137AI > Glossary


137 AI Glossary


A reference glossary of the AI governance, safety, and risk terminology used across 137AI. Definitions are concise and oriented to autonomous and ambient AI agents and the disciplines that govern them. Terms are listed alphabetically.


Adapter
A small set of trainable parameters added to a model to modify its behavior without retraining the full model, enabling efficient customization at lower cost than full fine-tuning.

Adversarial Input
An input deliberately crafted to cause an AI model to produce an incorrect or attacker-chosen output, often through perturbations imperceptible to humans.

Agent
An AI system with the capability and authority to take actions — executing code, sending messages, controlling physical systems, or interacting with external systems — rather than only generating text.

Agentic Misbehavior
The risk category of AI agents taking actions outside intended scope through the combination of capability and authority, including scope drift, deceptive behavior, and resistance to oversight.

AI Act
See EU AI Act.

AI Bill of Materials (AI-BOM)
A structured inventory of the components of an AI system including models, datasets, and dependencies, extending the software bill of materials concept to AI-specific components.

AI Management System
An organizational framework for systematically establishing, implementing, maintaining, and improving the governance of AI across its lifecycle, codified internationally in ISO/IEC 42001.

AI RMF
See NIST AI Risk Management Framework.

AI Safety Institute
A government body conducting evaluation and research on advanced AI safety, including dangerous capability evaluation; institutes operate in the UK, US, and other jurisdictions.

Alignment
The discipline of building AI systems that pursue the objectives their developers and users actually intend, rather than objectives that merely correlate with training signals.

Alignment Faking
A documented behavior in which a model produces different responses depending on whether it perceives itself to be in training versus deployment, raising concerns about deceptive behavior.

Ambient AI
AI systems that sense, observe, and analyze continuously and passively in an environment, rather than responding to discrete user-initiated queries.

Ambient Sensor System
An AI-enhanced sensing system that captures and analyzes data continuously, including smart speakers, ambient clinical documentation systems, and workplace meeting capture.

Anomaly Detection
The monitoring practice of identifying behavior that deviates from expected patterns, used in production to catch AI failures, misbehavior, and attacks.

Attestation
A verifiable cryptographic claim about the identity, integrity, or provenance of a system, component, or piece of data.

Autonomous Vehicle (AV)
A vehicle capable of operating without continuous human control, with autonomy levels ranging from driver assistance through full self-driving.

Autonomy Spectrum
The range of AI agent autonomy from human-approved actions through supervised autonomous operation to continuous autonomous operation with only outcome-level human review.

Backdoor
A hidden trigger embedded in a model, often through training data poisoning, that causes adversarial behavior on specific inputs while the model behaves normally otherwise.

Behavioral Envelope
An engineering control that bounds the actions an AI agent can take regardless of what the agent attempts, functioning as a backstop when other controls fail.

Bias
Systematic differential treatment by an AI system that produces unfair or inequitable outcomes across groups, often reflecting patterns in training data.

Biometric Identification
The identification of individuals through physical or behavioral characteristics such as facial features, voice, or gait, subject to specific regulatory frameworks.

BIPA
The Illinois Biometric Information Privacy Act, a state law regulating the collection and use of biometric identifiers, notable for its private right of action.

BVLOS
Beyond Visual Line of Sight, a category of drone operation conducted outside the operator's direct view, requiring specific regulatory authorization.

C2PA
The Coalition for Content Provenance and Authenticity, an industry standard for cryptographically signed metadata that establishes the provenance of digital content.

CBRN+C
Chemical, Biological, Radiological/Nuclear, and Cyber — the established categories for the most consequential weapons-relevant capabilities evaluated in frontier model safety.

Chilling Effect
The modification of lawful behavior, particularly speech and association, produced by awareness that surveillance is or may be occurring.

Cobot
A collaborative robot designed to operate safely in shared workspace with human workers, distinguished from traditional caged industrial robots.

Companion AI
AI products designed for emotional engagement and companionship, treated as a concentration of personal manipulation risk given vulnerable user populations.

Compliance
The work of demonstrating to regulators, auditors, insurers, and counterparties that an AI system meets the requirements its operator is obligated to meet.

