“…Other related technologies such as ML, NNs, DL, EI, and big data-driven algorithms are following suit. These technologies have numerous widely beneficial applications (Arbib, 2002;Baldi, 2021;Ball et al, 2017;Bengio, 2009;Bierly et al, 2000;Cybenko, 1989;Deng et al, 2013;Dignum, 2019;Frey et al, 1995;Fukushima, 1980;Groumpos, 2016;Hawkins, 2019;Heykin, 2009;Hochreiter & Schmidhuber, 1997;Hubel & Wiesel, 1959;Ivakhnenko, 1971;Levshun & Kotenko, 2023;Marcus, 2012;Marwala, 2015;McCulloch & Pitts, 1943;Mendez et al, 2022;Murphy, 2012;O'Reilly et al, 2021;Roberts et al, 2022;Russel & Norvig, 2020;Schmidhuber & Prelinger, 1993;Schmidhuber, 2015;Shrager & Johnson, 1995;Utgoff & Stracuzzi, 2002;Weng et al, 1992;Weng et al, 1997). Historically, less attention has been paid to the malicious uses of AI, which poses a challenge to the AI community.…”