当前位置:网站首页>Zhou Hongyi: if the digital security ability is backward, it will also be beaten
Zhou Hongyi: if the digital security ability is backward, it will also be beaten
2022-07-27 15:04:00 【TechWeb】
【TechWeb】7 month 27 Daily news ,360 Zhou Hongyi, the founder of the group, sent a message on his official Weibo to thank 2022 Invited by the Organizing Committee of the new wise Conference , And write an article AI weapons 、 Artificial intelligence, security, etc. have expressed their views .


Zhou Hongyi said :
In those days, ASI · Moff is talking “ Three principles of robot ” When , There is an important principle , Robots can't hurt people . It looks like today. , This principle has been broken , In fact, all kinds of unmanned combat vehicles 、 Drones , It has been applied in the battlefield .
In the conflict between Russia and Ukraine this year , The Ukrainian army used the American spring knife UAV , This UAV has surveillance 、 Reconnaissance and strike function , stay AI blessings , A single soldier can master . Although the spring knife drone may still be remotely controlled , At the moment of the last blow, people may still give instructions . But give orders from people , To AI Automatic identification 、 Automatic judgment 、 Attack autonomously , I think it's a thin layer of window paper . Especially in AI Combined with weapons , All countries in the world are engaged in an arms race , This will also be the focus of the great powers' struggle in the future . therefore , hold AI The final decision on weapons is left to mankind , It's important to let people do the final control . I think the bottom line of artificial intelligence must be people .
In reality , Artificial intelligence security is in front of social ethics , It will also face risks and problems beyond the existing social laws and moral norms . for instance , Classic tram selection problem , And how we should determine the responsibility of driverless cars after accidents .
Self driving cars on the road , If it chooses to avoid pedestrians , You may hit an obstacle nearby , Causing casualties to the owner of the car ; If it doesn't yield , It will cause pedestrian casualties . In this case ,AI How should the program make a judgment . There is also a problem to consider , If there is an accident , Who should bear the responsibility ? Should be AI Of ? It's a car factory ? It's still the driver ? these AI Security challenges , At present, there is no clear answer .
function AI It needs calculation , Computing power requires infrastructure such as big data . But if the data center , Cloud services have been terminated , So all kinds of drones , Self driving tanks lose important brains . This scene was staged in the conflict between Russia and Ukraine .
Western countries have taken measures against Russia “ LiuDuan ”( Broken net 、 unable to pay 、 Service interruption 、 Break certificate 、 Disconnect the domain name 、 Break public opinion ), Including Microsoft 、IBM And Oracle, these companies stop to Russia SSL certificate , Stop domain name resolution , Stop the Internet interface , Interrupt the international transmission network , Stopped all kinds of software and services , Chip and hardware suppliers , For example, Intel cut off supply to Russia , Even Facebook 、 Twitter and others completely banned many accounts in Russia , Completely isolate Russia , Even trying to erase Russia completely in the digital world . Russia lacks the support of market-oriented digital industry , Calculate the force 、 The foundation of products and services is constrained , Completely in the situation of being beaten passively . This fully shows that backward digital security capabilities will also be beaten .
Artificial intelligence security is also an important challenge in its development , among AI The algorithm may be deceived 、 Being misled . Google once had a AI Algorithm , Identify black people as “ chimpanzee ”, Cause a lot of trouble . Now some AI vulnerability mining teams have also found : When people walk in the street , Facing the artificial intelligence cameras that can recognize faces all over the street , Just wear special stripes or special patterns T T-shirt , The camera will think you are not alone , I won't recognize your face , So that you can realize what science fiction mentions “ stealth ” effect .
360 It has always attached great importance to the safety of artificial intelligence , And build an artificial intelligence security capability system . among ,360 The world's largest security big data accumulated by itself AI analysis , To form the 360 Cloud safe brain prototype , Provide strong data and intelligence support for industries or enterprises , Effectively analyze network threats 、 Tracing to the source ; At the same time, actively undertake “ Safe brain national new generation artificial intelligence open innovation platform ” Construction ; In addition, it also led the research and development “ Artificial intelligence security evaluation and risk monitoring and early warning platform ” Selected by MIIT “ AI industry innovation task unveiling unit ” list . For all that , Facing many AI security problems , One enterprise alone cannot solve all threats , So it is important to pay attention to ecological cooperation . We are willing to open our own secure big data , Unite the forces of industry, University and research , To build AI Safe Ecology , Focus on promoting innovation in digital security .
边栏推荐
- LeetCode 81. 搜索旋转排序数组 II 二分/medium
- UnityUI方面处理(归纳与积累)
- [work] about technical architecture
- 【云享读书会第13期】多媒体处理工具 FFmpeg 工具集
- 数据仓库项目从来不是技术项目
- Toward fast, flexible, and robust low light image enhancement cvpr2022
- 关于印发《深圳市工业和信息化局绿色制造试点示范管理暂行办法》的通知
- CPU、GPU、NPU的区别
- LeetCode 190. 颠倒二进制位 位运算/easy
- Construction of knowledge map of financial securities and discovery of related stocks from the perspective of knowledge relevance
猜你喜欢

LeetCode 74. 搜索二维矩阵 二分/medium

The interviewer asked: how to judge whether an element is in the visible area?

于不确定中见“安全感” 沃尔沃2022年中问道

Construction of knowledge map of financial securities and discovery of related stocks from the perspective of knowledge relevance

JUC(JMM、Volatile)

DirectX 入门知识

FPGA timing constraint sharing 04_ Output delay constraint

股票买卖4

如果我们是那晚负责修复 B 站崩了的开发人员

什么是Tor?Tor浏览器更新有什么用?
随机推荐
对话框管理器第三章:创建控件
这年头谁还不会抓包,WireShark 抓包及常用协议分析送给你!
多表查询_子查询概述和多表查询_子查询情况1&情况2&情况3
国信证券手机开户安全吗 中山证券靠谱吗
腾讯二面:@Bean 与 @Component 用在同一个类上,会怎么样?
炒黄金开户平台有没有正规,安全的
DirectX 入门知识
@Detailed explanation of repository
LeetCode 781. 森林中的兔子 哈希表/数学问题 medium
Summary of basic knowledge of C language
Unityui aspect processing (induction and accumulation)
Stock trading 4
事务_基本演示和事务_默认自动提交&手动提交
LeetCode 341.扁平化嵌套列表迭代器 dfs,栈/ Medium
Dynamic programming - stock trading 5
移动端使用vantUI的list组件,多个tab项来回切换时,列表加载多次导致数据无法正常展示
Graphic SQL of giant image
同花顺开户在手机开户安全吗?
网络设备硬核技术内幕 路由器篇 16 DPDK及其前传(一)
LeetCode 456. 132模式 单调栈/medium