Skip to main content

Showing 1–4 of 4 results for author: Reddie, A

.
  1. arXiv:2405.12167  [pdf, other

    cs.CY

    Open-Source Assessments of AI Capabilities: The Proliferation of AI Analysis Tools, Replicating Competitor Models, and the Zhousidun Dataset

    Authors: Ritwik Gupta, Leah Walker, Eli Glickman, Raine Koizumi, Sarthak Bhatnagar, Andrew W. Reddie

    Abstract: The integration of artificial intelligence (AI) into military capabilities has become a norm for major military power across the globe. Understanding how these AI models operate is essential for maintaining strategic advantages and ensuring security. This paper demonstrates an open-source methodology for analyzing military AI models through a detailed examination of the Zhousidun dataset, a Chines… ▽ More

    Submitted 24 May, 2024; v1 submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2308.00862  [pdf, ps, other

    cs.CY

    Confidence-Building Measures for Artificial Intelligence: Workshop Proceedings

    Authors: Sarah Shoker, Andrew Reddie, Sarah Barrington, Ruby Booth, Miles Brundage, Husanjot Chahal, Michael Depp, Bill Drexel, Ritwik Gupta, Marina Favaro, Jake Hecla, Alan Hickey, Margarita Konaev, Kirthi Kumar, Nathan Lambert, Andrew Lohn, Cullen O'Keefe, Nazneen Rajani, Michael Sellitto, Robert Trager, Leah Walker, Alexa Wehsener, Jessica Young

    Abstract: Foundation models could eventually introduce several pathways for undermining state security: accidents, inadvertent escalation, unintentional conflict, the proliferation of weapons, and the interference with human diplomacy are just a few on a long list. The Confidence-Building Measures for Artificial Intelligence workshop hosted by the Geopolitics Team at OpenAI and the Berkeley Risk and Securit… ▽ More

    Submitted 3 August, 2023; v1 submitted 1 August, 2023; originally announced August 2023.

  3. arXiv:2302.08065  [pdf

    econ.GN

    Wargames as Data: Addressing the Wargamer's Trilemma

    Authors: Andrew W. Reddie, Ruby E. Booth, Bethany L. Goldblum, Kiran Lakkaraju, Jason Reinhardt

    Abstract: Policymakers often want the very best data with which to make decisions--particularly when concerned with questions of national and international security. But what happens when this data is not available? In those instances, analysts have come to rely on synthetic data-generating processes--turning to modeling and simulation tools and survey experiments among other methods. In the cyber domain, w… ▽ More

    Submitted 15 February, 2023; originally announced February 2023.

    Comments: 3 figures

  4. arXiv:2212.02795  [pdf

    cs.CY

    Emerging Technology and Policy Co-Design Considerations for the Safe and Transparent Use of Small Unmanned Aerial Systems

    Authors: Ritwik Gupta, Alexander Bayen, Sarah Rohrschneider, Adrienne Fulk, Andrew Reddie, Sanjit A. Seshia, Shankar Sastry, Janet Napolitano

    Abstract: The rapid technological growth observed in the sUAS sector over the past decade has been unprecedented and has left gaps in policies and regulations to adequately provide for a safe and trusted environment in which to operate these devices. The Center for Security in Politics at UC Berkeley, via a two-day workshop, analyzed these gaps by addressing the entire sUAS vertical. From human factors to a… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.