Ben Goertzel’s research while affiliated with Caritas Hong Kong and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (310)


Fig. 1. The smokes test problem, in the format commonly used for MLN
Using Nonlinear Dynamical Attention Allocation to Focus Probabilistic Logical Inference Upon Relevant Information
  • Preprint
  • File available

September 2024

·

119 Reads

·

Misgana Bayetta

·

Ben Goertzel

·

[...]

·

In a previous article, the authors described a series of experiments combining probabilisitic logical inference with an artificial economics based attention allocation system. In those experiments, the authors compared their results with those from two standard examples chosen from the Markov Logic Networks literature. The examples were insufficient to determine the full usefulness of the integrated system, as the information provided in the examples was precisely the information required for inference. Due to limitations of the test suite, any attention allocation system would be unable to provide additional direction. In this current followup article, the authors describe a new series of experiments and tests intended to demonstrate the effective utilization of attention allocation for inference control. The authors conclude by demonstrating the success, on the first of these experiments, of the cog-nitive synergy provided via an integration of attention control and prob-abilisitic inference mechanisms.

Download

Fig. 1.
Fig. 2.
Measuring Sophia Robot's Cognitive Dynamics

August 2024

·

20 Reads

We conducted a series of experiments within the ECAN system governing the attentional cognitive dynamics for Hanson Robotics Sophia robot. We logged short-term importance values (STI) within Sophia's "Economic Attention Network" attentional system and then empirically derived Tononi Phi values from the resulting STI time series. We compared the Phi value time-series with Sophia's current cognitive actions to determine the degree of connectedness in the system, which has been hypothesized to be a neural correlate of consciousness (NCC.)



GenAI Model Security

April 2024

·

6 Reads

·

4 Citations

Safeguarding GenAI models against threats and aligning them with security requirements is imperative yet challenging. This chapter provides an overview of the security landscape for generative models. It begins by elucidating common vulnerabilities and attack vectors, including adversarial attacks, model inversion, backdoors, data extraction, and algorithmic bias. The practical implications of these threats are discussed, spanning domains like finance, healthcare, and content creation. The narrative then shifts to exploring mitigation strategies and innovative security paradigms. Differential privacy, blockchain-based provenance, quantum-resistant algorithms, and human-guided reinforcement learning are analyzed as potential techniques to harden generative models. Broader ethical concerns surrounding transparency, accountability, deepfakes, and model interpretability are also addressed. The chapter aims to establish a conceptual foundation encompassing both the technical and ethical dimensions of security for generative AI. It highlights open challenges and lays the groundwork for developing robust, trustworthy, and human-centric solutions. The multifaceted perspective spanning vulnerabilities, implications, and solutions is intended to further discourse on securing society’s growing reliance on generative models. Frontier model security is discussed using Anthropic proposed approach.


ChatGPT and Web3 Applications

December 2023

·

36 Reads

This chapter discusses the synergistic intersection of ChatGPT and Web3 applications, exploring the transformative potential and challenges within this emerging digital landscape. We first introduce Web3 and decentralized networks, detailing ChatGPT’s pivotal role in these applications. The chapter further illustrates how ChatGPT can invigorate decentralized applications (dApps), decentralized finance (DeFi) platforms, and digital asset management. We explore how the Web3 ecosystem can be leveraged to revolutionize AI data governance, model validation, and the democratization of computational power in ChatGPT applications. We also examine the role of tokenization and ChatGPT in incentivizing user engagement, governing applications, and devising novel monetization strategies. As we anticipate future technological advancements, the chapter underscores the importance of interdisciplinary collaboration and robust integration strategies for navigating the evolving AI and decentralized technology landscape. This analysis aids businesses in harnessing next-gen AI technology in a decentralized ecosystem.