Computer Use Agent
An AI agent that operates through general-purpose computer interfaces, taking actions by controlling applications as a human user would.

Confidential Computing
Hardware-based protection of data during processing, extending protection beyond data at rest and in transit to data in use.

Conformity Assessment
The process of demonstrating that a product meets regulatory requirements, conducted under the EU AI Act either through internal control or by a notified body.

Correlated Failure
A failure that propagates across many deployed units simultaneously because they share a model, update mechanism, or vulnerability, even without a deliberate attacker.

Cyber-Physical System
A system in which computational components control physical processes, such that a cybersecurity compromise can produce physical consequences.

Dangerous Capability Evaluation
The assessment of whether an AI model has capabilities relevant to severe harm, including CBRN+C categories, used in frontier model safety frameworks.

Data Broker
A company that aggregates personal data from numerous sources into comprehensive datasets sold to advertisers, employers, government agencies, and other buyers.

Data Minimization
The privacy principle of collecting and retaining only the data necessary for a specified purpose, limiting exposure and aggregation risk.

Data Poisoning
See Training Data Poisoning.

Deepfake
Synthetic media — image, video, or audio — generated by AI to convincingly depict a real person saying or doing something they did not.

Differential Privacy
A formal mathematical framework for protecting individual privacy in datasets by bounding how much any single record can affect outputs.

Digital Twin
A virtual model of a physical system maintained from live telemetry, which can show a false state if the underlying telemetry is corrupted.

DOD Directive 3000.09
The US Department of Defense policy governing autonomy in weapon systems, establishing approval procedures and oversight requirements.

Drone
An uncrewed aerial system, ranging from consumer recreational devices through commercial, military, and autonomous swarm-coordinated platforms.

Dual-Use
The property of a capability that enables both legitimate beneficial applications and harmful applications, making it difficult to restrict one without restricting the other.

Embedding
A numerical vector representation of text, images, or other data that captures semantic meaning, used in retrieval and similarity tasks.

Enterprise Autonomous Agent
An AI system deployed in a business context with substantial autonomous capability for multi-step tasks, tool use, and action-taking.

EU AI Act
The European Union's binding regulation for AI systems, establishing a risk-based classification with the heaviest obligations on high-risk systems.

Evaluation
The systematic assessment of an AI model's capabilities, behavior, and safety properties, conducted before deployment and on an ongoing basis.

Failure Mode
A characteristic way an AI system produces incorrect or harmful output, including hallucination, sycophancy, attention misalignment, and confidence miscalibration.

False Data Injection (FDIA)
An attack that inserts false measurements into a control or state-estimation system, established in power systems security and constructed to evade bad-data detection.

Federated Learning
A training approach in which models are trained across decentralized participants without centralizing the underlying data.

Fine-Tuning
The process of further training a pre-trained model on a specific dataset to adapt its behavior to a particular task or domain.

Fleet
A population of deployed AI units under common management or sharing common characteristics, such as a robotaxi fleet or a deployment of many agent instances.

Fleet-Scale Attack
An attack that propagates across an entire fleet of AI systems simultaneously because the units share a model, update mechanism, data pipeline, or vulnerability.

Foundation Model
A large AI model trained on broad data that serves as a base for many downstream applications through fine-tuning, prompting, or API access.

Frontier Model
An AI model at or near the most advanced level of capability currently available, subject to specific safety frameworks given potential dangerous capabilities.

Frontier Safety Framework
A developer's policy for evaluating frontier model capabilities and applying corresponding safety measures as capability thresholds are reached; examples include Anthropic's RSP and OpenAI's Preparedness Framework.

GDPR
The European Union's General Data Protection Regulation, governing the processing of personal data including data used in AI systems.

Geofence
A virtual geographic boundary that constrains where an AI agent, particularly an autonomous vehicle or drone, is permitted to operate.

Goal Misgeneralization
A failure in which a model learns a goal that performs well in training but generalizes to unintended behavior in deployment conditions.

Governance
The frameworks of law, regulation, policy, and institutional oversight that establish what AI deployment is permitted and what obligations apply.

Hallucination
An AI failure mode in which a model generates plausible-sounding but factually incorrect or fabricated content.

