Chapter 1 - References
https://www.engadget.com/mcdonalds-ibm-ai-food-orders-131806578.html
https://www.hospitalitynet.org/news/4100264.html
https://www.theguardian.com/football/2022/jul/01/fifa-ai-powered-technology-var-offside-world-cup
https://news.pg.com/news-releases/news-details/2017/Olay-Unveils-Global-Skin-Analysis-Platform-Olay-Skin-Advisor--The-First-Of-Its-Kind-Application-of-Deep-Learning-in-the-Beauty-Industry/default.aspx
https://www.cnbc.com/2017/05/21/hersheys-pennsylvania-twizzler-factory-uses-microsoft-artificial-intelligence.html
https://www.cbinsights.com/research/artificial-intelligence-earnings-calls/
Samuel, Arthur L. "Some studies in machine learning using the game of checkers." IBM Journal of research and development 44.1.2 (2000): 206-226.
https://www.businessinsider.com/the-documentary-about-google-deepminds-alphago-algorithm-is-now-available-on-netflix-2018-1
https://ai.googleblog.com/2022/06/minerva-solving-quantitative-reasoning.html
https://www.fda.gov/medical-devices/software-medical-device-samd/artificial-intelligence-and-machine-learning-aiml-enabled-medical-devices
https://www.wired.com/story/russia-ukraine-war-ai-surveillance/
https://fortune.com/2022/02/16/deepmind-ai-nuclear-fusion-reactor-control/
Salem, Maha, et al. "Would you trust a (faulty) robot? Effects of error, task type and personality on human-robot cooperation and trust." 2015 10th ACM/IEEE International Conference on Human-Robot Interaction (HRI). IEEE, 2015.
Robinette, Paul, et al. "Overtrust of robots in emergency evacuation scenarios." 2016 11th ACM/IEEE international conference on human-robot interaction (HRI). IEEE, 2016.
https://www.nature.com/articles/s42256-021-00307-0
https://www.technologyreview.com/2021/07/30/1030329/machine-learning-ai-failed-covid-hospital-diagnosis-pandemic/
https://www.newyorker.com/business/currency/cautiously-welcoming-our-new-computer-overlords
https://www.youtube.com/watch?v=W4jWAwUb63c
https://fortune.com/longform/ibm-watson-health-business-strategy/
https://slate.com/technology/2022/01/ibm-watson-health-failure-artificial-intelligence.html
https://fortune.com/2015/09/10/ibm-watson-health/
https://fortune.com/longform/ibm-watson-health-business-strategy/
https://slate.com/technology/2022/01/ibm-watson-health-failure-artificial-intelligence.html
https://newsroom.ibm.com/2022-01-21-Francisco-Partners-to-Acquire-IBMs-Healthcare-Data-and-Analytics-Assets
https://www.bbc.com/news/uk-scotland-highlands-islands-57854318
https://www.nytimes.com/2021/07/18/technology/google-maps-hike-danger.html
https://www.wbur.org/hereandnow/2016/06/01/hikers-gps-smartphones
https://www.dw.com/en/saudi-arabia-grants-citizenship-to-robot-sophia/a-41150856
https://www.un.org/en/desa/un-robot-sophia-joins-meeting-artificial-intelligence-and-sustainable-development
https://www.nytimes.com/2017/05/23/business/google-deepmind-alphago-go-champion-defeat.html
https://pnw.ai/article/america-needs-ai-literacy-now/72515409
https://www.washingtonpost.com/technology/2022/06/11/google-ai-lamda-blake-lemoine/
Pearl, Judea, and Dana Mackenzie. The book of why: the new science of cause and effect. Basic books, 2018.
https://www.scientificamerican.com/article/ai-learns-what-an-infant-knows-about-the-physical-world/
https://www.theverge.com/2020/9/18/21445168/tesla-driver-sleeping-police-charged-canada-autopilot
https://www.nytimes.com/2021/12/07/business/tesla-video-game-driving.html
https://www.cnbc.com/2022/08/19/youtube-removes-video-by-tesla-investors-using-kids-in-fsd-beta-test.html
https://gizmodo.com/james-corden-late-show-tesla-autopilot-self-driving-1849490806
https://www.bbc.com/news/technology-61155735
https://vervetimes.com/baidu-and-pony-ai-become-first-robotaxi-services-to-operate-without-safety-drivers-in-beijing/
https://www.theatlantic.com/international/archive/2018/01/trump-foreign-policy/549671/
https://medium.com/@RPublicService/feds-at-work-right-hand-men-to-the-pentagons-top-officials-ca99b6c93fbf
https://www.vanityfair.com/news/2018/04/inside-trumpworld-allies-fear-the-boss-could-go-postal-and-fire-mueller
https://cifar.ca/ai/#:~:text=Canada%20is%20a%20global%20AI%20leader&text=Launched%20in%202017%2C%20Canada's%20national,of%20Canada's%20thriving%20AI%20ecosystem.
