Roman V. Yampolskiy

Affiliations:
  • University of Louisville


According to our database1, Roman V. Yampolskiy authored at least 136 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Principles for new ASI Safety Paradigms.
CoRR, 2021

Death in Genetic Algorithms.
CoRR, 2021

Impossibility Results in AI: A Survey.
CoRR, 2021

AI Risk Skepticism.
CoRR, 2021

Understanding and Avoiding AI Failures: A Practical Guide.
CoRR, 2021

Authorship Identification of Translational Algorithms.
Proceedings of the 15th IEEE International Conference on Semantic Computing, 2021

On the Differences between Human and Machine Intelligence.
Proceedings of the Workshop on Artificial Intelligence Safety 2021 co-located with the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI 2021), 2021

Uncontrollability of Artificial Intelligence.
Proceedings of the Workshop on Artificial Intelligence Safety 2021 co-located with the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI 2021), 2021

Chess as a Testing Grounds for the Oracle Approach to AI Safety.
Proceedings of the Workshop on Artificial Intelligence Safety 2021 co-located with the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI 2021), 2021

Impossibility of Unambiguous Communication as a Source of Failure in AI Systems.
Proceedings of the Workshop on Artificial Intelligence Safety 2021 co-located with the Thirtieth International Joint Conference on Artificial Intelligence (IJCAI 2021), 2021

AGI Control Theory.
Proceedings of the Artificial General Intelligence - 14th International Conference, 2021

2020
Artificial Stupidity: Data We Need to Make Machines Our Equals.
Patterns, 2020

Unexplainability and Incomprehensibility of AI.
J. Artif. Intell. Conscious., 2020

Unpredictability of AI: On the Impossibility of Accurately Predicting All Actions of a Smarter Agent.
J. Artif. Intell. Conscious., 2020

Special Issue "On Defining Artificial Intelligence" - Commentaries and Author's Response.
J. Artif. Gen. Intell., 2020

Transdisciplinary AI Observatory - Retrospective Analyses and Future-Oriented Contradistinctions.
CoRR, 2020

On Controllability of AI.
CoRR, 2020

Human ≠ AGI.
CoRR, 2020

Introducing the concept of ikigai to the ethics of AI and of human enhancements.
Proceedings of the IEEE International Conference on Artificial Intelligence and Virtual Reality, 2020

Error-Correction for AI Safety.
Proceedings of the Artificial General Intelligence - 13th International Conference, 2020

2019
Classification Schemas for Artificial Intelligence Failures.
CoRR, 2019

Unexplainability and Incomprehensibility of Artificial Intelligence.
CoRR, 2019

An AGI with Time-Inconsistent Preferences.
CoRR, 2019

Unpredictability of AI.
CoRR, 2019

Simulation Typology and Termination Risks.
CoRR, 2019

Personal Universes: A Solution to the Multi-Agent Value Alignment Problem.
CoRR, 2019

Towards AI Welfare Science and Policies.
Big Data Cogn. Comput., 2019

Orthogonality-Based Disentanglement of Responsibilities for Ethical Intelligent Systems.
Proceedings of the Artificial General Intelligence - 12th International Conference, 2019

Emergence of Addictive Behaviors in Reinforcement Learning Agents.
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019

2018
Wisdom of artificial crowds feature selection in untargeted metabolomics: An application to the development of a blood-based diagnostic test for thrombotic myocardial infarction.
J. Biomed. Informatics, 2018

The Singularity May Be Near.
Inf., 2018

Uploading Brain into Computer: Whom to Upload First?
CoRR, 2018

Why We Do Not Evolve Software? Analysis of Evolutionary Algorithms.
CoRR, 2018

Human Indignity: From Legal AI Personhood to Selfish Memes.
CoRR, 2018

Optical Illusions Images Dataset.
CoRR, 2018

Building Safer AGI by introducing Artificial Stupidity.
CoRR, 2018

The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation.
CoRR, 2018

A Psychopathological Approach to Safety Engineering in AI and AGI.
Proceedings of the Computer Safety, Reliability, and Security, 2018

2017
Editors' Introduction to the Special Issue on "Superintelligence".
Informatica (Slovenia), 2017

Modeling and Interpreting Expert Disagreement About Artificial Superintelligence.
Informatica (Slovenia), 2017

High Performance Computing of Possible Minds.
Int. J. Grid High Perform. Comput., 2017

Detecting Qualia in Natural and Artificial Agents.
CoRR, 2017

Evaluating race and sex diversity in the world's largest companies using deep neural networks.
CoRR, 2017

Towards Moral Autonomous Systems.
CoRR, 2017

Guidelines for Artificial Intelligence Containment.
CoRR, 2017

Shortest Total Path Length Spanning Tree via Wisdom of Artificial Crowds Algorithm.
Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, 2017

