Остановите войну!
for scientists:
default search action
Peter Eckersley
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c7]Carroll L. Wainwright, Peter Eckersley:
SafeLife 1.0: Exploring Side Effects in Complex Environments. SafeAI@AAAI 2020: 117-127 - [c6]Umang Bhatt, Alice Xiang, Shubham Sharma, Adrian Weller, Ankur Taly, Yunhan Jia, Joydeep Ghosh, Ruchir Puri, José M. F. Moura, Peter Eckersley:
Explainable machine learning in deployment. FAT* 2020: 648-657 - [i6]Miles Brundage, Shahar Avin, Jasmine Wang, Haydn Belfield, Gretchen Krueger, Gillian K. Hadfield, Heidy Khlaaf, Jingying Yang, Helen Toner, Ruth Fong, Tegan Maharaj, Pang Wei Koh, Sara Hooker, Jade Leung, Andrew Trask, Emma Bluemke, Jonathan Lebensold, Cullen O'Keefe, Mark Koren, Théo Ryffel, J. B. Rubinovitz, Tamay Besiroglu, Federica Carugati, Jack Clark, Peter Eckersley, Sarah de Haas, Maritza Johnson, Ben Laurie, Alex Ingerman, Igor Krawczuk, Amanda Askell, Rosario Cammarota, Andrew Lohn, David Krueger, Charlotte Stix, Peter Henderson, Logan Graham, Carina Prunkl, Bianca Martin, Elizabeth Seger, Noa Zilberman, Seán Ó hÉigeartaigh, Frens Kroeger, Girish Sastry, Rebecca Kagan, Adrian Weller, Brian Tse, Elizabeth Barnes, Allan Dafoe, Paul Scharre, Ariel Herbert-Voss, Martijn Rasser, Shagun Sodhani, Carrick Flynn, Thomas Krendl Gilbert, Lisa Dyer, Saif Khan, Yoshua Bengio, Markus Anderljung:
Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims. CoRR abs/2004.07213 (2020)
2010 – 2019
- 2019
- [c5]Peter Eckersley:
Impossibility and Uncertainty Theorems in AI Value Alignment (or why your AGI should not have a utility function). SafeAI@AAAI 2019 - [c4]Sky Croeser, Peter Eckersley:
Theories of Parenting and Their Application to Artificial Intelligence. AIES 2019: 423-428 - [c3]Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren:
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. CCS 2019: 2473-2487 - [i5]Peter Eckersley:
Impossibility and Uncertainty Theorems in AI Value Alignment (or why your AGI should not have a utility function). CoRR abs/1901.00064 (2019) - [i4]Sky Croeser, Peter Eckersley:
Theories of Parenting and their Application to Artificial Intelligence. CoRR abs/1903.06281 (2019) - [i3]Umang Bhatt, Alice Xiang, Shubham Sharma, Adrian Weller, Ankur Taly, Yunhan Jia, Joydeep Ghosh, Ruchir Puri, José M. F. Moura, Peter Eckersley:
Explainable Machine Learning in Deployment. CoRR abs/1909.06342 (2019) - [i2]Carroll L. Wainwright, Peter Eckersley:
SafeLife 1.0: Exploring Side Effects in Complex Environments. CoRR abs/1912.01217 (2019) - 2018
- [i1]Miles Brundage, Shahar Avin, Jack Clark, Helen Toner, Peter Eckersley, Ben Garfinkel, Allan Dafoe, Paul Scharre, Thomas Zeitzoff, Bobby Filar, Hyrum S. Anderson, Heather Roff, Gregory C. Allen, Jacob Steinhardt, Carrick Flynn, Seán Ó hÉigeartaigh, Simon Beard, Haydn Belfield, Sebastian Farquhar, Clare Lyle, Rebecca Crootof, Owain Evans, Michael Page, Joanna Bryson, Roman Yampolskiy, Dario Amodei:
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. CoRR abs/1802.07228 (2018) - 2017
- [j4]Andrew Conway, Peter Eckersley:
When does law enforcement's demand to read your data become a demand to read your mind? Commun. ACM 60(9): 38-40 (2017) - 2013
- [j3]Peter Eckersley, Anders Sandberg:
Is Brain Emulation Dangerous? J. Artif. Gen. Intell. 4(3): 170-194 (2013) - 2010
- [c2]Peter Eckersley:
How Unique Is Your Web Browser? Privacy Enhancing Technologies 2010: 1-18
2000 – 2009
- 2004
- [p1]Tim Dwyer, Peter Eckersley:
WilmaScope - A 3D Graph Visualization System. Graph Drawing Software 2004: 55-75 - 2003
- [j2]Peter Eckersley, Gary F. Egan, Erik De Schutter, Yiyuan Tang, Mirko Novak, Václav Sebesta, Line Matthiessen, Iiro P. Jääskeläinen, Ulla Ruotsalainen, Andreas V. M. Herz, K. Peter Hoffmann, Raphael Ritz, Viji Ravindranath, Francesco Beltrame, Shun-ichi Amari, Shiro Usui, Soo-Young Lee, Jaap van Pelt, Jan G. Bjaalie, Andrzej Wróbel, Fernando Mira da Silva, Carmen González, Sten Grillner, Paul F. M. J. Verschure, Turgay Dalkara, Robert Bennett, David Willshaw, Stephen H. Koslow, Perry L. Miller, Shankar Subramaniam, Arthur W. Toga:
Neuroscience data and tool sharing - A legal and policy framework for neuroinformatics. Neuroinformatics 1(2): 149-165 (2003) - 2002
- [j1]Maria Gavrilescu, Marnie E. Shaw, Geoffrey W. Stuart, Peter Eckersley, Imants D. Svalbe, Gary F. Egan:
Simulation of the Effects of Global Normalization Procedures in Functional MRI. NeuroImage 17(2): 532-542 (2002) - 2001
- [c1]Tim Dwyer, Peter Eckersley:
WilmaScope - An Interactive 3D Graph Visualisation System. GD 2001: 442-443
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint