link1s.site

Stanford AI project team apologizes for plagiarizing Chinese model

An artificial intelligence (AI) team at Stanford University apologized for plagiarizing a large language model (LLM) from a Chinese AI company, which became a trending topic on the Chinese social media platforms, where it sparked concern among netizens on Tuesday.

We apologize to the authors of MiniCPM [the AI model developed by a Chinese company] for any inconvenience that we caused for not doing the full diligence to verify and peer review the novelty of this work, the multimodal AI model Llama3-V's developers wrote in a post on social platform X.

The apology came after the team from Stanford University announced Llama3-V on May 29, claiming it had comparable performance to GPT4-V and other models with the capability to train for less than $500.

According to media reports, the announcement published by one of the team members quickly received more than 300,000 views.

However, some netizens from X found and listed evidence of how the Llama3-V project code was reformatted and similar to MiniCPM-Llama3-V 2.5, an LLM developed by a Chinese technology company, ModelBest, and Tsinghua University.

Two team members, Aksh Garg and Siddharth Sharma, reposted a netizen's query and apologized on Monday, while claiming that their role was to promote the model on Medium and X (formerly Twitter), and that they had been unable to contact the member who wrote the code for the project.

They looked at recent papers to validate the novelty of the work but had not been informed of or were aware of any of the work by Open Lab for Big Model Base, which was founded by the Natural Language Processing Lab at Tsinghua University and ModelBest, according to their responses. They noted that they have taken all references to Llama3-V down in respect to the original work.

In response, Liu Zhiyuan, chief scientist at ModelBest, spoke out on the Chinese social media platform Zhihu, saying that the Llama3-V team failed to comply with open-source protocols for respecting and honoring the achievements of previous researchers, thus seriously undermining the cornerstone of open-source sharing.

According to a screenshot leaked online, Li Dahai, CEO of ModelBest, also made a post on his WeChat moment, saying that the two models were verified to have highly similarity in terms of providing answers and even the same errors, and that some relevant data had not yet been released to the public.

He said the team hopes that their work will receive more attention and recognition, but not in this way. He also called for an open, cooperative and trusting community environment.

Director of the Stanford Artificial Intelligence Laboratory Christopher Manning also responded to Garg's explanation on Sunday, commenting "How not to own your mistakes!" on X.

As the incident became a trending topic on Sina Weibo, Chinese netizens commented that academic research should be factual, but the incident also proves that the technology development in China is progressing.