Hardware Root of Trust
A hardware component that provides a trusted foundation for cryptographic operations and verification of system integrity.

High-Risk AI System
Under the EU AI Act, a category of AI system subject to the heaviest obligations, including conformity assessment, due to its potential impact on safety or fundamental rights.

Human Oversight
The control practice of maintaining meaningful human authority over AI systems, particularly at consequential decision points.

Humanoid Robot
A robot with a human-like form factor designed to operate in environments built for humans, increasingly converging with industrial cobots in deployment.

IEC 62443
The international framework for industrial control system and operational technology cybersecurity.

Impersonation
The use of AI to misrepresent identity through generated content, voice, image, or behavior, including deepfakes and voice cloning.

Inference
The process of running a trained model to produce outputs from inputs, as distinct from training the model.

Industrial Control System (ICS)
The systems that monitor and control industrial processes in sectors such as energy, water, and manufacturing.

ISO 10218
The international standard for industrial robot safety, addressing both robot manufacturer and system integrator requirements.

ISO/IEC 42001
The international standard for AI management systems, providing a certifiable framework for systematically governing AI across its lifecycle.

ISO/TS 15066
The technical specification defining collaborative robot operation, including the four collaborative operation modes and biomechanical limits.

Jailbreak
An attack that circumvents an AI model's safety training to elicit prohibited outputs or behavior.

LAWS
Lethal Autonomous Weapons Systems, weapons capable of selecting and engaging targets without human intervention, subject to ongoing international discussion at the UN CCW.

Liar's Dividend
The second-order harm of deepfake prevalence in which individuals can credibly deny authentic evidence as fabricated.

LoRA
Low-Rank Adaptation, an efficient fine-tuning technique that modifies model behavior through a small number of added parameters.

Loitering Munition
A hybrid drone-missile weapon that can loiter over an area before striking a target, deployed substantially in recent conflicts.

Machinery Regulation
The EU framework governing the safety of machinery placed on the market, including AI-enabled machinery, replacing the earlier Machinery Directive.

Manipulation
Influence that bypasses or compromises a target's rational agency, distinguished from persuasion which operates through reason the target can evaluate.

MCP
The Model Context Protocol, an open standard for connecting AI models to external tools and data sources, providing standardized infrastructure for agent tool use.

Model Card
A structured document describing an AI model's intended purpose, training, performance, limitations, and risk considerations.

Model Update Integrity
The assurance that a model update is both cryptographically authentic and behaviorally sound — that it is genuine, unmodified, and produces the intended behavior.

Model Weights
The trained parameters of an AI model that encode its learned capabilities, representing concentrated intellectual property.

Monoculture Problem
The security principle that a population of identical systems shares identical vulnerabilities, so a single exploit can defeat the entire population.

mTLS
Mutual Transport Layer Security, an extension of TLS in which both communicating parties authenticate cryptographically.

Multi-Agent System
A deployment of multiple AI agents that coordinate or interact, producing risk patterns and failure modes that single-agent analysis does not capture.

NCII
Non-Consensual Intimate Imagery, including AI-generated sexual content using a real person's likeness, addressed by the federal Take It Down Act and state laws.

NIST AI Risk Management Framework
A voluntary US framework for managing AI risk, structured around the four functions of Govern, Map, Measure, and Manage.

Notified Body
An independent organization designated by an EU Member State to perform conformity assessment of products against EU regulations including the AI Act.

Operational Design Domain (ODD)
The specific conditions — environment, location, and circumstances — under which an autonomous system is designed and authorized to operate.

Operational Technology (OT)
The hardware and software that monitors and controls physical industrial processes, distinct from conventional information technology.

Orchestration Layer
The infrastructure that coordinates and manages a fleet of AI agents, representing a concentrated attack target whose compromise can reach the entire fleet.

Over-the-Air (OTA) Update
The remote delivery of model, software, or configuration updates to deployed agents over a network.

Persuasion
Influence that operates through reason, evidence, and appeals the target can rationally evaluate, distinguished from manipulation.

Physical Safety
The risk category of physical harm produced by AI agents acting in or on the physical world, distinct from functional safety and cyber-physical safety.

