Artwork

Content provided by BlueDot Impact. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by BlueDot Impact or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Eliciting Latent Knowledge

1:00:27
 
Share
 

Manage episode 424087966 series 3498845
Content provided by BlueDot Impact. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by BlueDot Impact or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this post, we’ll present ARC’s approach to an open problem we think is central to aligning powerful machine learning (ML) systems:

Suppose we train a model to predict what the future will look like according to cameras and other sensors. We then use planning algorithms to find a sequence of actions that lead to predicted futures that look good to us.

But some action sequences could tamper with the cameras so they show happy humans regardless of what’s really happening. More generally, some futures look great on camera but are actually catastrophically bad.

In these cases, the prediction model “knows” facts (like “the camera was tampered with”) that are not visible on camera but would change our evaluation of the predicted future if we learned them. How can we train this model to report its latent knowledge of off-screen events?

We’ll call this problem eliciting latent knowledge (ELK). In this report we’ll focus on detecting sensor tampering as a motivating example, but we believe ELK is central to many aspects of alignment.

Source:

https://docs.google.com/document/d/1WwsnJQstPq91_Yh-Ch2XRL8H_EpsnjrC1dwZXR37PC8/edit#

Narrated for AI Safety Fundamentals by Perrin Walker of TYPE III AUDIO.

---

A podcast by BlueDot Impact.
Learn more on the AI Safety Fundamentals website.

  continue reading

Chapters

1. Toy scenario: the SmartVault (00:04:12)

2. How the SmartVault AI works: model-based RL (00:05:43)

3. How it could go wrong: observations leave out key information (00:07:40)

4. How we might address this problem by asking questions (00:10:38)

5. Baseline: what you’d try first and how it could fail (00:12:43)

6. Training strategy: generalize from easy questions to hard questions (00:14:07)

7. Counterexample: why this training strategy won’t always work (00:15:48)

8. Test case: prediction is done by inference on a Bayes net (00:16:41)

9. How the prediction model works (00:17:22)

10. How the humans answer questions (00:19:52)

11. Isn’t this oversimplified and unrealistic? (00:20:44)

12. Intended behavior: translate to the human’s Bayes net (00:23:17)

13. Bad behavior: do inference in the human Bayes net (00:25:57)

14. Would this strategy learn the human simulator or the direct translator? (00:27:38)

15. Research methodology (00:28:55)

16. Why focus on the worst case? (00:30:34)

17. What counts as a counterexample for ELK? (00:32:08)

18. Informal steps (00:34:37)

19. Can we construct a dataset that separates “correct” from “looks correct to a human”? (00:35:44)

20. Strategy: have a human operate the SmartVault and ask them what happened (00:37:42)

21. How this defeats the previous counterexample (00:38:29)

22. New counterexample: better inference in the human Bayes net (00:40:59)

23. Strategy: have AI help humans improve our understanding (00:43:06)

24. How this defeats the previous counterexample (00:46:33)

25. New counterexample: gradient descent is more efficient than science (00:47:05)

26. Strategy: have humans adopt the optimal Bayes net (00:49:20)

27. How this defeats the previous counterexample (00:50:57)

28. New counterexample: ontology mismatch (00:51:23)

29. So are we just stuck now? (00:52:19)

30. Ontology identification (00:54:47)

31. Examples of ontology mismatches (00:55:31)

32. Relationship between ontology identification and ELK (00:57:55)

80 episodes

Artwork
iconShare
 
Manage episode 424087966 series 3498845
Content provided by BlueDot Impact. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by BlueDot Impact or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this post, we’ll present ARC’s approach to an open problem we think is central to aligning powerful machine learning (ML) systems:

Suppose we train a model to predict what the future will look like according to cameras and other sensors. We then use planning algorithms to find a sequence of actions that lead to predicted futures that look good to us.

But some action sequences could tamper with the cameras so they show happy humans regardless of what’s really happening. More generally, some futures look great on camera but are actually catastrophically bad.

In these cases, the prediction model “knows” facts (like “the camera was tampered with”) that are not visible on camera but would change our evaluation of the predicted future if we learned them. How can we train this model to report its latent knowledge of off-screen events?

We’ll call this problem eliciting latent knowledge (ELK). In this report we’ll focus on detecting sensor tampering as a motivating example, but we believe ELK is central to many aspects of alignment.

Source:

https://docs.google.com/document/d/1WwsnJQstPq91_Yh-Ch2XRL8H_EpsnjrC1dwZXR37PC8/edit#

Narrated for AI Safety Fundamentals by Perrin Walker of TYPE III AUDIO.

---

A podcast by BlueDot Impact.
Learn more on the AI Safety Fundamentals website.

  continue reading

Chapters

1. Toy scenario: the SmartVault (00:04:12)

2. How the SmartVault AI works: model-based RL (00:05:43)

3. How it could go wrong: observations leave out key information (00:07:40)

4. How we might address this problem by asking questions (00:10:38)

5. Baseline: what you’d try first and how it could fail (00:12:43)

6. Training strategy: generalize from easy questions to hard questions (00:14:07)

7. Counterexample: why this training strategy won’t always work (00:15:48)

8. Test case: prediction is done by inference on a Bayes net (00:16:41)

9. How the prediction model works (00:17:22)

10. How the humans answer questions (00:19:52)

11. Isn’t this oversimplified and unrealistic? (00:20:44)

12. Intended behavior: translate to the human’s Bayes net (00:23:17)

13. Bad behavior: do inference in the human Bayes net (00:25:57)

14. Would this strategy learn the human simulator or the direct translator? (00:27:38)

15. Research methodology (00:28:55)

16. Why focus on the worst case? (00:30:34)

17. What counts as a counterexample for ELK? (00:32:08)

18. Informal steps (00:34:37)

19. Can we construct a dataset that separates “correct” from “looks correct to a human”? (00:35:44)

20. Strategy: have a human operate the SmartVault and ask them what happened (00:37:42)

21. How this defeats the previous counterexample (00:38:29)

22. New counterexample: better inference in the human Bayes net (00:40:59)

23. Strategy: have AI help humans improve our understanding (00:43:06)

24. How this defeats the previous counterexample (00:46:33)

25. New counterexample: gradient descent is more efficient than science (00:47:05)

26. Strategy: have humans adopt the optimal Bayes net (00:49:20)

27. How this defeats the previous counterexample (00:50:57)

28. New counterexample: ontology mismatch (00:51:23)

29. So are we just stuck now? (00:52:19)

30. Ontology identification (00:54:47)

31. Examples of ontology mismatches (00:55:31)

32. Relationship between ontology identification and ELK (00:57:55)

80 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide