Roman V. Yampolskiy
Roman V. Yampolskiy
Computer Science and Engineering, University of Louisville
Verified email at louisville.edu - Homepage
Title
Cited by
Cited by
Year
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
580*2018
Behavioural biometrics: a survey and classification
RV Yampolskiy, V Govindaraju
International Journal of Biometrics 1 (1), 81-113, 2008
4182008
Artificial Superintelligence: A Futuristic Approach
RV Yampolskiy
CRC Press, 2015
131*2015
Artificial intelligence safety engineering: Why machine ethics is a wrong approach
RV Yampolskiy
Philosophy and Theory of Artificial Intelligence, 389-396, 2013
1182013
Responses to Catastrophic AGI Risk: A Survey
K Sotala, RV Yampolskiy
Physica Scripta 90 (1), 2015
1162015
Predicting Future AI Failures from Historic Examples
RV Yampolskiy
Foresight 21 (1), 138-152, 2018
112*2018
Leakproofing the Singularity: Artificial Intelligence Confinement Problem
R Yampolskiy
Journal of Consciousness Studies 19 (1-2), 1-2, 2012
100*2012
Turing test as a defining feature of AI-completeness
RV Yampolskiy
Artificial Intelligence, Evolutionary Computing and Metaheuristics, 3-17, 2013
962013
Taxonomy of Pathways to Dangerous Artificial Intelligence
RV Yampolskiy
Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016
94*2016
Safety engineering for artificial general intelligence
R Yampolskiy, J Fox
Topoi 32 (2), 217-226, 2013
872013
Embedded noninteractive continuous bot detection
RV Yampolskiy, V Govindaraju
ACM Computers in Entertainment (CIE) 5 (4), 7, 2008
792008
Towards Moral Autonomous Systems
V Charisi, L Dennis, MFR Lieck, A Matthias, MSJ Sombetzki, AFT Winfield, ...
arXiv preprint arXiv:1703.04741, 2017
712017
Unethical Research: How to Create a Malevolent Artificial Intelligence
F Pistono, RV Yampolskiy
25th International Joint Conference on Artificial Intelligence (IJCAI-16 …, 2016
702016
Applying biometric principles to avatar recognition
ML Gavrilova, R Yampolskiy
Transactions on computational science XII, 140-158, 2011
662011
AI-complete, AI-hard, or AI-easy: classification of problems in artificial intelligence
RV Yampolskiy
The 23rd Midwest Artificial Intelligence and Cognitive Science Conference …, 2011
64*2011
Anomaly detection based intrusion detection
D Novikov, RV Yampolskiy, L Reznik
Third International Conference on Information Technology: New Generations …, 2006
612006
Artificial general intelligence and the human mental model
RV Yampolskiy, J Fox
Singularity Hypotheses, 129-145, 2012
592012
Avatar CAPTCHA: Telling computers and humans apart via face classification
D D'Souza, PC Polina, RV Yampolskiy
Electro/Information Technology (EIT), 2012 IEEE International Conference on, 1-6, 2012
572012
Artificial Intelligence Safety and Security
RV Yampolskiy
Chapman and Hall/CRC Press, 2018
54*2018
Analyzing user password selection behavior for reduction of password space
RV Yampolskiy
Proceedings 40th Annual 2006 International Carnahan Conference on Security …, 2006
532006
The system can't perform the operation now. Try again later.
Articles 1–20