Tokens in the Rejuve.AI tokenomics system
Leveraging Algorithmic and Human Networks to Cure Human Aging: Holistic Understanding of Longevity via Generative Cooperative Networks, Hybrid Bayesian/Neural/Logical AI and Tokenomics-Mediated Crowdsourcing

July 2023

·

127 Reads

Aging is best understood as a gradual, sometimes punctuated, change in the dynamical regime of a self-organizing network composed of heterogeneous complex processes interacting via complex nonlinear spatiotemporal interactions. Key easily observable aspects such as the “hallmarks of aging” represent specific manifestations of underlying holistic network dynamics. Different aspects of this self-organizing network are apt to be best understood by reference to different datasets and by means of different analytical approaches. However, it seems likely that to create therapies substantially increasing maximum human lifespan in a reliable way, ultimately a holistic understanding of the dynamics of aging across the organism will be required. This leads naturally to a network-based approach to data-analytics and hypothesis-formation and -evaluation, in which holistic models of aging in the organism are automatically assembled from multiple datasets and models addressing various aspects. One key issue in realizing a network-based approach to aging is the process of mathematically combining multiple models; toward this end we propose an assemblage of techniques beginning with a relatively simple quadratic programming based approach, and culminating in a “computational social science” approach in which multiple models collectively form a social network of models. Within that network, symbols and cultures, reflecting complex holistic patterns in the underlying data, may emerge. Another key issue is how to incentivize an appropriately diverse and capable community of individuals or organizations to contribute data and models to the holistic “Generative Cooperative Network” of models. We propose a tokenomics approach, in which a variety of cryptographic token types are used to incentivize contribution to the GCN. These issues comprise much of the inspiration for the Rejuve.AI project, which is building general mechanisms for GCN and tokenomic incentivization. Rejuve.AI is also creating a set of relatively simple aging-related models to seed the GCN, including: A hand-crafted Bayes Net model assessing aspects of an individual’s path to healthy longevity, via using the logic of the hallmarks of aging to interpret data from questionnaire answers and biosignals (as gathered from users of the Rejuve.AI longevity app). A model of longevity-related pathways and networks identified by pattern mining in the BioAtomspace, an integrated genomic and medical knowledge base created within the OpenCog Atomspace knowledge-metagraph framework. A model indicating genes, pathways and networks involved in the longevity of the Methuselah flies, long-lived Drosophila Melanogaster created via experimental evolution over multiple decades. Automated integration of insights from these diverse models, based on diverse datasets, will enable prototyping of the overall GCN framework and will serve as a seed for broader growth of the GCN based on contributions from the research and Rejuve.AI app user communities. Growth of our holistic network will enable the formation of a dynamic, multiresolutional mechanistic simulation of the human body that will shed new light on the causes of aging and its treatment.KeywordsHybrid artificial intelligenceComplex adaptive systemsMultiresolutional simulationBayesian networksSystems biologyAgingLongevityCrowdsourcingCoevolutionBlockchain



Bridging AGI Theory and Practice with Galois Connections

May 2023

·

30 Reads

Lecture Notes in Computer Science

Multiple cognitive algorithms posited to play a key role in AGI (forward and backward chaining inference, clustering and concept formation, evolutionary and reinforcement learning, probabilistic programming, etc.) are given a common formulation as recursive discrete decision processes involving optimizing functions defined over metagraphs, in which the key decisions involve sampling from probability distributions over metagraphs and enacting sets of combinatory operations on selected sub-metagraphs. This forms a bridge between abstract conceptions of general intelligence founded on notions of algorithmic information and complex systems theory, and the practical design of multi-paradigm AGI systems.


A Meta-Probabilistic-Programming Language for Bisimulation of Probabilistic and Non-Well-Founded Type Systems

January 2023

·

20 Reads

Lecture Notes in Computer Science

We introduce a formal meta-language for probabilistic programming, capable of expressing both programs and the type systems in which they are embedded. We are motivated here by the desire to allow an AGI to learn not only relevant knowledge (programs/proofs), but also appropriate ways of reasoning (logics/type systems). We draw on the frameworks of cubical type theory and dependent typed metagraphs to formalize our approach. In doing so, we show that specific constructions within the meta-language can be related via bisimulation (implying path equivalence) to the type systems they correspond. This allows our approach to provide a convenient means of deriving synthetic denotational semantics for various type systems. Particularly, we derive bisimulations for pure type systems (PTS), and probabilistic dependent type systems (PDTS). We discuss further the relationship of PTS to non-well-founded set theory, and demonstrate the feasibility of our approach with an implementation of a bisimulation proof in a Guarded Cubical Type Theory type checker.


