Ai is vulnerable to attack. Can it ever be used safely?

feature-image

Play all audios:

Loading...

* Goodfellow, I. J., Shlens, J. & Szegedy, C. Preprint at arXiv https://doi.org/10.48550/arXiv.1412.6572 (2015). * Bubeck, S. _et al._ Preprint at arXiv


https://doi.org/10.48550/arXiv.2303.12712 (2023). * McCoy, T. _et al._ Preprint at arXiv https://doi.org/10.48550/arXiv.2309.13638 (2023). * Zou, A. _et al_. Preprint at arXiv


https://doi.org/10.48550/arXiv.2307.15043 (2023). * Wei, A., Haghtalab, N. & Steinhardt, J. Preprint at arXiv https://doi.org/10.48550/arXiv.2307.02483 (2023).