Roman V. Yampolskiy
Roman V. Yampolskiy
Associate Professor of Computer Engineering and Computer Science, University of Louisville
Adresse e-mail validée de louisville.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Behavioural biometrics: a survey and classification
RV Yampolskiy, V Govindaraju
International Journal of Biometrics 1 (1), 81-113, 2008
3792008
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
367*2018
Artificial Superintelligence: A Futuristic Approach
RV Yampolskiy
CRC Press, 2015
103*2015
Artificial intelligence safety engineering: Why machine ethics is a wrong approach
RV Yampolskiy
Philosophy and Theory of Artificial Intelligence, 389-396, 2013
982013
Responses to Catastrophic AGI Risk: A Survey
K Sotala, RV Yampolskiy
Physica Scripta 90 (1), 2015
922015
Leakproofing the Singularity: Artificial Intelligence Confinement Problem
R Yampolskiy
Journal of Consciousness Studies 19 (1-2), 1-2, 2012
882012
Turing test as a defining feature of AI-completeness
RV Yampolskiy
Artificial Intelligence, Evolutionary Computing and Metaheuristics, 3-17, 2013
80*2013
Taxonomy of Pathways to Dangerous Artificial Intelligence
RV Yampolskiy
Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016
75*2016
Embedded noninteractive continuous bot detection
RV Yampolskiy, V Govindaraju
ACM Computers in Entertainment (CIE) 5 (4), 7, 2008
732008
Safety engineering for artificial general intelligence
R Yampolskiy, J Fox
Topoi 32 (2), 217-226, 2013
722013
Predicting Future AI Failures from Historic Examples
RV Yampolskiy
Foresight 21 (1), 138-152, 2018
69*2018
Applying biometric principles to avatar recognition
ML Gavrilova, R Yampolskiy
Transactions on computational science XII, 140-158, 2011
632011
Unethical Research: How to Create a Malevolent Artificial Intelligence
F Pistono, RV Yampolskiy
25th International Joint Conference on Artificial Intelligence (IJCAI-16 …, 2016
562016
Anomaly detection based intrusion detection
D Novikov, RV Yampolskiy, L Reznik
Third International Conference on Information Technology: New Generations …, 2006
562006
AI-complete, AI-hard, or AI-easy: classification of problems in artificial intelligence
RV Yampolskiy
The 23rd Midwest Artificial Intelligence and Cognitive Science Conference …, 2011
53*2011
Towards Moral Autonomous Systems
V Charisi, L Dennis, MFR Lieck, A Matthias, MSJ Sombetzki, AFT Winfield, ...
arXiv preprint arXiv:1703.04741, 2017
512017
Artificial general intelligence and the human mental model
RV Yampolskiy, J Fox
Singularity Hypotheses, 129-145, 2012
502012
Steganography and Visual Cryptography in Computer Forensics
G Abboud, J Marean, RV Yampolskiy
2010 Fifth International Workshop on Systematic Approaches to Digital …, 2010
502010
Avatar CAPTCHA: Telling computers and humans apart via face classification
D D'Souza, PC Polina, RV Yampolskiy
Electro/Information Technology (EIT), 2012 IEEE International Conference on, 1-6, 2012
49*2012
Analyzing user password selection behavior for reduction of password space
RV Yampolskiy
Proceedings 40th Annual 2006 International Carnahan Conference on Security …, 2006
482006
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20