暂无分享,去创建一个
James Babcock | Roman V. Yampolskiy | János Kramár | Roman V Yampolskiy | James Babcock | János Kramár
[1] Roman V. Yampolskiy,et al. Utility function security in artificially intelligent agents , 2014, J. Exp. Theor. Artif. Intell..
[2] Richard Patrick William Loosemore. The Maverick Nanny with a Dopamine Drip: Debunking Fallacies in the Theory of AI Motivation , 2014, AAAI Spring Symposia.
[3] James Babcock,et al. The AGI Containment Problem , 2016, AGI.
[4] Vernor Vinge,et al. ==================================================================== the Coming Technological Singularity: How to Survive in the Post-human Era , 2022 .
[5] John Danaher,et al. Why AI Doomsayers are Like Sceptical Theists and Why it Matters , 2015, Minds and Machines.
[6] Leon Reznik,et al. Anomaly Detection Based Intrusion Detection , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[7] Jack Copeland,et al. Intelligent machinery , 2017, The Turing Guide.
[8] Ben Goertzel,et al. Why an Intelligence Explosion is Probable , 2012 .
[9] Roman V. Yampolskiy,et al. Leakproofing the Singularity Artificial Intelligence Confinement Problem , 2012 .
[10] H. Demirel,et al. Face Recognition using Dual-Tree Wavelet Transform , 2008, 2008 IEEE International Symposium on Signal Processing and Information Technology.
[11] Clément Farabet,et al. Implementing Neural Networks Efficiently , 2012, Neural Networks: Tricks of the Trade.
[12] A. Turing. Intelligent Machinery, A Heretical Theory* , 1996 .
[13] Mu Zhang,et al. V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis , 2012, VEE '12.
[14] Roman V. Yampolskiy,et al. From Seed AI to Technological Singularity via Recursively Self-Improving Software , 2015, ArXiv.
[15] Roman V. Yampolskiy,et al. Artificial Intelligence Safety Engineering: Why Machine Ethics Is a Wrong Approach , 2011, PT-AI.
[16] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[17] Roman V. Yampolskiy,et al. Embedded non-interactive CAPTCHA for Fischer Random Chess , 2011, 2011 16th International Conference on Computer Games (CGAMES).
[18] Roman V Yampolskiy,et al. Safety Engineering for Artificial General Intelligence , 2012, Topoi.
[19] Roman V. Yampolskiy,et al. Artificial Superintelligence: A Futuristic Approach , 2015 .
[20] Shane Legg,et al. Human-level control through deep reinforcement learning , 2015, Nature.
[21] Roman V. Yampolskiy,et al. Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures , 2016, ArXiv.
[22] Nick Bostrom,et al. Racing to the precipice: a model of artificial intelligence development , 2016, AI & SOCIETY.
[23] Roman V. Yampolskiy,et al. Evaluation of authorship attribution software on a Chat bot corpus , 2011, 2011 XXIII International Symposium on Information, Communication and Automation Technologies.
[24] Peter Norvig,et al. Artificial Intelligence: A Modern Approach , 1995 .
[25] Roman V. Yampolskiy,et al. Taxonomy of Pathways to Dangerous Artificial Intelligence , 2016, AAAI Workshop: AI, Ethics, and Society.
[26] R. J. Solomon Off,et al. The time scale of artificial intelligence: Reflections on social effects , 1985 .
[27] Eric Dietrich,et al. After the Humans are Gone , 2007 .
[28] R. Kurzweil,et al. The Singularity Is Near: When Humans Transcend Biology , 2006 .
[29] Kaj Sotala,et al. Advantages of artificial intelligences, uploads, and digital minds , 2012 .
[30] Eric Dietrich,et al. After the humans are gone Douglas Engelbart Keynote Address, North American Computers and Philosophy Conference Rensselaer Polytechnic Institute, August, 2006 , 2007, J. Exp. Theor. Artif. Intell..
[31] Olfa Nasraoui,et al. Assessing the Legal Risks in Network Forensic Probing , 2009, IFIP Int. Conf. Digital Forensics.