Automated IQ Estimation from Writing Samples.
Proceedings of the 28th Modern Artificial Intelligence and Cognitive Science Conference 2017, 2017

Multimodal biometrie systems: A systematic review.
Proceedings of the 2017 IEEE International Symposium on Signal Processing and Information Technology, 2017

The Formalization of AI Risk Management and Safety Standards.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Artificial Fun: Mapping Minds to the Space of Fun.
CoRR, 2016

Artificial Intelligence Safety and Cybersecurity: a Timeline of AI Failures.
CoRR, 2016

Verifier Theory and Unverifiability.
CoRR, 2016

On the Origin of Samples: Attribution of Output to a Particular Algorithm.
CoRR, 2016

Unethical Research: How to Create a Malevolent Artificial Intelligence.
CoRR, 2016

The AGI Containment Problem.
Proceedings of the Artificial General Intelligence - 9th International Conference, 2016

Taxonomy of Pathways to Dangerous Artificial Intelligence.
Proceedings of the AI, 2016

2015
Taxonomy of Pathways to Dangerous AI.
CoRR, 2015

From Seed AI to Technological Singularity via Recursively Self-Improving Software.
CoRR, 2015

A Modified Chaotic Firefly Algorithm for Solving Discrete Logarithm Problem and Analysis.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer Factorization.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Hiding Color Images in DNA Sequences.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Evolution of a Metaheuristic for Aggregating Wisdom from Artificial Crowds.
Proceedings of the Progress in Artificial Intelligence, 2015

Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System.
Proceedings of the International Conference on Cyberworlds, 2015

Solving NP-hard number matrix games with Wisdom of Artificial Crowds.
Proceedings of the Computer Games: AI, 2015

A crossword puzzle generator using genetic algorithms with Wisdom of Artificial Crowds.
Proceedings of the Computer Games: AI, 2015

On the Limits of Recursively Self-Improving AGI.
Proceedings of the Artificial General Intelligence, 2015

Analysis of Types of Self-Improving Software.
Proceedings of the Artificial General Intelligence, 2015

The Space of Possible Mind Designs.
Proceedings of the Artificial General Intelligence, 2015

2014
Password Protected Visual Cryptography via Cellular Automaton Rule 30.
Trans. Data Hiding Multim. Secur., 2014

Utility function security in artificially intelligent agents.
J. Exp. Theor. Artif. Intell., 2014

Behavioral Biometrics: Categorization and Review.
Int. J. Nat. Comput. Res., 2014

The Universe of Minds.
CoRR, 2014

Natural vs Artificial Face Classification Using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014

2013
Turing Test as a Defining Feature of AI-Completeness.
Proceedings of the Artificial Intelligence, Evolutionary Computing and Metaheuristics, 2013

Avatar Facial Biometric Authentication Using Wavelet Local Binary Patterns.
Proceedings of the Security and Privacy Preserving in Social Networks, 2013

Recognizing Avatar Faces Using Wavelet-Based Adaptive Local Binary Patterns with Directional Statistical Features.
Trans. Comput. Sci., 2013

Hybrid Genetic Algorithm for the Maximum Clique Problem Combining Sharing and Migration.
Proceedings of the 24th Midwest Artificial Intelligence and Cognitive Science Conference 2013, 2013

Recognizing Artificial Faces Using Wavelet Based Adapted Median Binary Patterns.
Proceedings of the Twenty-Sixth International Florida Artificial Intelligence Research Society Conference, 2013

2012
Experiments in Artimetrics: Avatar Face Recognition.
Trans. Comput. Sci., 2012

Artimetrics: Biometrics for Artificial Entities.
IEEE Robotics Autom. Mag., 2012

Solving Sudoku Puzzles with Wisdom of Artificial Crowds.
Int. J. Intell. Games Simul., 2012

Development of Embedded CAPTCHA Elements for Bot Prevention in Fischer Random Chess.
Int. J. Comput. Games Technol., 2012

DNA as a medium for hiding data.
BMC Bioinform., 2012

AI-Complete, AI-Hard, or AI-Easy - Classification of Problems in AI.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Computing Partial Solutions to Difficult AI Problems.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Automated Collection of High Quality 3D Avatar Images.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Genetic Algorithm Applied to the Graph Coloring Problem.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Baseline Avatar Face Detection using an Extended Set of Haar-like Features.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Linguistic Profiling and Behavioral Drift in Chat Bots.
Proceedings of the 23rd Midwest Artificial Intelligence and Cognitive Science Conference 2012, 2012

