暂无分享,去创建一个
Hyrum S. Anderson | Joanna Bryson | Roman Yampolskiy | Bobby Filar | Peter Eckersley | Clare Lyle | Dario Amodei | Owain Evans | Miles Brundage | Sebastian Farquhar | Shahar Avin | Seán Ó hÉigeartaigh | Jacob Steinhardt | Allan Dafoe | Roman V. Yampolskiy | Rebecca Crootof | Paul Scharre | Michael Page | Jack Clark | Gregory C. Allen | Haydn Belfield | Helen Toner | Carrick Flynn | Ben Garfinkel | Simon Beard | Thomas Zeitzoff | Heather Roff | Dario Amodei | Clare Lyle | J. Steinhardt | Owain Evans | Jack Clark | Miles Brundage | A. Dafoe | H. Anderson | P. Eckersley | T. Zeitzoff | Sebastian Farquhar | Rebecca Crootof | Carrick Flynn | Ben Garfinkel | S. Beard | S. Avin | P. Scharre | Haydn Belfield | H. Toner | H. Roff | Bobby Filar | Gregory C. Allen | Michael Page | Joanna J. Bryson | Thomas Zeitzoff
[1] Erik Brynjolfsson,et al. The second machine age: work, progress, and prosperity in a time of brilliant technologies, 1st Edition , 2014 .
[2] Eric Horvitz,et al. Social media as a measurement tool of depression in populations , 2013, WebSci.
[3] Mykel J. Kochenderfer,et al. Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks , 2017, CAV.
[4] David L. Dill,et al. Developing Bug-Free Machine Learning Systems With Formal Mathematics , 2017, ICML.
[5] Dennis M. Murphy. The Net Delusion: The Dark Side of Internet Freedom , 2012 .
[6] Demis Hassabis,et al. Mastering the game of Go without human knowledge , 2017, Nature.
[7] Bill Fitzgerald. Facebook Tinkers With Users’ Emotions in News Feed Experiment, Stirring Outcry , 2015 .
[9] Joon Son Chung,et al. You said that? , 2017, BMVC.
[10] Davide Cozzolino,et al. Autoencoder with recurrent neural networks for video forgery detection , 2017, Media Watermarking, Security, and Forensics.
[11] Alvin Zhou. #Republic: Divided Democracy in the Age of Social Media , 2017 .
[12] Ming-Yu Liu,et al. Coupled Generative Adversarial Networks , 2016, NIPS.
[13] Nils B. Weidmann,et al. Empowering activists or autocrats? The Internet in authoritarian regimes , 2015 .
[14] B. Turner. Center for a New American Security , 2014 .
[15] Tom Schaul,et al. FeUdal Networks for Hierarchical Reinforcement Learning , 2017, ICML.
[16] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[17] Karim K. Shehadeh. The Wassenaar Arrangement and Encryption Exports: An Ineffective Export Control Regime that Compromises United States' Economic Interests , 1999 .
[18] Geoffrey R. Stone,et al. Liberty and Security in a Changing World: Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies , 2013 .
[19] Ryan Calo. Robotics and the Lessons of Cyberlaw , 2014 .
[20] Jeffrey T. Hancock,et al. Editorial Expression of Concern and Correction , 2014 .
[21] Filippo Menczer,et al. The spread of fake news by social bots , 2017, ArXiv.
[22] Ananthram Swami,et al. Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples , 2016, ArXiv.
[23] Eran Tromer,et al. PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[24] Radha Poovendran,et al. Google's Cloud Vision API is Not Robust to Noise , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).
[25] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[26] Michael P. Wellman,et al. Towards the Science of Security and Privacy in Machine Learning , 2016, ArXiv.
[27] John Harrison. Formal Methods at Intel - An Overview , 2010 .
[28] Mahmudur Rahman,et al. Video Liveness for Citizen Journalism: Attacks and Defenses , 2017, IEEE Transactions on Mobile Computing.
[29] Mary L. Cummings,et al. Creating moral buffers in weapon control interface design , 2004, IEEE Technology and Society Magazine.
[30] Jeffrey T. Hancock,et al. Experimental evidence of massive-scale emotional contagion through social networks , 2014, Proceedings of the National Academy of Sciences.
[31] Ross Anderson,et al. Internet Security , 2020, The SAGE International Encyclopedia of Mass Media and Society.
[32] Jason R. C. Nurse,et al. The anatomy of online deception: what makes automated text convincing? , 2016, SAC.
[33] Patrick D. McDaniel,et al. Cleverhans V0.1: an Adversarial Machine Learning Library , 2016, ArXiv.
[34] Abhishek Kashyap,et al. An Evaluation of Digital Image Forgery Detection Approaches , 2017, ArXiv.
[35] Yoshua Bengio,et al. NICE: Non-linear Independent Components Estimation , 2014, ICLR.
[36] Yoshua Bengio,et al. Generative Adversarial Networks , 2014, ArXiv.
[37] Mark S. Miller,et al. Robust composition: towards a unified approach to access control and concurrency control , 2006 .
[38] Soumith Chintala,et al. Unsupervised Representation Learning with Deep Convolutional Generative Adversarial Networks , 2015, ICLR.
[39] Mike Preuss,et al. Towards "AlphaChem": Chemical Synthesis Planning with Tree Search and Deep Neural Network Policies , 2017, ICLR.
[40] Moni Naor,et al. Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.
[41] Joanna Bryson,et al. Of, for, and by the people: the legal lacuna of synthetic persons , 2017, Artificial Intelligence and Law.
[42] José Hernández-Orallo,et al. The Measure of All Minds: Evaluating Natural and Artificial Intelligence , 2017 .
