搜索关注在线英语听力室公众号:tingroom,领取免费英语资料大礼包。
(单词翻译)
A major meeting of computer hackers2 planned for this summer is to include an event that will test the limits of artificial intelligence (AI) tools.
The event, in August, will be held as part of the yearly DEF CON3 hacker1 meeting in Las Vegas, Nevada. In addition to hackers, the gathering4 draws computer security experts, students, federal government officials and others.
Organizers say this year's event is expected to include thousands of hackers. The meeting provides a chance for hackers to hear from leading industry officials about the latest developments in computer security. It also includes hacking5 competitions.
This year, several major AI developers will take part in DEF CON. Among them will be OpenAI, which launched its latest AI model, ChatGPT-4, in March. American software maker6 Microsoft has invested heavily in OpenAI. Google also released an AI system called Bard7 earlier this year.
The administration of President Joe Biden has said it will support the hacking event as part of efforts to study the latest AI tools. Administration officials said the government is aiming to ensure that the fast-developing systems will continue to improve without putting people's rights and safety at risk.
Recently released AI tools are built by feeding huge amounts of information into machine learning computer systems. The data trains the AI systems to develop complex skills and produce human-like results.
Experts have warned that such systems may bring major changes to many different jobs and industries. They also fear the tools, known as "chatbots," could greatly increase the amount of misinformation in the news media and on social media.
Organizers of the DEF CON event say some of the questions attendees will try to answer include: How can chatbots be changed by hackers to cause harm? Will they share private data meant to be secret with other users? And why do the systems get easily confused when processing information about gender8 and race?
"This is why we need thousands of people," Rumman Chowdhury told The Associated Press. She is an organizer of the hacking event and co-founder of AI accountability nonprofit Humane9 Intelligence.
Chowdhury added, "We need a lot of people with a wide range of lived experiences, subject matter expertise10 and backgrounds hacking at these models and trying to find problems that can then go be fixed11."
Chowdhury said results of the event can provide helpful information to companies looking at ways to safely use the fast-developing AI systems. She noted12 that the hackers' work will not end after the gathering. They will spend months afterward13 creating reports on their findings and identifying specific system vulnerabilities.
Alexandr Wang is the chief executive of AI developer Scale AI. He told the AP, "As these foundation models become more and more widespread, it's really critical that we do everything we can to ensure their safety."
Wang said he especially worries about chatbots giving out "unbelievably bad medical advice" or other misinformation that can cause serious harm.
Jack14 Clark is the co-founder of AI developer Anthropic. He said he hopes the DEF CON event will lead to deeper commitments from AI developers to measure and test the safety of their systems.
For this to happen, though, Clark said AI systems will need to be examined by third parties both before and after deployment15. "We need to get practice at figuring out how to do this. It hasn't really been done before," he said.
Words in This Story
hacker – n. someone who illegally, or for research purposes, gets into someone else's computer system
artificial intelligence – n. the development of computer systems that have the ability to perform work that normally requires human intelligence
confused – adj. unable to think clearly or understand something
vulnerable – adj. easy to hurt or attack physically16 or emotionally
foundation– n. the idea or principle something is based on
commitment – n. a firm decision to do something
figure out –v. (phrasal) to discover something by thinking
1 hacker | |
n.能盗用或偷改电脑中信息的人,电脑黑客 | |
参考例句: |
|
|
2 hackers | |
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客” | |
参考例句: |
|
|
3 con | |
n.反对的观点,反对者,反对票,肺病;vt.精读,学习,默记;adv.反对地,从反面;adj.欺诈的 | |
参考例句: |
|
|
4 gathering | |
n.集会,聚会,聚集 | |
参考例句: |
|
|
5 hacking | |
n.非法访问计算机系统和数据库的活动 | |
参考例句: |
|
|
6 maker | |
n.制造者,制造商 | |
参考例句: |
|
|
7 bard | |
n.吟游诗人 | |
参考例句: |
|
|
8 gender | |
n.(生理上的)性,(名词、代词等的)性 | |
参考例句: |
|
|
9 humane | |
adj.人道的,富有同情心的 | |
参考例句: |
|
|
10 expertise | |
n.专门知识(或技能等),专长 | |
参考例句: |
|
|
11 fixed | |
adj.固定的,不变的,准备好的;(计算机)固定的 | |
参考例句: |
|
|
12 noted | |
adj.著名的,知名的 | |
参考例句: |
|
|
13 afterward | |
adv.后来;以后 | |
参考例句: |
|
|
14 jack | |
n.插座,千斤顶,男人;v.抬起,提醒,扛举;n.(Jake)杰克 | |
参考例句: |
|
|
15 deployment | |
n. 部署,展开 | |
参考例句: |
|
|
16 physically | |
adj.物质上,体格上,身体上,按自然规律 | |
参考例句: |
|
|
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎 点击提交 分享给大家。