Face Recognition in the Virtual World: Recognizing Avatar Faces.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Adaptive Extended Local Ternary Pattern (AELTP) for Recognizing Avatar Faces.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Learning Visual Features for the Avatar Captcha Recognition Challenge.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

Finding Data in DNA: Computer Forensic Investigations of Living Organisms.
Proceedings of the Digital Forensics and Cyber Crime - 4th International Conference, 2012

Avatar CAPTCHA: Telling computers and humans apart via face classification.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

Artificial Face Recognition Using Wavelet Adaptive LBP with Directional Statistical Features.
Proceedings of the 2012 International Conference on Cyberworlds, 2012

A framework for interactive generation of music for games.
Proceedings of the 17th International Conference on Computer Games, 2012

Using a GA and Wisdom of Artificial Crowds to solve solitaire battleship puzzles.
Proceedings of the 17th International Conference on Computer Games, 2012

Using discrete wavelet transform and eigenfaces for recognizing avatars faces.
Proceedings of the 17th International Conference on Computer Games, 2012

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

Solving Avatar Captchas Automatically.
Proceedings of the Advanced Machine Learning Technologies and Applications, 2012

2011
What to Do with the Singularity Paradox?
Proceedings of the Philosophy and Theory of Artificial Intelligence, 2011

Artificial Intelligence Safety Engineering: Why Machine Ethics Is a Wrong Approach.
Proceedings of the Philosophy and Theory of Artificial Intelligence, 2011

Applying Biometric Principles to Avatar Recognition.
Trans. Comput. Sci., 2011

GA with Wisdom of Artificial Crowds for Solving Mastermind Satisfiability Problem.
Int. J. Intell. Games Simul., 2011

Avatar Facial Biometric Authentication.
Int. J. Intell. Games Simul., 2011

Wisdom of artificial crowds algorithm for solving NP-hard problems.
Int. J. Bio Inspired Comput., 2011

Resource awareness in computational intelligence.
Int. J. Adv. Intell. Paradigms, 2011

Efficiency Theory: a Unifying Theory for Information, Computation and Intelligence
CoRR, 2011

Construction of an NP Problem with an Exponential Lower Bound
CoRR, 2011

Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Evaluation of SVM Classification of Avatar Facial Recognition.
Proceedings of the Advances in Neural Networks - ISNN 2011, 2011

Avatar Face Recognition Using Wavelet Transform and Hierarchical Multi-scale LBP.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

An improved LBP algorithm for avatar face recognition.
Proceedings of the XXIII International Symposium on Information, 2011

Evaluation of authorship attribution software on a Chat bot corpus.
Proceedings of the XXIII International Symposium on Information, 2011

Evaluation of Face Recognition Algorithms on Avatar Face Datasets.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

Embedded non-interactive CAPTCHA for Fischer Random Chess.
Proceedings of the 16th International Conference on Computer Games, 2011

Artificial human face recognition via Daubechies wavelet transform and SVM.
Proceedings of the 16th International Conference on Computer Games, 2011

Genetic algorithm and Wisdom of Artificial Crowds algorithm applied to Light up.
Proceedings of the 16th International Conference on Computer Games, 2011

Behavioral, Cognitive and Virtual Biometrics.
Proceedings of the Computer Analysis of Human Behavior., 2011

2010
Application of bio-inspired algorithm to the problem of integer factorisation.
Int. J. Bio Inspired Comput., 2010

Steganography and Visual Cryptography in Computer Forensics.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Click Fraud Prevention via multimodal evidence fusion by Dempster-Shafer theory.
Proceedings of the 2010 IEEE Conference on Multisensor Fusion and Integration for Intelligent Systems, 2010

2009
Strategy-based behavioural biometrics: a novel approach to automated identification.
Int. J. Comput. Appl. Technol., 2009

Assessing the Legal Risks in Network Forensic Probing.
Proceedings of the Advances in Digital Forensics V, 2009

2008
Action-based user authentication.
Int. J. Electron. Secur. Digit. Forensics, 2008

Traffic Analysis Based Identification of Attacks.
Int. J. Comput. Sci. Appl., 2008

Behavioural biometrics: a survey and classification.
Int. J. Biom., 2008

Mimicry Attack on Strategy-Based Behavioral Biometric.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Detecting and Controlling Cheating in Online Poker.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Direct and Indirect Human Computer Interaction Based Biometrics.
J. Comput., 2007

Embedded noninteractive continuous bot detection.
Comput. Entertain., 2007

Human Computer Interaction Based Intrusion Detection.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Secure Network Authentication with PassText.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

Behavioral Biometrics for Recognition and Verification of Game Bots.
Proceedings of the GAMEON'2007, 2007

2006
Anomaly Detection Based Intrusion Detection.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006


  Loading...