Keywords:-
Article Content:-
Abstract
Artificial intelligence (AI) has become a major strategic issue, giving rise to a First Technological World War where major powers compete for computational and algorithmic supremacy. This competition is based on the mastery of advanced hardware infrastructures (GPUs, TPUs, ASICs) and increasingly powerful learning models, notably Transformers and LLMs . However, this rise in power is accompanied by new threats in cybersecurity , where AI is both an offensive weapon and a defensive shield. From adversarial attacks to autonomous malware, vulnerabilities in AI systems are becoming prime targets, forcing cybersecurity players to develop adversarial training and automatic threat detection techniques .
In the face of these advances, AI regulation is becoming a crucial challenge. Europe is imposing strict rules with the AI Act , while the United States favors a sector-specific approach and China is centralizing control of AI. However, the absence of a harmonized international framework could lead to technological fragmentation, accentuating the AI race between geopolitical blocs. In this First World War of AI, dominance will not only be determined by the performance of algorithms, but also by the ability of nations to balance innovation, security, and governance to shape the digital future.
References:-
References
Works and monographs
Benedict, C., & Agrawal, A. (2021). Machine Learning Systems: Designs, Concepts, and Applications for Engineers and Data Scientists. CRC Press .
Goodfellow , I., Bengio , Y., & Courville , A. (2016). Deep Learning. MIT Press .
Hennessy, J.L., & Patterson, D.A. (2019). Computer Architecture: A Quantitative Approach. Morgan Kaufmann.
Russell, S. (2021). Human Compatible: Artificial Intelligence and the Problem of Control. Penguin Random House.
Saxe, J., & Sanders, K. (2017). Malware Data Science: Attack Detection and Attribution. No Starch Press .
Scientific articles and communications
Anderson, H.S., Woodbridge, J., & Filar , B. (2018). DeepDGA : Adversarially -tuned domain generation and detection. Proceedings of the 25th Network and Distributed System Security Symposium (NDSS).
Bender, E.M., Gebru , T., McMillan-Major, A., & Shmitchell , S. (2021). On the dangers of stochastic parrots: Can language models be too big? Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency, 610–623.
Brown, T., Mann, B., Ryder, N., Subbiah , M., Kaplan, J., Dhariwal , P. , ... & Amodei , D. (2020). Language models are few-shot learners. Advances in Neural Information Processing Systems, 33, 1877-1901.
Carlini , N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks. 2017 IEEE Symposium on Security and Privacy (SP), 39-57.
Doshi -Velez, F., & Kim, B. (2017). Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608.
Dosovitskiy , A., Beyer, L., Kolesnikov , A., Weissenborn , D., Zhai , X., Unterthiner , T. , ... & Houlsby , N. (2021). An image is worth 16x16 words: Transformers for image recognition at scale. arXiv preprint arXiv:2010.11929.
Goodfellow , I., Shlens , J., & Szegedy , C. (2014). Explaining and harnessing adversarial examples. arXiv preprint arXiv:1412.6572.
Han, S., Pool, J., Tran, J., & Dally, W. (2015). Learning both weights and connections for efficient neural networks. Advances in Neural Information Processing Systems , 28.
Hinton, G., Vinyals , O., & Dean, J. (2015). Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531.
Hodo, E., Bellekens , X., Hamilton, A., Dubouilh , PL, Iorkyase , E., Tachtatzis , C., & Atkinson, R. (2017). Threat analysis of IoT networks using artificial neural network intrusion detection system. 2017 International Symposium on Networks, Computers and Communications (ISNCC), 1-6.
Huang, L., Joseph, A.D., Nelson, B., Rubinstein, B.I.P., & Tygar , J.D. (2011). Adversarial machine learning. Proceedings of the 4th ACM Workshop on Artificial Intelligence and Security, 39-50.
Jacob, B., Kligys , S., Chen, B., Zhu, M., Tang, M., Howard, A. , ... & Adam, H. (2018). Quantization and training of neural networks for efficient integer-arithmetic-only inference. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2704-2713.
Kingma , D.P., & Ba, J. (2014). Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980.
Konečný , J., McMahan, HB, Yu, FX, Richtárik , P., Suresh, AT, & Bacon, D. (2016). Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492.
Kurakin , A., Goodfellow , I., & Bengio , S. (2017). Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533.
LeCun , Y., Bengio , Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444. https://doi.org/10.1038/nature14539
Li, H., Ota, K., & Dong, M. (2018). Learning IoT security mechanisms via a federated approach: A decentralized and collaborative strategy. IEEE Communications Magazine, 56(10), 48-54.
Liu, Z., Lin, Y., Cao, Y., Hu, H., Wei, Y., Zhang, Z. , ... & Guo , B. (2021). Swin transformer: Hierarchical vision transformer using shifted windows. Proceedings of the IEEE/CVF International Conference on Computer Vision, 10012-10022.
Madry , A., Makelov , A., Schmidt, L., Tsipras, D., & Vladu , A. (2018). Towards deep learning models resistant to adversarial attacks. arXiv preprint arXiv:1706.06083.
Silver, D., Schrittwieser , J., Simonyan , K., Antonoglou , I., Huang, A., Guez , A. , ... & Hassabis, D. (2017). Mastering the game of Go without human knowledge. Nature, 550(7676), 354-359. https://doi.org/10.1038/nature24270
Vaswani , A., Shazeer , N., Parmar , N., Uszkoreit , J., Jones, L., Gomez, AN, ... & Polosukhin , I. (2017). Attention is all you need. Advances in Neural Information Processing Systems, 30.
Institutional documents and official reports
European Commission. (2023). Artificial Intelligence Act: Proposal for a regulation laying down harmonized rules on artificial intelligence.
National AI Initiative Act . (2021). US National Artificial Intelligence Initiative Act of 2020.
UNODA. (2023). Lethal Autonomous Weapon Systems and International Law. United Nations Office for Disarmament Affairs .
Xinhua. (2022). China's AI Development Strategy and Regulations. Xinhua News Agency.
Electronic sources
NVIDIA Corporation. (2023). NVIDIA A100 Tensor Core GPU: Unleashing AI and HPC. Retrieved from https://www.nvidia.com/en-us/data-center/a100/
TSMC. (2023). TSMC Technology Roadmap: The Future of Semiconductor Manufacturing. Retrieved from https://www.tsmc.com/english/home