https://www.nscai.gov/commissioners/
https://www.propublica.org/article/how-mckinsey-is-making-100-million-and-counting-advising-on-the-governments-bumbling-coronavirus-response
https://www.nscai.gov/about/charter/#:~:text=The%20Commission%20estimates%20an%20annual,and%20execution%20of%20its%20mission.
https://trumpwhitehouse.archives.gov/articles/promoting-use-trustworthy-artificial-intelligence-government/
https://forallsecure.com/blog/unleashing-the-mayhem-crs
https://www.darpa.mil/news-events/2016-08-04
https://twitter.com/perribus/status/1329813569869852679
https://www.npr.org/2022/03/16/1087062648/deepfake-video-zelenskyy-experts-war-manipulation-ukraine-russia
VII, Tom Murphy. "The first level of super mario bros. is easy with lexicographic." (2013).
https://www.defenseone.com/technology/2021/12/air-force-targeting-ai-thought-it-had-90-success-rate-it-was-more-25/187437/
https://www.ajl.org/drag-vs-ai#:~:text=%23DRAGVSAI%20is%20a%20hands%2Don,artificial%20intelligence%2C%20and%20algorithmic%20harms.
https://www.nytimes.com/2021/09/28/technology/facebook-ivermectin-coronavirus-misinformation.html
https://www.nbcnews.com/tech/tech-news/ivermectin-demand-drives-trump-telemedicine-website-rcna1791
https://www.theguardian.com/technology/2016/mar/24/tay-microsofts-ai-chatbot-gets-a-crash-course-in-racism-from-twitter
https://www.bloomberg.com/news/articles/2022-08-08/meta-s-ai-chatbot-repeats-election-and-anti-semitic-conspiracies
https://www.armed-services.senate.gov/press-releases/inhofe-reed-praise-senate-passage-of-national-defense-authorization-act-of-fiscal-year-2021
https://www.forbes.com/sites/markminevich/2022/03/23/ai-visionary-and-leader-dr-jane-pinelis-of-the-us-department-of-defense/?sh=5b121a4b5aa5
Baer, Gregory. Life: The Odds-And How to Improve Them. Perseus Books Group, 2003.
https://www.foxbusiness.com/politics/biden-defense-chief-china-pacing-amid-ascendancy
https://cset.georgetown.edu/publication/robot-hacking-games/
https://breakingdefense.com/2021/11/china-invests-in-artificial-intelligence-to-counter-us-joint-warfighting-concept-records/
https://tianchi.aliyun.com/competition/entrance/531853/introduction
https://tianchi.aliyun.com/competition/entrance/531853/introduction
https://perma.cc/X9KQ-4B9L
https://breakingdefense.com/2021/11/china-invests-in-artificial-intelligence-to-counter-us-joint-warfighting-concept-records/
Chen, Yuefeng, et al. "Unrestricted adversarial attacks on imagenet competition." arXiv preprint arXiv:2110.09903 (2021).
https://www.gov.uk/government/publications/defence-artificial-intelligence-strategy/defence-artificial-intelligence-strategy#strengthen-the-uks-defence-and-security-ai-ecosystem
https://www.nytimes.com/interactive/2021/12/20/technology/china-facebook-twitter-influence-manipulation.html
https://www.nytimes.com/interactive/2021/06/22/technology/xinjiang-uyghurs-china-propaganda.html
https://cset.georgetown.edu/publication/hacking-ai/
https://www-msnbc-com.cdn.ampproject.org/c/s/www.msnbc.com/msnbc/amp/shows/reidout/blog/rcna48322
https://www.forbes.com/sites/erictegler/2022/03/16/the-vulnerability-of-artificial-intelligence-systems-may-explain-why-they-havent-been-used-extensively-in-ukraine/?sh=1f685d7637d5
https://www.cyberscoop.com/shields-up-easterly-inglis-op-ed/
https://pubs.rsna.org/doi/full/10.1148/ryai.2021210011
NSCAI Report
Chapter 2 - References
https://qz.com/1034972/the-data-that-changed-the-direction-of-ai-research-and-possibly-the-world/
Domingos, Pedro. "A few useful things to know about machine learning." Communications of the ACM 55.10 (2012): 78-87.
https://www.nytimes.com/2015/12/11/science/an-advance-in-artificial-intelligence-rivals-human-vision-abilities.html
https://qz.com/1034972/the-data-that-changed-the-direction-of-ai-research-and-possibly-the-world/
https://media.utoronto.ca/media-releases/u-of-t-neural-networks-start-up-acquired-by-google/
https://www.wired.com/story/secret-auction-race-ai-supremacy-google-microsoft-baidu/
https://techcrunch.com/2016/10/25/clarifai-raises-30m-to-give-developers-visual-search-capabilities/
https://www.prnewswire.com/news-releases/metamind-launches-state-of-the-art-ai-platform-bringing-automated-predictions-and-smarter-decision-making-to-businesses-300005387.html
https://techcrunch.com/2016/04/04/saleforce-acquires-metamind/
http://karpathy.github.io/2014/09/02/what-i-learned-from-competing-against-a-convnet-on-imagenet/
Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, and L. D. Jackel. Backpropagation applied to handwritten zip code recognition. Neural Computation, 1(4):541-551, Winter 1989.