[43] Daniele Quercia,et al. Our Twitter Profiles, Our Selves: Predicting Personality with Twitter , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[44] Suhang Wang,et al. Fake News Detection on Social Media: A Data Mining Perspective , 2017, SKDD.
[45] Kathleen Fisher. Using formal methods to enable more secure vehicles: DARPA's HACMS program , 2014, ICFP.
[46] Thomas Zeitzoff,et al. How Social Media Is Changing Conflict , 2017 .
[47] Brendan Dolan-Gavitt,et al. BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain , 2017, ArXiv.
[48] Juliane Hahn,et al. Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .
[49] Charles Elkan,et al. Differential Privacy and Machine Learning: a Survey and Review , 2014, ArXiv.
[50] Verónica Pérez-Rosas,et al. Automatic Detection of Fake News , 2017, COLING.
[51] Cormac Herley,et al. The Plight of the Targeted Attacker in a World of Scale , 2010, WEIS.
[52] Margaret E. Roberts,et al. How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument , 2017, American Political Science Review.
[53] Farinaz Koushanfar,et al. DeepSecure: Scalable Provably-Secure Deep Learning , 2017, 2018 55th ACM/ESDA/IEEE Design Automation Conference (DAC).
[54] Ryan Calo,et al. There is a blind spot in AI research , 2016, Nature.
[55] Percy Liang,et al. Understanding Black-box Predictions via Influence Functions , 2017, ICML.
[56] Ben Laurie,et al. “ Proof-of-Work ” Proves Not to Work version 0 . 2 , 2004 .
[57] Catherine Jefferson. Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies , 2012 .
[58] Justus Thies,et al. Face2Face: real-time face capture and reenactment of RGB videos , 2019, Commun. ACM.
[59] Micah Sherr,et al. Hidden Voice Commands , 2016, USENIX Security Symposium.
[60] Samuel C. Woolley,et al. Computational propaganda worldwide: Executive summary , 2017 .
[61] Edsger W. Dijkstra,et al. Letters to the editor: go to statement considered harmful , 1968, CACM.
[62] Sebastian Farquhar,et al. Pricing Externalities to Balance Public Risks and Benefits of Research , 2017, Health security.
[63] Shashank V. Joshi,et al. Army of none: autonomous weapons and the future of war , 2018, International Affairs.
[64] L. Jean Camp,et al. Proof of Work can Work , 2006, WEIS.
[65] T. Graepel,et al. Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.
[66] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[67] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[68] Seth Flaxman,et al. European Union Regulations on Algorithmic Decision-Making and a "Right to Explanation" , 2016, AI Mag..
[69] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[70] Arkaitz Zubiaga,et al. Detection and Resolution of Rumours in Social Media , 2017, ACM Comput. Surv..
[71] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[72] Tom Schaul,et al. Reinforcement Learning with Unsupervised Auxiliary Tasks , 2016, ICLR.
[73] Somesh Jha,et al. Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures , 2015, CCS.
[74] John Salvatier,et al. When Will AI Exceed Human Performance? Evidence from AI Experts , 2017, ArXiv.
[75] Randy H. Katz,et al. A Berkeley View of Systems Challenges for AI , 2017, ArXiv.
[76] Rand Waltzman,et al. The Weaponization of Information: The Need for Cognitive Security , 2017 .
[77] Tom Schaul,et al. Deep Q-learning From Demonstrations , 2017, AAAI.
[78] Jon Turney,et al. Molecular politics: developing American and British regulatory policy for genetic engineering, 1972–1982 , 1996, Medical History.
[79] Patrick D. McDaniel,et al. Adversarial Perturbations Against Deep Neural Networks for Malware Classification , 2016, ArXiv.
[80] Michael Naehrig,et al. CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.
[81] William E. Kastenberg,et al. Making ethics explicit: Relocating ethics to the core of engineering education , 2013 .
[82] Bobby Filar,et al. Ask Me Anything: A Conversational Interface to Augment Information Security Workers , 2017, SOUPS.
[83] Joelle Pineau,et al. A Deep Reinforcement Learning Chatbot , 2017, ArXiv.
[84] Jaakko Lehtinen,et al. Progressive Growing of GANs for Improved Quality, Stability, and Variation , 2017, ICLR.
[85] Tung Yin. Game of Drones: Defending Against Drone Terrorism , 2015 .
[86] Rebecca Crootof,et al. The Killer Robots Are Here: Legal and Policy Implications , 2014 .
[87] Thomas Wollinger,et al. IT Security and the Internet of Things , 2014 .
[88] Vijay Arya,et al. Model Extraction Warning in MLaaS Paradigm , 2017, ACSAC.
[89] W. Nuland,et al. Information operations and Facebook , 2017 .
[90] Vitaly Shmatikov,et al. Membership Inference Attacks Against Machine Learning Models , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[91] Laurent Orseau,et al. Reinforcement Learning with a Corrupted Reward Channel , 2017, IJCAI.
[92] Martin Libicki. Cyberspace in Peace and War , 2016 .
[93] Eleonora Mattiacci,et al. A Manifesto, in 140 Characters or Fewer: Social Media as a Tool of Rebel Diplomacy , 2017, British Journal of Political Science.
[94] Sheldon Krimsky,et al. Genetic Alchemy: The Social History of the Recombinant DNA Controversy , 1984 .
[95] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[96] P. W. Singer,et al. Wired for War: The Robotics Revolution and Conflict in the 21st Century , 2009 .
[97] Tudor Dumitras,et al. Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning , 2017, ArXiv.
[98] B. B. D. Mesquita,et al. The Dictator's Handbook: Why Bad Behavior is Almost Always Good Politics , 2011 .
[99] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.