[32] Roman V. Yampolskiy,et al. Unethical Research: How to Create a Malevolent Artificial Intelligence , 2016, ArXiv.
[33] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[34] S. Legg,et al. Machine super intelligence , 2008 .
[35] I. J. Good,et al. Speculations Concerning the First Ultraintelligent Machine , 1965, Adv. Comput..
[36] Mordechai Guri,et al. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies , 2015, USENIX Security Symposium.
[37] Eliezer Yudkowsky. Artificial Intelligence as a Positive and Negative Factor in Global Risk , 2006 .
[38] Nate Soares,et al. The Value Learning Problem , 2018, Artificial Intelligence Safety and Security.
[39] Nick Bostrom,et al. Thinking Inside the Box: Controlling and Using an Oracle AI , 2012, Minds and Machines.
[40] Roman V. Yampolskiy,et al. Turing Test as a Defining Feature of AI-Completeness , 2013, Artificial Intelligence, Evolutionary Computing and Metaheuristics.
[41] Gary McGraw,et al. Software Security Testing , 2004, IEEE Secur. Priv..
[42] Venu Govindaraju,et al. Strategy-based behavioural biometrics: a novel approach to automated identification , 2009, Int. J. Comput. Appl. Technol..
[43] Venu Govindaraju,et al. Behavioural biometrics: a survey and classification , 2008, Int. J. Biom..
[44] Eric C. Rouchka,et al. Finding Data in DNA: Computer Forensic Investigations of Living Organisms , 2012, ICDF2C.
[45] R.V. Yampolskiy,et al. ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION , 2006, 2006 IEEE Long Island Systems, Applications and Technology Conference.
[46] Ray J. Solomonoff,et al. A Formal Theory of Inductive Inference. Part I , 1964, Inf. Control..
[47] Roman V. Yampolskiy,et al. Linguistic Profiling and Behavioral Drift in Chat Bots , 2012, MAICS.
[48] Stuart Armstrong,et al. How We're Predicting AI - or Failing to , 2015 .
[49] F. H. Adler. Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .
[50] Eliezer Yudkowsky,et al. Complex Value Systems in Friendly AI , 2011, AGI.
[51] Roman V. Yampolskiy,et al. The Universe of Minds , 2014, ArXiv.
[52] Roman V. Yampolskiy,et al. Avatar Face Recognition Using Wavelet Transform and Hierarchical Multi-scale LBP , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.
[53] Ray J. Solomonoff,et al. A Formal Theory of Inductive Inference. Part II , 1964, Inf. Control..
[54] Roman V Yampolskiy,et al. Responses to catastrophic AGI risk: a survey , 2014 .
[55] Marina L. Gavrilova,et al. Experiments in Artimetrics: Avatar Face Recognition , 2012, Trans. Comput. Sci..
[56] Roman V. Yampolskiy,et al. Global catastrophic risk and security implications of quantum computers , 2015 .
[57] Roman V Yampolskiy,et al. AI safety engineering through introduction of self-reference into felicific calculus via artificial pain and pleasure , 2014, 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering.
[58] Marina L. Gavrilova,et al. Artimetrics: Biometrics for Artificial Entities , 2012, IEEE Robotics & Automation Magazine.
[59] Roman V. Yampolskiy,et al. Artificial Intelligence Safety and Security , 2018 .
[60] Roman V. Yampolskiy. Behavioral Modeling: an Overview , 2008 .
[61] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.
[62] Stephen M. Omohundro,et al. The Basic AI Drives , 2008, AGI.
[63] Roman V. Yampolskiy,et al. Password Protected Visual Cryptography via Cellular Automaton Rule 30 , 2014, Trans. Data Hiding Multim. Secur..
[64] Stephen Omohundro,et al. The Nature of Self-Improving Artificial Intelligence , 2008 .
[65] Roman V. Yampolskiy,et al. What to Do with the Singularity Paradox? , 2011, PT-AI.
[66] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[67] John Schulman,et al. Concrete Problems in AI Safety , 2016, ArXiv.
[68] Nick Bostrom,et al. Superintelligence: Paths, Dangers, Strategies , 2014 .