Publications

CSET produces evidence-driven analysis in a variety of forms, from informative graphics and translations to expert testimony and published reports. Our key areas of inquiry are the foundations of artificial intelligence — such as talent, data and computational power — as well as how AI can be used in cybersecurity and other national security settings. We also do research on the policy tools that can be used to shape AI’s development and use, and on biotechnology.

Report

CSET’s 2024 Annual Report

Center for Security and Emerging Technology
| March 2025

In 2024, CSET continued to deliver impactful, data-driven analysis at the intersection of emerging technology and security policy. Explore our annual report to discover key research highlights, expert testimony, and new analytical tools — all aimed at shaping informed, strategic decisions around AI and emerging tech.

Filter publications
Data Brief

Counting AI Research

Daniel Chou
| July 2022

Tracking the output of a country’s researchers can inform assessments of its innovativeness or assist in evaluating the impact of certain funding initiatives. However, measuring research output is not as straightforward as it may seem. Using a detailed analysis that includes Chinese-language research publications, this data brief reveals that China's lead in artificial intelligence research output is greater than many English-language sources suggest.

Reports

China’s Advanced AI Research

William Hannas, Huey-Meei Chang, Daniel Chou, and Brian Fleeger
| July 2022

China is following a national strategy to lead the world in artificial intelligence by 2030, including by pursuing “general AI” that can act autonomously in novel circumstances. Open-source research identifies 30 Chinese institutions engaged in one or more of this project‘s aspects, including machine learning, brain-inspired AI, and brain-computer interfaces. This report previews a CSET pilot program that will track China’s progress and provide timely alerts.

Reports

Silicon Twist

Ryan Fedasiuk, Karson Elmgren, and Ellen Lu
| June 2022

The Chinese military’s progress in artificial intelligence largely depends on continued access to high-end semiconductors. By analyzing thousands of purchasing records, this policy brief offers a detailed look at how China’s military comes to access these devices. The authors find that most computer chips ordered by Chinese military units are designed by American companies, and outline steps that the U.S. government could take to curtail their access.

Adversarial patches are images designed to fool otherwise well-performing neural network-based computer vision models. Although these attacks were initially conceived of and studied digitally, in that the raw pixel values of the image were perturbed, recent work has demonstrated that these attacks can successfully transfer to the physical world. This can be accomplished by printing out the patch and adding it into scenes of newly captured images or video footage.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Homeland Security Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation at a hearing on "Securing the Future: Harnessing the Potential of Emerging Technologies While Mitigating Security Risks." Lohn discussed the application of AI systems in cybersecurity and AI’s vulnerabilities.

Data Brief

China’s State Key Laboratory System

Emily S. Weinstein, Channing Lee, Ryan Fedasiuk, and Anna Puglisi
| June 2022

China’s State Key Laboratory system drives innovation in science and technology. These labs conduct cutting-edge basic and applied research, attract and train domestic and foreign talent, and conduct academic exchanges with foreign counterparts. This report assesses trends in the research priorities, management structures, and talent recruitment efforts of nearly five hundred Chinese State Key Labs. The accompanying data visualization maps their geographical locations and host institutions.

CSET Senior Fellow Andrew Lohn testified before the House of Representatives Science, Space and Technology Subcommittee on Investigations and Oversight and Subcommittee on Research and Technology at a hearing on "Securing the Digital Commons: Open-Source Software Cybersecurity." Lohn discussed how the United States can maximize sharing within the artificial intelligence community while reducing risks to the AI supply chain.

CSET Senior Fellow Andrew Lohn testified before the U.S. Senate Armed Services Subcommittee on Cybersecurity hearing on artificial intelligence applications to operations in cyberspace. Lohn discussed AI's capabilities and vulnerabilities in cyber defenses and offenses.

Reports

Securing AI

Andrew Lohn and Wyatt Hoffman
| March 2022

Like traditional software, vulnerabilities in machine learning software can lead to sabotage or information leakages. Also like traditional software, sharing information about vulnerabilities helps defenders protect their systems and helps attackers exploit them. This brief examines some of the key differences between vulnerabilities in traditional and machine learning systems and how those differences can affect the vulnerability disclosure and remediation processes.

Data Brief

A Competitive Era for China’s Universities

Ryan Fedasiuk, Alan Omar Loera Martinez, and Anna Puglisi
| March 2022

This brief illuminates the scale of Chinese government funding for higher education, science, and technology by exploring budget and expense reports for key government organizations and 34 of China’s most elite “Double First Class” universities. Chinese political leaders view elite universities as key components of the country’s military modernization, economic growth, and soft power; a situation that presents security risks for international partners.