Figure 1. Types of consensus in distributed systems such as Proofof-Work, Proof-of-Stake and Proof-of-Reputation.
A Liquid Democracy System for Human-Computer Societies

October 2022

·

42 Reads

Problem of reliable democratic governance is critical for survival of any community, and it will be critical for communities powered with Artificial Intelligence (AI) systems upon developments of the latter. Apparently, it will be getting more and more critical because of increasing speeds and scales of electronic communications and decreasing latencies in system responses. In order to address this need, we present design and implementation of a reputation system supporting "liquid democracy" principle. The system is based on "weighted liquid rank" algorithm employing different sorts of explicit and implicit ratings being exchanged by members of the society as well as implicit assessments of of the members based on measures of their activity in the society. The system is evaluated against live social network data with help of simulation modelling for an online marketplace case.


Citations (41)


... It outlines current and potential trends and issues that define the future of smart network security, such as technological innovation, threats and opportunities, revisions in the laws and rules, and social factors. It suggests possible research directions and themes that may include the advancement of AI-based security solutions, the application of Blockchain technology for increasing data reliability and trust, analysis of new techniques in threat identification based on machine learning and behavioral analytics, and examine the nature of users and user-related security concerns in smart networks [24]. As posing perspectives and directions for future research, this section has the purpose of provoking and orienting scholars, practitioners, and policymakers to investigate new frontiers, to found out new challenges, and to enhance the state of the art in smart network security. ...

Reference:

Smart Network Forensics with Generative Adversarial Networks Leveraging Blockchain for Anomaly Detection and Immutable Audit Trails
GenAI Model Security
  • Citing Chapter
  • April 2024

... Contrastingly, Goertzel (2015) scrutinizes Bostrom and Yudkowsky's concepts of AI risk, finds them logical, but argues that they confuse something being possible with something being likely and therefore overstate the dangers. Hadshar (2023) reviews the evidence for risk of power-seeking AI, finding that there are no actual examples of it so far and so we should be less confident that this is an ER, but still be concerned. ...

Superintelligence: Fears, Promises and Potentials: Reflections on Bostrom’s Superintelligence, Yudkowsky’s From AI to Zombies, and Weaver and Veitas’s “Open-Ended Intelligence”

Journal of Ethics and Emerging Technologies

... Similarly, Doya & Taniguchi (2019) and Livingstone & Risse (2019) explain that formulas in ML, and DL are gradually providing robots with a framework for cognitive and tactile learning like elementary forms of human learning. However, Goertzel (2016) and Ortiz (2016) argue that AGI systems must have a synthetic body with sensory capabilities to learn kinaesthetically and communicate naturally like humans. ...

Infusing Advanced AGIs with Human-Like Value Systems: Two Theses

Journal of Ethics and Emerging Technologies

... DeFi has shown its potential to expand the use of blockchain from simple value transfer to complex financial services [21]. Popular DeFi protocols now enable a variety of decentralized services, including lending and borrowing [22], portfolio management [23], [24], asset exchanges [25], and derivatives [26], all without the need for trusted parties. ...

Architecture of Automated Crypto-Finance Agent
  • Citing Conference Paper
  • December 2021

... For this reason, above all, the detection of interesting paths in cross-domain Knowledge Graphs (KG) has to be considered a task of absolute importance in the domain of Computational Creativity, particularly in Automatic Story Generation (ASG). The almost ubiquitous definition of "interestingness" in current literature equates to that of "relevance", thus relating to probabilistic measures or other heuristics intended to capture co-occurrence and similarity between two or more concepts [11]. Conversely, this contribution intends to address the problem of detecting interesting paths 3 in a Knowledge Graph tailored for narrative purposes (such as, for instance, Event KGs [12,3]). ...