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Delving deep into rectifiers: Surpassing human-level performance on imagenet classification. 2015 IEEE International Conference on Computer Vision (ICCV), pages 1026–1034, 2015
Hendrycks, Dan, et al. "Natural adversarial examples." arXiv preprint arXiv:1907.07174 (2019).
https://www.theverge.com/2017/10/24/16533534/delphi-nutonomy-acquisition-450-million-self-driving
System Initiative on Shaping the Future of Mobility. "Reshaping urban mobility with autonomous vehicles: Lessons from the city of boston." World Economic Forum, 2018.
https://www.wired.com/story/snow-ice-pose-vexing-obstacle-self-driving-cars/
Reshaping urban mobility with autonomous vehicles: Lessons from the city of boston." World Economic Forum Report, 2018
https://www.bloomberg.com/news/features/2016-08-18/uber-s-first-self-driving-fleet-arrives-in-pittsburgh-this-month-is06r7on
https://www.cnet.com/roadshow/news/burger-king-ad-free-whopper-tesla-autopilot-smart-car/
https://www.vice.com/en/article/5d3dw5/the-least-safe-day-rollout-of-gun-detecting-ai-scanners-in-schools-has-been-a-cluster-emails-show
Nguyen, Anh, Jason Yosinski, and Jeff Clune. "Deep neural networks are easily fooled: High confidence predictions for unrecognizable images." Proceedings of the IEEE conference on computer vision and pattern recognition. 2015.
Baker, Nicholas, et al. "Deep convolutional networks do not classify based on global object shape." PLoS computational biology 14.12 (2018): e1006613.
https://www.bbc.com/news/54467384
https://www.today.com/food/facebook-blocked-ad-onions-being-overtly-sexual-t193666
https://fortune.com/2020/11/28/facebooks-ai-is-mistakenly-banning-some-small-business-ads/
https://www.theguardian.com/technology/2018/dec/04/images-of-jesus-superheroes-caught-up-tumblr-porn-ban
https://www.polygon.com/2018/12/4/18125997/tumblr-nsfw-guidelines-flagging-algorithm
https://gizmodo.com/british-cops-want-to-use-ai-to-spot-porn-but-it-keeps-m-1821384511
https://www.theverge.com/23327809/twitter-onlyfans-child-sexual-content-problem-elon-musk
https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation
https://www.theverge.com/2020/11/13/21562596/facebook-ai-moderation
Lattman, Peter. "The origins of Justice Stewart’s “I know it when I see it.”." Wall Street Journal (2007).
https://www.theverge.com/2017/8/4/16093872/facebook-ai-translations-artificial-intelligence
https://engineering.fb.com/2017/08/03/ml-applications/transitioning-entirely-to-neural-machine-translation/
Israeli police arrest Palestinian for 'good morning' Facebook post | The Times of Israel;
https://www.spanishdict.com/compare/registrar/buscar
https://ecf.ksd.uscourts.gov/cgi-bin/show_public_doc?2017cr40100-24
https://www.theguardian.com/world/2017/oct/13/chinas-wechat-app-translates-black-foreigner-to-n-word
https://arstechnica.com/tech-policy/2020/04/big-tits-bing-disables-trending-feature-after-inappropriate-results/
https://www.japantimes.co.jp/news/2020/02/07/business/tech/google-maps-marks-15-year-milestone-new-features/
https://www.bloomberg.com/news/articles/2019-04-10/google-flips-the-switch-on-its-next-big-money-maker-maps
https://blog.google/products/maps/google-maps-101-how-ai-helps-predict-traffic-and-determine-routes/
https://www.theverge.com/2020/2/3/21120463/google-maps-traffic-jams-99-phones-little-red-wagon-simon-weckert
https://venturebeat.com/2015/04/24/an-android-is-peeing-on-the-apple-logo-in-google-maps/
https://money.cnn.com/2015/04/24/technology/android-peeing-on-apple-google-maps/index.html?iid=EL
https://www.wsj.com/articles/google-maps-littered-with-fake-business-listings-harming-consumers-and-competitors-11561042283
https://www.mcafee.com/enterprise/en-us/assets/brochures/br-research-notes-on-experiments-conducted.pdf
https://www.wired.com/story/tesla-model-x-autopilot-phantom-images/
Hosseini, Hossein, and Radha Poovendran. "Semantic adversarial examples." Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops. 2018.
Rosenfeld, Amir, Richard Zemel, and John K. Tsotsos. "The elephant in the room." arXiv preprint arXiv:1808.03305 (2018).
Engstrom, Logan, et al. "Exploring the landscape of spatial robustness." International Conference on Machine Learning. PMLR, 2019.
https://www.fda.gov/news-events/fda-voices/fdas-comprehensive-effort-advance-new-innovations-initiatives-modernize-innovation
Chapter 3 - References
Szegedy, Christian, et al. "Intriguing properties of neural networks. ICLR. 2014." arXiv preprint arXiv:1312.6199 (2014).
https://careers.google.com/benefits/
https://www.seriouseats.com/lunch-at-google-insanely-awesome-as-you-thought
https://research.google/locations/accra/
https://research.google/locations/zurich/
Wu, Zuxuan, et al. "Making an invisibility cloak: Real world adversarial attacks on object detectors." European Conference on Computer Vision. Springer, Cham, 2020.
