Utility function security in artificially intelligent agents
نویسندگان
چکیده
منابع مشابه
Utility function security in artificially intelligent agents
The notion of ‘wireheading’, or direct reward centre stimulation of the brain, is a wellknown concept in neuroscience. In this paper, we examine the corresponding issue of reward (utility) function integrity in artificially intelligent machines. We survey the relevant literature and propose a number of potential solutions to ensure the integrity of our artificial assistants. Overall, we conclud...
متن کاملAdaptive Artificially Intelligent Agents in Video Games: A Survey
In the world of electronic games, the implication of entertainment has gradually moved away from developing graphics and other frills. This is because game developers have seen the need for a solid base of artificial intelligence in their game’s agents. The developers have fallen into a pattern of only using static scripts for their agents. This causes the agents to become quite predictable and...
متن کاملIntelligent agents in support of internet security
Internet today is the main medium rapidly delivering information that we need. The information is delivered via a vast number of services that make our life become faster and more conscious. The question is at what price? The solutions devised by humans are prone to errors, which furthermore entail a new type of security challenge – cyber crime. With this paper we try to show that autonomous in...
متن کاملNetwork security management with intelligent agents
Multi-Agent Systems technology can be useful for efficiently designing and maintaining secure networks. Indeed, networks evolve at a rapid pace in terms of the number and type of components and user access queries as well as intrusion possibilities. Features such as autonomy, adaptability and flexibility of the “intelligent” agent paradigm allow managing network evolution in a controlled way. T...
متن کاملDistributed Network Security Management Using Intelligent Agents
The openness of business toward telecommunication network in general and Internet in particular is performed at the prize of high security risks. Every professional knows that the only way to secure completely a private network is to make it unreachable. However, even if this solution was undertaken for many years, nowadays it is not possible to close private network especially for business pur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Experimental & Theoretical Artificial Intelligence
سال: 2014
ISSN: 0952-813X,1362-3079
DOI: 10.1080/0952813x.2014.895114