Global Times

Insurers fret over militant attacks, AI hacks at Paris Olympics
LONDON, July 5 (Reuters) - Insurers are nervous that militant attacks or AI-generated fake images could derail the Paris Olympics, risking event cancellations and millions of dollars in claims. Insurers faced losses after the 2020 Tokyo Olympics were postponed for a year due to the COVID-19 pandemic. Since then, wars in Ukraine and Gaza and a spate of elections this year, including in France, have driven up fears of politically-motivated violence at high-profile global events. The Olympics take place in Paris from July 26-Aug 11 and the Paralympics from Aug 28-Sept 8. German insurer Allianz (ALVG.DE), opens new tab is insurance partner for the Games. Other insurers, such as the Lloyd's of London (SOLYD.UL) market, are also providing cover. "We are all aware of the geopolitical situation the world is in," said Eike Buergel, head of Allianz's Olympic and Paralympic programme. "We are convinced that the IOC (International Olympic Committee), Paris 2024 and the national organising committees, together with the French authorities, are taking the right measures when it comes to challenges on the ground."
OpenAI's internal AI details stolen in 2023 breach, NYT reports
July 4 (Reuters) - A hacker gained access to the internal messaging systems at OpenAI last year and stole details about the design of the company's artificial intelligence technologies, the New York Times reported, opens new tab on Thursday. The hacker lifted details from discussions in an online forum where employees talked about OpenAI's latest technologies, the report said, citing two people familiar with the incident. However, they did not get into the systems where OpenAI, the firm behind chatbot sensation ChatGPT, houses and builds its AI, the report added. OpenAI executives informed both employees at an all-hands meeting in April last year and the company's board about the breach, according to the report, but executives decided not to share the news publicly as no information about customers or partners had been stolen. OpenAI executives did not consider the incident a national security threat, believing the hacker was a private individual with no known ties to a foreign government, the report said. The San Francisco-based company did not inform the federal law enforcement agencies about the breach, it added. OpenAI in May said it had disrupted five covert influence operations that sought to use its AI models for "deceptive activity" across the internet, the latest to stir safety concerns about the potential misuse of the technology. The Biden administration was poised to open up a new front in its effort to safeguard the U.S. AI technology from China and Russia with preliminary plans to place guardrails around the most advanced AI Models including ChatGPT, Reuters earlier reported, citing sources.
Google extends Linux kernel support to 4 years
According to AndroidAuthority, the Linux kernel used by Android devices is mostly derived from Google's Android Universal Kernel (ACK) branch, which is created from the Android mainline kernel branch when new LTS versions are released upstream. For example, when kernel version 6.6 is announced as the latest LTS release, an ACK branch for Android15-6.6 appears shortly after, with the "android15" in the name referring to the Android version of the kernel (in this case, Android 15). Google maintains its own set of LTS kernel branches for three main reasons. First, Google can integrate upstream features that have not yet been released into the ACK branch by backporting or picking, so as to meet the specific needs of Android. Second, Google can include some features that are being developed upstream in the ACK branch ahead of time, making it available for Android devices as early as possible. Finally, Google can add some vendor or original equipment manufacturer (OEM) features for other Android partners to use. Once created, Google continues to update the ACK branch to include not only bug fixes for Android specific code, but also to integrate the LTS merge content of the upstream kernel branch. For example, the Linux kernel vulnerability disclosed in the July 2024 Android security bulletin will be fixed through these updates. However, it is not easy to distinguish a bug fix from other bug fixes, as a patch that fixes a bug may also accidentally plug a security vulnerability that the submitter did not know about or chose not to disclose. Google does its best to recognize this, but it inevitably misses the mark, resulting in bug fixes for the upstream Linux kernel being released months before Android devices. As a result, Google has been urging Android vendors to regularly update the LTS kernel to avoid being caught off guard by unexpectedly disclosed security vulnerabilities. Clearly, the LTS version of the Linux kernel is critical to the security of Android devices, helping Google and vendors deal with known and unknown security vulnerabilities. The longer the support period, the more timely security updates Google and vendors can provide to devices.
Israeli strike kills 16 at Gaza school, military says it targeted gunmen
CAIRO/GAZA, July 6 (Reuters) - At least 16 people were killed in an Israeli strike on a school sheltering displaced Palestinian families in central Gaza on Saturday, the Palestinian health ministry said, in an attack Israel said had targeted militants. The health ministry said the attack on the school in Al-Nuseirat killed at least 16 people and wounded more than 50. The Israeli military said it took precautions to minimize risk to civilians before it targeted the gunmen who were using the area as a hideout to plan and carry out attacks against soldiers. Hamas denied its fighters were there. At the scene, Ayman al-Atouneh said he saw children among the dead. "We came here running to see the targeted area, we saw bodies of children, in pieces, this is a playground, there was a trampoline here, there were swing-sets, and vendors," he said. Mahmoud Basal, spokesman of the Gaza Civil Emergency Service, said in a statement that the number of dead could rise because many of the wounded were in critical condition. The attack meant no place in the enclave was safe for families who leave their houses to seek shelters, he said. Al-Nuseirat, one of Gaza Strip's eight historic refugee camps, was the site of stepped-up Israeli bombardment on Saturday. An air strike earlier on a house in the camp killed at least 10 people and wounded many others, according to medics. In its daily update of people killed in the nearly nine-month-old war, the Gaza health ministry said Israeli military strikes across the enclave killed at least 29 Palestinians in the past 24 hours and wounded 100 others.
SpaceX astronaut returns with an incredible change in his body
A provocative new study reveals the complex effects of the space environment on human health, providing insight into potential damage to blood, cell structure and the immune system. The study focused on SpaceX's Inspiration4 mission, which successfully sent two men and two women into space in 2021 to orbit the Earth for three days and shed some light on the effects of space travel on the human body. The research data, derived directly from the Inspiration4 mission, shows that even a brief trip to space can significantly damage the human immune system, trigger an inflammatory response, and profoundly affect cell structure. In particular, space travel triggered unprecedented changes in cytokines that play a key role in immune response and muscle regulation but are not usually directly associated with inflammation. In particular, the study found a significant increase in muscle factors, which are physiological responses specific to skeletal muscle cells in microgravity, rather than a simple immune response. Although non-muscular tissues did not show changes in proteins associated with inflammation, specific leg muscles such as soleus and tibialis anterior muscles showed significant signs of metabolic activity, especially increased interleukin in the latter, further enhancing the activation of immune cells.