- Allen, P. and Greaves, M. The singularity isn't near. MIT Technology Review, 2011.Google Scholar
- Amodel, D. et al. Concrete problems in AI safety. 2016. arXiv:1606.06565.Google Scholar
- Autor, D.H. Why are there still so many jobs? The history and future of workplace automation. Journal of Economic Perspectives 29, 3 (Mar. 2015).Google ScholarCross Ref
- Bengio, Y., LeCun, Y., and Hinton, G. Deep learning. Nature 521, 2015.Google Scholar
- Bostrom, N. Superintelligence: Paths, Dangers, Strategies. Oxford University Press, 2014. Google ScholarDigital Library
- Brynjolfsson, E. and McAfee, A. The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W.W. Norton and Co., 2016. Google ScholarDigital Library
- Ford, M. Rise of the Robots: Technology and the Threat of a Jobless Future. Basic Books, 2015.Google Scholar
- Good, I.J. Speculations concerning the first ultraintelligent machine. In Franz L. Alt and Morris Rubino, Eds., Advances in Computers. Academic Press, 1965.Google Scholar
- Haggstroom, O. Here Be Dragons. Oxford University Press, 2016.Google Scholar
- Markoff, J. Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots. Harper and Collins, 2015. Google ScholarDigital Library
- Shanahan, M. The Technological Singularity. MIT Press Essential Knowledge Series. MIT Press, 2015.Google ScholarCross Ref
Index Terms
- AI dangers: imagined and real
Recommendations
Limiting the Dangers of Intuitive Decision Making
New views of mature ideas on software and quality productivityWe scientists like to think that we bring objectivity to our work. But this month, Lorenzo Strigini shows us that subjectivity is inevitable, and that intuition should be used with great ...
The dangers of post-hoc interpretability: unjustified counterfactual explanations
IJCAI'19: Proceedings of the 28th International Joint Conference on Artificial IntelligencePost-hoc interpretability approaches have been proven to be powerful tools to generate explanations for the predictions made by a trained blackbox model. However, they create the risk of having explanations that are a result of some artifacts learned by ...
The dangers of composing anonymous channels
IH'12: Proceedings of the 14th international conference on Information HidingWe present traffic analyses of two anonymous communications schemes that build on the classic Crowds/Hordes protocols. The AJSS10 [1] scheme combines multiple Crowds-like forward channels with a Hordes reply channel in an attempt to offer robustness in ...
Comments