Sharif, Mahmood, et al. "Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition." Proceedings of the 2016 acm sigsac conference on computer and communications security. 2016.
https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html
Carlini, Nicholas, and David Wagner. "Audio adversarial examples: Targeted attacks on speech-to-text." 2018 IEEE security and privacy workshops (SPW). IEEE, 2018.
Morris, John X., et al. "Textattack: A framework for adversarial attacks, data augmentation, and adversarial training in nlp." arXiv preprint arXiv:2005.05909 (2020).
https://cset.georgetown.edu/publication/exploring-clusters-of-research-in-three-areas-of-ai-safety/
https://neurips.cc/Conferences/2007/
https://web.archive.org/web/20090411064558/http://mls-nips07.first.fraunhofer.de/
https://analyticsindiamag.com/imagenet-and-variants/
https://en.wikipedia.org/wiki/Batch_normalization
https://openai.com/blog/microsoft/
See acknowledgements https://proceedings.neurips.cc/paper/2014/file/5ca3e9b122f61f8f06494c97b1afccf3-Paper.pdf
https://fortune.com/40-under-40/2019/ian-goodfellow/
https://events.technologyreview.com/video/watch/ian-goodfellow-google-brain-innovator/
https://www.acm.org/media-center/2019/march/turing-award-2018
https://icml.cc/virtual/2022/20803
Ilyas, Andrew, et al. "Adversarial examples are not bugs, they are features." Advances in neural information processing systems 32 (2019).
Goodfellow, Ian J., Jonathon Shlens, and Christian Szegedy. "Explaining and harnessing adversarial examples." arXiv preprint arXiv:1412.6572 (2014).
Finlayson, Samuel G., et al. "Adversarial attacks on medical machine learning." Science 363.6433 (2019): 1287-1289.
Hussain, Shehzeen, et al. "WaveGuard: Understanding and Mitigating Audio Adversarial Examples." 30th USENIX Security Symposium
Brown, Tom B., et al. "Adversarial patch." arXiv preprint arXiv:1712.09665 (2017).
https://www.theverge.com/2017/11/2/16597276/google-ai-image-attacks-adversarial-turtle-rifle-3d-printed
https://www.louislegrand.fr/le-lycee/presentation/
https://venturebeat.com/2014/09/06/google-shows-its-deep-learning-systems-are-doing-just-fine-thank-you-very-much/
https://arxiv.org/abs/1605.07277
Papernot, Nicolas, Patrick McDaniel, and Ian Goodfellow. "Transferability in machine learning: from phenomena to black-box attacks using adversarial samples." arXiv preprint arXiv:1605.07277 (2016).
Albert, Kendra, et al. "Ethical Testing in the Real World: Evaluating Physical Testing of Adversarial Machine Learning." arXiv preprint arXiv:2012.02048 (2020)
Yu, Honggang, et al. "CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples." NDSS. 2020.
https://www.washingtonpost.com/technology/2022/06/15/tesla-autopilot-crashes/
https://www.usenix.org/conference/woot15/workshop-program/presentation/vaidya
https://www.theverge.com/2017/9/16/16318694/south-park-amazon-alexa-google-home
https://www.engadget.com/ai-controls-us-military-aircraft-142844768.html
https://warontherocks.com/2019/07/russian-ai-enabled-combat-coming-to-a-city-near-you/
https://www.nytimes.com/2021/09/18/world/middleeast/iran-nuclear-fakhrizadeh-assassination-israel.html
https://www.defensenews.com/artificial-intelligence/2022/08/17/russia-military-to-develop-weapons-using-artificial-intelligence/
Chapter 4 - References
https://www.tiktok.com/@sarahndom/video/6988270489290411269
https://twitter.com/SebastianDeri/status/1423768044610854913
https://twitter.com/VladChituc/status/1423769145548713987
https://blog.prolific.co/we-recently-went-viral-on-tiktok-heres-what-we-learned/
https://trends.google.com/trends/explore?date=2020-08-25%202021-07-31&geo=US&q=prolific%20surveys
https://www.theverge.com/2021/9/24/22688278/tiktok-science-study-survey-prolific
Kumar, Ram Shankar Siva, et al. "Adversarial machine learning-industry perspectives." 2020 IEEE Security and Privacy Workshops (SPW). IEEE, 2020
Grosse, Kathrin, et al. "" Why do so?"--A Practical Perspective on Machine Learning Security." arXiv preprint arXiv:2207.05164 (2022).