Surprisingness - A Novel Objective Interestingness Measure in Hypergraph Pattern Mining from Knowledge Graphs for Common Sense Learning
  • Citing Conference Paper
  • December 2021

... Semantic, or word sense, disambiguation-a solution to the grammatical ambiguity problem-determines which "sense" or definition of a word is activated by that word's use in a particular context; for instance, the word "saw," when used in the sentence "The child saw a dog," will have a different sense-and thus different Link Grammar rules-than when used in the sentence "The carpenter is holding a saw." Current unsupervised semantic disambiguation methods, such as Goertzel et al.'s algorithm capable of inferring word senses and parts of speech from vectors built using a neural language model as a sentence probability oracle, include dictionarybased algorithms that utilize knowledge encoded in lexical resources to learn the senses of words [19]. Implementing one such method will be part of our future work. ...

Guiding Symbolic Natural Language Grammar Induction via Transformer-Based Sequence Probabilities
  • Citing Chapter
  • July 2020

Lecture Notes in Computer Science

... In recent years, the actual issues of AI development have been widely discussed at high-level conferences like Artificial General Intelligence (Goertzel et al, 2019), Robophilosophy (Coeckelbergh et al, 2018) and some others. Notably, the issues raised by Turing 70 years ago provoked some discussions at an important conference "Beyond Turing" (Marcus et al, 2015). ...

Artificial General Intelligence 13th International Conference, AGI 2020, St. Petersburg, Russia, September 16 – 19, 2020, Proceedings: 13th International Conference, AGI 2020, St. Petersburg, Russia, September 16 – 19, 2020, Proceedings
  • Citing Book
  • January 2020

Lecture Notes in Computer Science

... Assuming algorithmic Markovicity depending on observed constraints, on the part of a process constructing an observed entity, is basically equivalent to assuming independence between constructive processes that are not specifically known to be dependent, because there are more ways for the processes to be independent than there are ways for them to be dependent in any particular way (and by assumption one doesn't have knowledge about any particular dependency between the processes). I have argued in [Goe19b] that MaxCal can similarly be extended to a "maximum algorithmic caliber principle" that characterizes the possible worlds most likely to accord with a given set of observations -one should assume the world has evolved with the maximum algorithmic caliber consistent with observations (basically, the most computationally dense way consistent with observations). Basically, this just means that in hypothesizing the processes underlying some temporal observations, you should assume independence between subprocesses that are not specifically known to be dependent, because there are more ways for the processes to be independent than there are ways for them to be dependent in any particular way. ...

Maximal Algorithmic Caliber and Algorithmic Causal Network Inference: General Principles of Real-World General Intelligenceƒ
  • Citing Conference Paper
  • December 2019

... This paper describes an attempt to leverage the OpenCog framework [15] for controlling agents in uncertain environments. It can be seen as a reboot of previous attempts [5,10,12] relying on new or improved components such as a hypergraph pattern miner [7] and a version of Probabilistic Logic Netorks (PLN) [9] both implemented on top of OpenCog's Unified Rule Engine equipped with an inference control mechanism; a temporal and procedural extension of PLN [8]; a simplified version of OpenPsi [5] leaving aside built-in urges and modulators from MicroPsi [3] and using an action selection policy based on Thompson Sampling [17]. ...

An Inferential Approach to Mining Surprising Patterns in Hypergraphs

Lecture Notes in Computer Science

... At the same time it opens the way for end-toend unsupervised language learning from unannotated and unsegmented corpora as it has been suggested by Vepstas and Goertzel [15] and further developed by Glushchenko et. al. [16]. ...

Programmatic Link Grammar Induction for Unsupervised Language Learning
  • Citing Chapter
  • July 2019

Lecture Notes in Computer Science