{"title":"论人工智能对认知安全的挑战","authors":"Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue","doi":"10.1051/sands/2023012","DOIUrl":null,"url":null,"abstract":"Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"9 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On Challenges of AI to Cognitive Security and Safety\",\"authors\":\"Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue\",\"doi\":\"10.1051/sands/2023012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.\",\"PeriodicalId\":79641,\"journal\":{\"name\":\"Hospital security and safety management\",\"volume\":\"9 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Hospital security and safety management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1051/sands/2023012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Hospital security and safety management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1051/sands/2023012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Challenges of AI to Cognitive Security and Safety
Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.