https://www.ft.com/content/f77b7979-c943-4b9d-b7b7-7953b63bea7e
https://www.dailydot.com/debug/unity-deempind-ai/
https://www.fool.com/earnings/call-transcripts/2022/05/11/unity-software-inc-u-q1-2022-earnings-call-transcr/
https://www.fool.com/earnings/call-transcripts/2022/05/11/unity-software-inc-u-q1-2022-earnings-call-transcr/
https://www.gartner.com/smarterwithgartner/how-to-create-a-business-case-for-data-quality-improvement
https://proceedings.neurips.cc/paper/2015/file/86df7dcfd896fcaf2674f757a2463eba-Paper.pdf
https://www.vice.com/en/article/88apnv/underpaid-workers-are-being-forced-to-train-biased-ai-on-mechanical-turk
https://electrek.co/2021/02/08/tesla-looks-hire-data-labelers-feed-autopilot-neural-nets-images-gigafactory-new-york/
https://www.reuters.com/article/us-facebook-ai/facebook-labels-posts-by-hand-posing-privacy-questions-idUSKCN1SC01T
Silicon Valley Is Listening To Your Most Intimate Moments - Ventured (siliconbaypartners.com)
https://arxiv.org/abs/2103.14749
https://excavating.ai/
https://www.artsy.net/article/artsy-editorial-online-image-database-will-remove-600-000-pictures-art-project-revealed-systems-racist-bias
https://electrek.co/2022/06/29/tesla-lets-go-hundreds-autopilot-data-labelers-closes-san-mateo-office/
https://arxiv.org/pdf/2105.05241.pdf
https://towardsdatascience.com/dirty-secrets-of-bookcorpus-a-key-dataset-in-machine-learning-6ee2927e8650
https://www.nytimes.com/2018/11/18/technology/artificial-intelligence-language.html
https://twitter.com/klivdahl/status/1475655863289495559
https://www.cnbc.com/2021/12/29/amazons-alexa-told-a-child-to-do-a-potentially-lethal-challenge.html
https://ourcommunitynow.com/news-national/watch-out-parentsthe-viral-outlet-challenge-has-kids-doing-the-unthinkable
https://itwire.com/home-it/how-a-google-search-could-end-up-endangering-a-life.html
https://support.google.com/websearch/answer/9351707?hl=en#zippy=%2Cour-policies-for-featured-snippets%2Chow-to-report-a-featured-snippet%2Cwhy-featured-snippets-may-be-removed
What happens when a user clicks a featured snippet? https://developers.google.com/search/docs/advanced/appearance/featured-snippets?visit_id=637778919680386649-1342753026&rd=1
https://searchengineland.com/bing-why-googles-wrong-in-its-accusations-63279
https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914
https://www.wsj.com/articles/SB10001424052748704124504576118510340787364
https://www.bbc.com/news/technology-12343597
https://searchengineland.com/wait-wait-dont-tell-me-i-search-google-so-does-bing-64501
https://money.cnn.com/2009/04/22/technology/yahoo-search.fortune/?postversion=2009042212
https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914
https://searchengineland.com/google-bing-is-cheating-copying-our-search-results-62914
https://www.wsj.com/articles/lyrics-site-genius-com-accuses-google-of-lifting-its-content-11560677400
https://variety.com/2020/digital/news/genius-loses-google-lyrics-lawsuit-1234731843/
https://www.musicbusinessworldwide.com/google-partner-lyricfind-responds-to-genius-lyric-lifting-accusation/
https://www.vice.com/en/article/pkgbwm/chinese-woman-fake-russian-history-wikipedia
Attacks against machine learning — an overview (elie.net)
https://slate.com/technology/2022/07/men-period-tracking-apps-abortion.html
https://trackthis.link/
https://bengrosser.com/projects/go-rando/
https://github.com/BillDietrich/fake_contacts
https://www.cnet.com/culture/teens-have-figured-out-how-to-mess-with-instagrams-tracking-algorithm/
https://www.bloomberg.com/news/articles/2022-03-04/ukraine-s-hacker-army-said-to-be-helped-by-400-000-supporters
https://www.nationaldefensemagazine.org/articles/2021/3/3/mumbai-incident-spotlights-chinas-cyber-capabilities
https://www.nytimes.com/2021/07/19/technology/china-hacking-us.html
Carlini, Nicholas. "Poisoning the Unlabeled Dataset of {Semi-Supervised} Learning." 30th USENIX Security Symposium (USENIX Security 21). 2021.
Kaspersky denies faking antivirus info to thwart rivals | Computerworld
https://arxiv.org/abs/1703.04730 (For a short talk on the paper, see https://vimeo.com/237274831; part about adversarial example comes towards the end, 12:29)
http://www.cs.cmu.edu/~alina/cv/resume.pdf
http://www2.technologyreview.com/tr35/profile.aspx?TRID=1083
https://www.ccs.neu.edu/home/alina/
https://news.northeastern.edu/2019/02/11/northeastern-has-the-most-beautiful-building-in-boston/
https://www.usenix.org/system/files/sec19-demontis.pdf
https://developers.google.com/machine-learning/guides/rules-of-ml
Chapter 5 - References
https://www.youtube.com/watch?t=1617&v=dEv99vxKjVI&feature=youtu.be
https://hbr.org/2022/01/how-to-sell-your-ideas-up-the-chain-of-command
https://twitter.com/nsa_csdirector/status/1437233496351723523
Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., and Swami, A. Practical black-box attacks against machine learning. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS ’17, pp. 506–519, New York, NY, USA, 2017. ACM. ISBN 978-1-4503-4944-4. doi: 10.1145/3052973.3053009. URL http://doi.acm. org/10.1145/3052973.3053009.
