How unique is your web browser? P Eckersley Privacy Enhancing Technologies: 10th International Symposium, PETS 2010 …, 2010 | 1390 | 2010 |
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... https://arxiv.org/pdf/1802.07228, 2018 | 987 | 2018 |
Beyond the imitation game: Quantifying and extrapolating the capabilities of language models A Srivastava, A Rastogi, A Rao, AAM Shoeb, A Abid, A Fisch, AR Brown, ... arXiv preprint arXiv:2206.04615, 2022 | 828 | 2022 |
Explainable machine learning in deployment U Bhatt, A Xiang, S Sharma, A Weller, A Taly, Y Jia, J Ghosh, R Puri, ... Proceedings of the 2020 conference on fairness, accountability, and …, 2020 | 667 | 2020 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 346 | 2020 |
Let's Encrypt: an automated certificate authority to encrypt the entire web J Aas, R Barnes, B Case, Z Durumeric, P Eckersley, A Flores-López, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 160 | 2019 |
On locational privacy, and how to avoid losing it forever AJ Blumberg, P Eckersley Electronic frontier foundation 10 (11), 1-7, 2009 | 150 | 2009 |
Ó hÉigeartaigh M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... S., Beard, S., Belfield, H., Farquhar, S., Lyle, C., Crootof, R., Evans, O …, 2018 | 96 | 2018 |
An observatory for the SSLiverse P Eckersley, J Burns Defcon, 2010 | 93* | 2010 |
Simulation of the effects of global normalization procedures in functional MRI M Gavrilescu, ME Shaw, GW Stuart, P Eckersley, ID Svalbe, GF Egan Neuroimage 17 (2), 532-542, 2002 | 93 | 2002 |
Virtual Markets for Virtual Goods: The Mirror Image of Digital Copyright? PD Eckersley Harvard Journal of Law and Technology 18 (1), 85-166, 2004 | 90 | 2004 |
Neuroscience data and tool sharing: a legal and policy framework for neuroinformatics P Eckersley, GF Egan, E De Schutter, T Yiyuan, M Novak, V Sebesta, ... Neuroinformatics 1, 149-165, 2003 | 66 | 2003 |
Roadmap to pandemic resilience: massive scale testing, tracing, and supported isolation (TTSI) as the path to pandemic resilience for a free society D Allen, S Block, J Cohen, P Eckersley, M Eifler, L Gostin, D Goux, ... Safra Center for Ethics at Harvard University 20, 1-56, 2020 | 60 | 2020 |
Impossibility and Uncertainty Theorems in AI Value Alignment (or why your AGI should not have a utility function) P Eckersley Proc. SafeAI 2019, 2018 | 47 | 2018 |
Sovereign key cryptography for internet domains P Eckersley | 47 | 2012 |
AI Progress Measurement P Eckersley, Y Nasser https://eff.org/ai/metrics, 2017 | 38* | 2017 |
Is the SSLiverse a safe place P Eckersley, J Burns Chaos Communication Congress, 2010 | 36 | 2010 |
Outpacing the virus: Digital response to containing the spread of COVID-19 while mitigating privacy risks V Hart, D Siddarth, B Cantrell, L Tretikov, P Eckersley, J Langford, ... COVID-19 Rapid Response Impact Initiative, White Paper 5, 2020 | 32 | 2020 |
The malicious use of artificial intelligence: Forecasting, prevention, and mitigation. arXiv 2018 M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... arXiv preprint arXiv:1802.07228, 2020 | 32 | 2020 |
Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get P Eckersley Electronic Frontier Foundation 23, 2011 | 32 | 2011 |