Skip to main content

Showing 1–7 of 7 results for author: Cottier, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.21015  [pdf, other

    cs.CY

    The rising costs of training frontier AI models

    Authors: Ben Cottier, Robi Rahman, Loredana Fattorini, Nestor Maslej, Tamay Besiroglu, David Owen

    Abstract: The costs of training frontier AI models have grown dramatically in recent years, but there is limited public data on the magnitude and growth of these expenses. This paper develops a detailed cost model to address this gap, estimating training costs using three approaches that account for hardware, energy, cloud rental, and staff expenses. The analysis reveals that the amortized cost to train the… ▽ More

    Submitted 7 February, 2025; v1 submitted 31 May, 2024; originally announced May 2024.

  2. arXiv:2312.00043  [pdf, other

    cs.CY cs.AI

    Who is leading in AI? An analysis of industry AI research

    Authors: Ben Cottier, Tamay Besiroglu, David Owen

    Abstract: AI research is increasingly industry-driven, making it crucial to understand company contributions to this field. We compare leading AI companies by research publications, citations, size of training runs, and contributions to algorithmic innovations. Our analysis reveals the substantial role played by Google, OpenAI and Meta. We find that these three companies have been responsible for some of th… ▽ More

    Submitted 24 November, 2023; originally announced December 2023.

  3. arXiv:2209.04149  [pdf, ps, other

    cs.CR

    Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone

    Authors: Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval

    Abstract: Oblivious Transfer (OT) is a major primitive for secure multiparty computation. Indeed, combined with symmetric primitives along with garbled circuits, it allows any secure function evaluation between two parties. In this paper, we propose a new approach to build OT protocols. Interestingly, our new paradigm features a security analysis in the Universal Composability (UC) framework and may be inst… ▽ More

    Submitted 9 September, 2022; originally announced September 2022.

  4. arXiv:2209.03599  [pdf, ps, other

    cs.CR

    Security Analysis of the EDHOC protocol

    Authors: Baptiste Cottier, David Pointcheval

    Abstract: Ephemeral Diffie-Hellman Over COSE (EDHOC) aims at being a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. It is expected to provide mutual authentication, forward secrecy, and identity protection, with a 128-bit security level.A formal analysis has already been proposed at SECRYPT '21, on a former version, leading to some improvements, in the ongoing ev… ▽ More

    Submitted 9 September, 2022; v1 submitted 8 September, 2022; originally announced September 2022.

  5. arXiv:2206.09360  [pdf

    cs.AI

    Modeling Transformative AI Risks (MTAIR) Project -- Summary Report

    Authors: Sam Clarke, Ben Cottier, Aryeh Englander, Daniel Eth, David Manheim, Samuel Dylan Martin, Issa Rice

    Abstract: This report outlines work by the Modeling Transformative AI Risk (MTAIR) project, an attempt to map out the key hypotheses, uncertainties, and disagreements in debates about catastrophic risks from advanced AI, and the relationships between them. This builds on an earlier diagram by Ben Cottier and Rohin Shah which laid out some of the crucial disagreements ("cruxes") visually, with some explanati… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

    Comments: Chapters were written by authors independently. All authors are listed alphabetically

    MSC Class: 68-02 (Primary) 68T37 (Secondary)

  6. Secure Decision Forest Evaluation

    Authors: Slim Bettaieb, Loic Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval

    Abstract: Decision forests are classical models to efficiently make decision on complex inputs with multiple features. While the global structure of the trees or forests is public, sensitive information have to be protected during the evaluation of some client inputs with respect to some server model. Indeed, the comparison thresholds on the server side may have economical value while the client inputs migh… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

    Journal ref: ARES 2021 - 16th International Conference on Availability, Reliability and Security, Aug 2021, Vienna, Austria. pp.1-12

  7. arXiv:1901.06775  [pdf, other

    cs.RO cs.NE

    Comparing Direct and Indirect Representations for Environment-Specific Robot Component Design

    Authors: Jack Collins, Ben Cottier, David Howard

    Abstract: We compare two representations used to define the morphology of legs for a hexapod robot, which are subsequently 3D printed. A leg morphology occupies a set of voxels in a voxel grid. One method, a direct representation, uses a collection of Bezier splines. The second, an indirect method, utilises CPPN-NEAT. In our first experiment, we investigate two strategies to post-process the CPPN output and… ▽ More

    Submitted 20 January, 2019; originally announced January 2019.

    Comments: 8 pages submitted to the 2019 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (Under Review)