See Section 3 of http://proceedings.mlr.press/v80/athalye18a/athalye18a.pdf
See Section 3 of http://proceedings.mlr.press/v80/athalye18a/athalye18a.pdf
https://resources.mpi-inf.mpg.de/d2/orekondy/predpoison/
https://www.vice.com/en/article/43k453/this-real-time-strategy-game-is-just-13-kilobytes
https://js13kgames.com/entries/yet-another-moba
https://nicholas.carlini.com/writing/2020/digital-logic-game-of-life.html
https://nicholas.carlini.com/writing/2019/3d-renderer-javascript.html
“Because it is possible” mentioned in “3D Shadow Rendering” under 2019 in https://nicholas.carlini.com/writing and in 3rd paragaph of https://nicholas.carlini.com/writing/2020/digital-logic-game-of-life.html
https://github.com/carlini?tab=repositories
https://cypherpunks.venona.com/date/1995/09/msg01127.html
https://www.nytimes.com/1995/09/19/us/software-security-flaw-puts-shoppers-on-internet-at-risk.html
https://nicholas.carlini.com/writing/2019/advex_papers.txt (accessed on 12/5/2021; 4279 papers collected; bulk of them are adversarial examples); 4000 days =
See section 3.3 page 3; “A cottage industry has sprung up generating various ad-hoc defenses to specific adversarial attacks. Time and time again, these defenses have been repeatedly broken, often extremely quickly” https://people.csail.mit.edu/madry/6.883-Spring18/files/lecture_11.pdf
“I get the feeling that people vastly over-estimate the difficulty of breaking published defenses. “ in concluding thoughts sections https://nicholas.carlini.com/writing/2020/screen-recording-breaking-adversarial-example-defense.html
1902.02322.pdf (arxiv.org)
https://iclr.cc/archive/www/doku.php%3Fid=iclr2018:main.html
See https://www.wired.com/story/ai-has-a-hallucination-problem-thats-proving-tough-to-fix/
Commit date is Feb 1st https://github.com/anishathalye/obfuscated-gradients/commit/b161a13c3ff065573ee7b01f6dd7a719b0c4ae18
Quote from https://www.wired.com/story/ai-has-a-hallucination-problem-thats-proving-tough-to-fix/
https://twitter.com/chrisvelazco/status/1081330848262062080
http://web.archive.org/web/20210805191220/https://www.apple.com/child-safety/
https://twitter.com/senblumenthal/status/1423397902672662529
https://www.apple.com/child-safety/pdf/CSAM_Detection_Technical_Summary.pdf
“The threshold is set to provide an extremely high level of accuracy and ensures less than a one in one trillion chance per year of incorrectly flagging a given account" http://web.archive.org/web/20210805191220/https://www.apple.com/child-safety/
Dan Boneh from Stanford verified the proof https://www.apple.com/child-safety/pdf/Apple_PSI_System_Security_Protocol_and_Analysis.pdf
(In the video, the reporter mentions Google, Facebook and Microsoft does the same) https://www.wsj.com/articles/apple-executive-defends-tools-to-fight-child-porn-acknowledges-privacy-backlash-11628859600
German government wants Tim Cook to reconsider CSAM plans | AppleInsider
https://www.macrumors.com/2021/08/13/federighi-confusion-around-child-safety-details/
https://www.macrumors.com/2021/08/09/apple-faq-csam-detection-messages-scanning/
https://rottenoomocha.fandom.com/wiki/Asuha_Tohara
Text of post [P] AppleNeuralHash2ONNX: Reverse-Engineered Apple NeuralHash, in ONNX and Python : MachineLearning (reddit.com)
See “View Discussion in 5 other communities” [P] AppleNeuralHash2ONNX: Reverse-Engineered Apple NeuralHash, in ONNX and Python : MachineLearning (reddit.com)
https://www.theregister.com/2021/08/18/apples_csam_hashing/
https://www.theregister.com/2021/08/18/apples_csam_hashing/
https://techcrunch.com/2021/08/18/apples-csam-detection-tech-is-under-fire-again/
https://www.recordedfuture.com/china-pla-unit-purchasing-antivirus-exploitation/
https://www.federalregister.gov/documents/2020/01/06/2019-27649/addition-of-software-specially-designed-to-automate-the-analysis-of-geospatial-imagery-to-the-export
https://www.militarytimes.com/opinion/commentary/2020/02/06/the-iraq-war-has-cost-the-us-nearly-2-trillion/
https://www.theguardian.com/us-news/2021/oct/18/colin-powell-un-security-council-iraq
9/11 and the reinvention of the US intelligence community (brookings.edu)
https://www.govinfo.gov/content/pkg/GPO-911REPORT/pdf/GPO-911REPORT.pdf
https://www.nytimes.com/2005/07/28/politics/fbis-translation-backlog-grows.html
https://federalnewsnetwork.com/big-data/2018/09/nga-looks-to-stay-ahead-of-sheer-volume-of-satellite-imagery-data/
https://www.washingtonpost.com/archive/lifestyle/magazine/1990/12/23/gaston-hall/83e9fb42-d6e7-4f7e-89af-bff0d7af2a2f/
See Numbered Page 12; last line of the report. https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf
https://www.fedscoop.com/sue-gordon-ai-assurance-security/
https://nationalsecurity.gmu.edu/sue-gordon/
https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf
https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf
Page 2, under guiding principles https://www.dni.gov/files/ODNI/documents/AIM-Strategy.pdf
https://www.dni.gov/files/ODNI/documents/AI_Ethics_Framework_for_the_Intelligence_Community_10.pdf
https://federalnewsnetwork.com/artificial-intelligence/2020/03/despite-consensus-with-dod-odni-moving-ahead-with-its-own-ai-principles/
https://www.wired.com/story/sue-gordon-us-intelligence-public-private-google-amazon/
Carlini, Nicholas, and David Wagner. "Adversarial examples are not easily detected: Bypassing ten detection methods." Proceedings of the 10th ACM workshop on artificial intelligence and security. 2017.
