology, allowing hardware devices to directly transmit data to memory without CPU intervention. 1) DMA operation is highly dependent on hardware devices and drivers, and the implementation method varies from system to system. 2) Direct access to memory may bring security risks, and the correctness and security of the code must be ensured. 3) DMA can improve performance, but improper use may lead to degradation of system performance. Through practice and learning, we can master the skills of using DMA and maximize its effectiveness in scenarios such as high-speed data transmission and real-time signal processing.

How to use the chrono library in C? How to use the chrono library in C? Apr 28, 2025 pm 10:18 PM

Using the chrono library in C can allow you to control time and time intervals more accurately. Let's explore the charm of this library. C's chrono library is part of the standard library, which provides a modern way to deal with time and time intervals. For programmers who have suffered from time.h and ctime, chrono is undoubtedly a boon. It not only improves the readability and maintainability of the code, but also provides higher accuracy and flexibility. Let's start with the basics. The chrono library mainly includes the following key components: std::chrono::system_clock: represents the system clock, used to obtain the current time. std::chron

How to handle high DPI display in C? How to handle high DPI display in C? Apr 28, 2025 pm 09:57 PM

Handling high DPI display in C can be achieved through the following steps: 1) Understand DPI and scaling, use the operating system API to obtain DPI information and adjust the graphics output; 2) Handle cross-platform compatibility, use cross-platform graphics libraries such as SDL or Qt; 3) Perform performance optimization, improve performance through cache, hardware acceleration, and dynamic adjustment of the details level; 4) Solve common problems, such as blurred text and interface elements are too small, and solve by correctly applying DPI scaling.

What is real-time operating system programming in C? What is real-time operating system programming in C? Apr 28, 2025 pm 10:15 PM

C performs well in real-time operating system (RTOS) programming, providing efficient execution efficiency and precise time management. 1) C Meet the needs of RTOS through direct operation of hardware resources and efficient memory management. 2) Using object-oriented features, C can design a flexible task scheduling system. 3) C supports efficient interrupt processing, but dynamic memory allocation and exception processing must be avoided to ensure real-time. 4) Template programming and inline functions help in performance optimization. 5) In practical applications, C can be used to implement an efficient logging system.

Quantitative Exchange Ranking 2025 Top 10 Recommendations for Digital Currency Quantitative Trading APPs Quantitative Exchange Ranking 2025 Top 10 Recommendations for Digital Currency Quantitative Trading APPs Apr 30, 2025 pm 07:24 PM

The built-in quantization tools on the exchange include: 1. Binance: Provides Binance Futures quantitative module, low handling fees, and supports AI-assisted transactions. 2. OKX (Ouyi): Supports multi-account management and intelligent order routing, and provides institutional-level risk control. The independent quantitative strategy platforms include: 3. 3Commas: drag-and-drop strategy generator, suitable for multi-platform hedging arbitrage. 4. Quadency: Professional-level algorithm strategy library, supporting customized risk thresholds. 5. Pionex: Built-in 16 preset strategy, low transaction fee. Vertical domain tools include: 6. Cryptohopper: cloud-based quantitative platform, supporting 150 technical indicators. 7. Bitsgap:

How to measure thread performance in C? How to measure thread performance in C? Apr 28, 2025 pm 10:21 PM

Measuring thread performance in C can use the timing tools, performance analysis tools, and custom timers in the standard library. 1. Use the library to measure execution time. 2. Use gprof for performance analysis. The steps include adding the -pg option during compilation, running the program to generate a gmon.out file, and generating a performance report. 3. Use Valgrind's Callgrind module to perform more detailed analysis. The steps include running the program to generate the callgrind.out file and viewing the results using kcachegrind. 4. Custom timers can flexibly measure the execution time of a specific code segment. These methods help to fully understand thread performance and optimize code.

How to use string streams in C? How to use string streams in C? Apr 28, 2025 pm 09:12 PM

The main steps and precautions for using string streams in C are as follows: 1. Create an output string stream and convert data, such as converting integers into strings. 2. Apply to serialization of complex data structures, such as converting vector into strings. 3. Pay attention to performance issues and avoid frequent use of string streams when processing large amounts of data. You can consider using the append method of std::string. 4. Pay attention to memory management and avoid frequent creation and destruction of string stream objects. You can reuse or use std::stringstream.

An efficient way to batch insert data in MySQL An efficient way to batch insert data in MySQL Apr 29, 2025 pm 04:18 PM

Efficient methods for batch inserting data in MySQL include: 1. Using INSERTINTO...VALUES syntax, 2. Using LOADDATAINFILE command, 3. Using transaction processing, 4. Adjust batch size, 5. Disable indexing, 6. Using INSERTIGNORE or INSERT...ONDUPLICATEKEYUPDATE, these methods can significantly improve database operation efficiency.

See all articles