Artificial Intelligence Is Too Narrow

Artificial Intelligence has made significant strides, but it still has a major constraint: narrowness.

The inherent limitation of AI today is its specificity. You can get a narrow AI application to take orders at the McDonald's drive-thru or beat the world's best chess and Go players. You can build AI software that drives cars with fewer accidents than humans.

You can also use AI for quality control in product assembly, diagnosing cancer or prequalifying mortgage applicants. However, the moment you change up the task even slightly, the AI tool is at a loss as to how to respond.

To understand the specificity issue of AI, it is key to look at the underlying core principle of how AI works today. The issue is rooted in the conceptual approach of approximating human decision-making by combining sets of algorithms into a model that is then rewarded for good responses to environmental stimuli and punished for bad ones.

The narrow AI of today is based on sophisticated algorithms and incredible amounts of brute force compute power. We define AI as an accumulation of better and better algorithms relying on better and better hardware to calculate their way out of narrowly defined challenges.

For example, when looking for a tumor on a CT image, an AI application sees combinations of individual pictures that have no meaning by themselves. However, different combinations of pixels in an image can be correlated with different probabilities of cancer being present.

This is a fundamentally different approach from how a human doctor looks for cancer. Instead of using abstract processing power, the doctor leverages her experience, skill and intuition to look for indications of cancer where they are most likely to occur. Ultimately, this can lead her to identify a few corner cases of cancer and, hopefully, save some lives by doing so.

On the other hand, the AI application is relentless in examining all of the available data, potentially yielding more thorough results than a human doctor. But the same AI program that can identify the rarest corner cases of lung cancer will not be able to diagnose bone cancer or even a broken leg because its set of training images were strictly focused on lung cancer.

Expert Go players are able to use sophisticated strategies and diversions when playing the board game, but they can't think through every obscure set of moves that is likely to lead to a game-winning trap much later down the road. An AI program can.

In its 2016 match against human champion Lee Sedol, Google subsidiary DeepMind Technologies Ltd.'s AlphaGo algorithm deployed a long-range game plan that didn't produce any immediate measurable gains on the board. However, DeepMind managed to incentivize the algorithm to explore unconventional strategies that increased the probability of it gaining significant advantages later in the game.

Of course, once AlphaGo used this spark of curiosity to abstractly calculate large sets of permutations that would play out over many turns, it knew how to win games by exploiting the limitations of the human brain. It is exactly this combination of the ability to tap into a full repository of what has worked in past games, explore strategies that are a bit out there, and then mercilessly implement the ones best suited to the situation on the board that makes AI algorithms unbeatable in most games.

First, the AI software takes a series of different guesses and observes the predictive accuracy of each guess as the model training begins. It then combines successful configurations from different models into one winning set of hyper-parameters that can be expected to yield the best result for the specific human-defined task.

This type of algorithmic curiosity is similar to our oncologist knowing where to start looking when evaluating a CT image for cancer. However, the auto-tuning of hyper-parameters or AlphaGo's auto-detection of human weaknesses still can't shake the brute force, iterative character of AI.

The AlphaGo developers made the correct assumption based on evolution theory that some degree of variation is needed to come up with spectacular wins. However, these guesses are initially random, without the human intuition -- or bias -- accumulated through experience and training.

The cheaper that compute power becomes, the more this variation can be introduced without too much cost impact, which could push AI past its lack of intuition. But can all of this lead to general artificial intelligence?

Conceptually, if we assume unlimited compute power and humans preparing a sufficiently large training set of text and multimedia data, a narrow AI application could jump from playing chess to playing Go, and from there to taking orders at your local burger joint. However, the dependent variable is still missing for a lot of potential AI use cases. And, in many cases, it has to be provided manually by humans as part of the training process.

It doesn't even end there. How does a human train a self-driving car on whether it's OK to run over an animal in a certain situation, or if it's better to apply the emergency brake when doing so could mean getting rear-ended by an 18-wheeler? The racist Chatbot that Microsoft inadvertently deployed in 2016 is only one of many examples where humans can provide a problematic frame of reference for an AI tool.

These questions that extend beyond the purely technical aspects of AI will continue to challenge the technology as it looks to extend beyond current applications that are narrow in scope.

SearchEnterpriseAI

You Might Also Read: 

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent:

Combating The Threat Of Malicious AI:

 

« Killer Robots Are A Revolution in Warfare
Six Benefits From Artificial Intelligence & Machine Learning »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

InterVision

InterVision

InterVision is a leading Strategic Services Provider, assisting businesses in driving value and gaining a competitive edge by helping IT Leaders solve the most crucial challenges they face.

ReconaSense

ReconaSense

ReconaSense helps protect people, assets, buildings and cities with its next-gen access control and converged physical security intelligence platform.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Cyrex

Cyrex

Cyrex is a Web3 security and development company. Our mastery over decentralized applications, smart contracts and blockchain will keep you secure across Web3.