https://youtu.be/HhY95m-WD_E?t=3408
Chapter 6 - References
https://futureoflife.org/2016/02/09/open-letter-autonomous-weapons-ai-robotics/
https://theintercept.com/2016/10/17/how-israel-became-a-hub-for-surveillance-technology/
https://www.reuters.com/article/iran-nuclear-scientist/iran-says-smart-satellite-controlled-machine-gun-killed-top-nuclear-scientist-idUSKBN28H13F
https://www.nytimes.com/2021/09/18/world/middleeast/iran-nuclear-fakhrizadeh-assassination-israel.html
https://www.reuters.com/article/iran-nuclear-scientist/iran-says-smart-satellite-controlled-machine-gun-killed-top-nuclear-scientist-idUSKBN28H13F
https://www.youtube.com/watch?v=Lu_cDUSHeWc
https://www.theverge.com/2017/9/4/16251226/russia-ai-putin-rule-the-world
https://warontherocks.com/2019/07/russian-ai-enabled-combat-coming-to-a-city-near-you/
https://apps.dtic.mil/sti/citations/AD1151522
https://irp.fas.org/agency/dod/jason/ai-dod.pdf
https://uvasrg.github.io/jason-spring-meeting-adversarial-machine-learning/
https://irp.fas.org/agency/dod/jason/ai-dod.pdf (Appendix A)
https://www.vox.com/21573433/michele-flournoy-secretary-of-defense-joe-biden-profile
https://www.nytimes.com/2020/12/08/us/politics/michele-flournoy-defense-secretary.html
https://cset.georgetown.edu/wp-content/uploads/Building-Trust-Through-Testing.pdf
https://spectrum.ieee.org/artificial-intelligence-index
https://oecd.ai/en/dashboards/policy-instruments/Emerging_technology_regulation
https://www.acsac.org/2001/papers/110.pdf
https://www.ieee-security.org/TC/SP2006/sp06hotel.html
https://www.cl.cam.ac.uk/~rja14/Papers/econ_acsac2012.pdf
https://www.hoover.org/research/flat-light
https://fin.plaid.com/articles/what-is-pci/
https://aibusiness.com/document.asp?doc_id=761881
https://aibusiness.com/document.asp?doc_id=761881
https://www.wired.com/story/trumps-salvo-against-china-targets-ai-firms/
https://www.wired.com/story/baidu-breaks-ai-alliance-strained-us-china-ties/
Nativi, S. and De Nigris, S., AI Standardisation Landscape: state of play and link to the EC proposal for an AI regulatory framework, EUR 30772 EN, Publications Office of the European Union, Luxembourg, 2021, ISBN 978-92-76-40325-8, doi:10.2760/376602, JRC125952.
https://security.googleblog.com/2019/05/new-research-how-effective-is-basic.html#:~:text=We%20found%20that%20an%20SMS,and%2090%25%20of%20targeted%20attacks.
https://www.jdsupra.com/legalnews/using-multi-factor-authentication-as-a-2167531/
https://hbr.org/2020/04/the-case-for-ai-insurance
Wolff, Josephine. Cyberinsurance Policy: Rethinking Risk in an Age of Ransomware, Computer Fraud, Data Breaches, and Cyberattacks. MIT Press, 2022.