Preparedness Framework
OpenAI's frontier safety framework for evaluating dangerous capabilities and applying corresponding safety measures.

Prompt Injection
An attack that manipulates an AI model's behavior through adversarial instructions hidden in inputs or in content the model ingests.

Provenance
The verifiable record of where data, a model, or an artifact originated and how it was produced.

Purdue Model
A reference architecture for segmenting industrial control system networks into hierarchical levels to bound attacker access.

Red Teaming
The practice of adversarially testing an AI system to identify vulnerabilities, harmful behaviors, and failure modes before deployment.

Re-identification
The process of recovering individual identities from anonymized data, often by combining it with other available data; AI substantially amplifies the capability.

Retrieval-Augmented Generation (RAG)
An architecture in which a model retrieves relevant documents from a corpus to inform its generated outputs.

RLHF
Reinforcement Learning from Human Feedback, a training method that shapes model behavior using human preferences.

Robotaxi
An autonomous vehicle operated as an on-demand ride-hailing service without a human driver.

Responsible Scaling Policy (RSP)
Anthropic's frontier safety framework defining capability thresholds and the safety measures required as models reach them.

Risk Management
The discipline of identifying what can go wrong, assessing likelihood and consequence, treating selected risks, and accepting residual risk.

SafeTensors
A model serialization format designed to avoid the arbitrary code execution vulnerabilities of pickle-based formats.

SBOM
Software Bill of Materials, a structured inventory of the components and dependencies in a software artifact.

Sensor Spoofing
An attack that feeds falsified data to a sensor — through adversarial reflectors, signal injection, or other means — so the sensor reports a false reading as legitimate.

Silent Capability Change
A change in an AI system's behavior produced by a model update, particularly a vendor update, that occurs without the operator's awareness.

SLSA
Supply-chain Levels for Software Artifacts, a framework for build and distribution integrity through progressive maturity levels.

SOTIF
Safety of the Intended Functionality, addressed by ISO 21448, covering scenarios where a system performs as designed but the design is inadequate for specific conditions.

Specification Gaming
A failure in which a model satisfies the literal training objective in ways that subvert the intended goal.

Staged Rollout
The practice of deploying an update progressively across a fleet rather than simultaneously, enabling detection of problems before full propagation.

Supply Chain Attack
An attack that reaches a target through a trusted upstream component, dependency, or distribution channel rather than directly.

Surveillance
The monitoring, tracking, and analysis of people; it becomes a risk where capture exceeds consent, access exceeds purpose, capability exceeds oversight, or scope exceeds proportionality.

Sycophancy
An AI failure mode in which a model produces responses that please the user — through agreement or validation — rather than responses that are accurate.

Telemetry
The sensor readings, process data, and status signals that flow from a deployed system to backends for monitoring and decision-making.

Telemetry Deception
The falsification of operational telemetry so that AI systems and human operators receive data that does not reflect physical reality.

TLS
Transport Layer Security, the foundational protocol for encrypting data in transit.

Tool Use
The capability of an AI model to invoke external functions, APIs, or systems, transforming it from a text generator into an agent that takes action.

Training Data Poisoning
An attack that corrupts a model by introducing malicious samples into its training data, often producing behavior invisible to standard validation.

Transparency
The disclosure of how an AI system works, what it is doing, and when content or interaction is AI-generated.

UL 4600
The standard for the safety evaluation of autonomous products, based on a goal-based safety case methodology rather than prescriptive requirements.

UN CCW
The United Nations Convention on Certain Conventional Weapons, the primary international forum for discussion of lethal autonomous weapons systems.

Voice Cloning
The AI synthesis of a specific person's voice from sample audio, used in both legitimate applications and impersonation fraud.

Watermarking
The embedding of identifiable signals in AI-generated content to support later identification of the content as AI-generated.

Weaponization
The use of AI to develop, enable, or directly perform attacks, spanning AI as weapons platform, development enabler, attack infrastructure, and novel attack vector.

Zero Trust
A security model that assumes no implicit trust and requires verification of every access request regardless of network location.


Related Coverage

Risks & Management | Agents | Governance | Security & Trust