https://www.technologyreview.com/2022/05/13/1052223/guide-ai-act-europe/
https://www.buzzfeednews.com/article/nicolenguyen/what-is-gdpr (see note under tweet by Aaron Levie)
https://www.enforcementtracker.com/?insights (See Cumulative fines)
https://venturebeat.com/ai/eu-proposes-strict-ai-rules-with-fines-up-to-6-for-violations/
https://www.fda.gov/medical-devices/software-medical-device-samd/artificial-intelligence-and-machine-learning-aiml-enabled-medical-devices
https://www.cnn.com/2021/10/13/politics/black-latinx-incarcerated-more/index.html
https://naacp.org/resources/criminal-justice-fact-sheet
https://www.usenix.org/conference/usenixsecurity21/presentation/severi
https://www.eff.org/press/releases/researchers-targeting-ai-bias-sex-worker-advocate-and-global-internet-freedom
https://www.wired.com/story/wrongful-arrests-ai-derailed-3-mens-lives/
https://www.reuters.com/technology/exclusive-amazon-extends-moratorium-police-use-facial-recognition-software-2021-05-18/
https://www.nytimes.com/2022/06/21/technology/microsoft-facial-recognition.html
"Fairness through robustness: Investigating robustness disparity in deep learning." Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency. 2021.
Xu, Han, et al. "To be robust or to be fair: Towards fairness in adversarial training." International Conference on Machine Learning. PMLR, 2021
https://hbr.org/2019/12/the-ai-transparency-paradox
https://www.washingtonpost.com/technology/2021/12/21/ces-covid/
https://ai.google/responsibilities/responsible-ai-practices/?category=security
Cohen, Julie E. Between truth and power. Oxford University Press, 2019.
https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?sh=6709f53634a2
https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/?sh=6709f53634a2
https://standardscatalog.ul.com/Catalog.aspx https://www.iso.org/store.html
https://www2.datainnovation.org/2021-aia-costs.pdf
https://www.theverge.com/2013/11/23/5135258/nhtsa-tesla-star-safety-advertising-guidelines
https://www.nytimes.com/2021/12/06/technology/tesla-autopilot-elon-musk.html
https://calteches.library.caltech.edu/51/2/CargoCult.htm
https://law.yale.edu/sites/default/files/area/center/isp/documents/algorithms_and_economic_justice_master_final.pdf (Page 39)
Li, Tiffany C. "Algorithmic Destruction." SMU Law Review, Forthcoming (2022).
https://www.ncsc.gov.uk/blog-post/introducing-our-new-machine-learning-security-principles
Chapter 7 - References
https://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecurity-part-3/
Tetlock, Philip E., and Dan Gardner. Superforecasting: The art and science of prediction. Random House, 2016.
https://www.ncsc.gov.uk/collection/machine-learning
https://www.armed-services.senate.gov/imo/media/doc/22-36_05-03-2022.pdf
https://www.nscai.gov/wp-content/uploads/2021/03/Full-Report-Digital-1.pdf (Page 52, under Adversarial AI)
https://www.geekwire.com/2021/survey-suggests-84-of-americans-are-illiterate-about-ai-so-heres-a-quiz-to-test-your-own-ai-iq/
https://hai.stanford.edu/summary-ai-provisions-national-defense-authorization-act-2022
https://karpathy.medium.com/software-2-0-a64152b37c35
https://lifelock.norton.com/learn/data-breaches/history-of-data-breaches
https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units
https://threatpost.com/2013-yahoo-breach-affected-all-3-billion-accounts/128259.
https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html
https://www.forbes.ru/biznes/475941-sboj-v-rabote-andeks-taksi-vyzval-probki-na-kutuzovskom-prospekte-moskvy
https://www.theverge.com/2022/8/22/23317502/xiaolang-zhang-pleads-guilty-trade-secret-theft-xpeng-self-driving-car
https://electrek.co/2019/07/11/tesla-engineer-autopilot-source-code-icloud/
https://wccftech.com/amd-stolen-gpu-ip-exclusive/
https://www.bloomberg.com/news/articles/2022-02-25/nvidia-is-investigating-cyber-attack-but-business-uninterrupted
https://semianalysis.substack.com/p/nvidia-hacked-a-national-security?s=r
Thompson, Ken. "Reflections on trusting trust." Communications of the ACM 27.8 (1984): 761-763.
https://xkcd.com/2347/
https://www.linuxfoundation.org/tools/census-ii-of-free-and-open-source-software--application-libraries/
https://www.bleepingcomputer.com/news/security/dev-corrupts-npm-libs-colors-and-faker-breaking-thousands-of-apps/
https://www.washingtonpost.com/technology/2021/12/20/log4j-hack-vulnerability-java/
https://blog.checkpoint.com/2021/12/13/the-numbers-behind-a-cyber-pandemic-detailed-dive/
https://healthitsecurity.com/news/41-states-settle-with-amca-over-2019-data-breach-affecting-21m-patients
https://www.forbes.com/sites/forbescommunicationscouncil/2017/05/30/why-customers-dont-trust-e-commerce-what-we-can-do-better/?sh=701dfd4c1b2a
https://cset.georgetown.edu/wp-content/uploads/CSET-AI-Accidents-An-Emerging-Threat.pdf
https://www.bbc.co.uk/pressoffice/pressreleases/stories/2007/11_november/15/newsnight.shtml