{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T08:06:00Z","timestamp":1748073960830,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031199066"},{"type":"electronic","value":"9783031199073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-19907-3_44","type":"book-chapter","created":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T06:07:32Z","timestamp":1673590052000},"page":"464-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Ownability of AGI"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9637-1161","authenticated-orcid":false,"given":"Roman V.","family":"Yampolskiy","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,14]]},"reference":[{"key":"44_CR1","unstructured":"Chandrasekaran, V., et al.: SoK: Machine Learning Governance. arXiv preprint arXiv:2109.10870 (2021)"},{"key":"44_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5402\/2012\/271878","volume":"2012","author":"R V. Yampolskiy,","year":"2012","unstructured":"Yampolskiy, R V.: AI-complete CAPTCHAs as zero knowledge proofs of access to an artificially intelligent system. ISRN Artif. Intell. 2012, 1\u20136 (2012). https:\/\/doi.org\/10.5402\/2012\/271878","journal-title":"ISRN Artif. Intell."},{"key":"44_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-642-29694-9_1","volume-title":"Artificial Intelligence, Evolutionary Computing and Metaheuristics","author":"R V. Yampolskiy,","year":"2013","unstructured":"Yampolskiy, R V.: Turing test as a defining feature of AI-completeness. In: Xin-She Yang, (ed.) Artificial Intelligence, Evolutionary Computing and Metaheuristics, pp. 3\u201317. Springer, Berlin, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-29694-9_1"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"D\u2019Souza, D., Polina, P.C., Yampolskiy, R.V.: Avatar CAPTCHA: telling computers and humans apart via face classification, In: IEEE International Conference on Electro\/Information Technology (EIT2012), 6\u20138 May 2012. Indianapolis, IN, USA (2012)","DOI":"10.1109\/EIT.2012.6220734"},{"issue":"1","key":"44_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O Goldreich","year":"1994","unstructured":"Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1\u201332 (1994). https:\/\/doi.org\/10.1007\/BF00195207","journal-title":"J. Cryptol."},{"key":"44_CR6","unstructured":"Adi, Y., et al.: Turning your weakness into a strength: watermarking deep neural networks by backdooring. In: 27th USENIX Security Symposium (USENIX Security 18) (2018)"},{"key":"44_CR7","unstructured":"Jia, H., et al.: Entangled watermarks as a defense against model extraction. In: 30th USENIX Security Symposium (USENIX Security 21) (2021)"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Jia, H., et al.: Proof-of-learning: definitions and practice. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE (2021)","DOI":"10.1109\/SP40001.2021.00106"},{"key":"44_CR9","unstructured":"Maini, P., Yaghini, M., Papernot, N.: Dataset inference: ownership resolution in machine learning. arXiv preprint arXiv:2104.10706 (2021)"},{"key":"44_CR10","unstructured":"Swain, S.: Tangible Guide To Intangibles, 3E. Wolters kluwer india Pvt Ltd (2019)"},{"issue":"01","key":"44_CR11","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1142\/S2705078520500034","volume":"7","author":"RV Yampolskiy","year":"2020","unstructured":"Yampolskiy, R.V.: Unpredictability of AI: on the impossibility of accurately predicting all actions of a smarter agent. J. Artif. Intell. Conscious. 7(01), 109\u2013118 (2020)","journal-title":"J. Artif. Intell. Conscious."},{"issue":"02","key":"44_CR12","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1142\/S2705078520500150","volume":"7","author":"RV Yampolskiy","year":"2020","unstructured":"Yampolskiy, R.V.: Unexplainability and incomprehensibility of AI. J. Artif. Intell. Conscious. 7(02), 277\u2013291 (2020)","journal-title":"J. Artif. Intell. Conscious."},{"key":"44_CR13","unstructured":"Yampolskiy, R.V.: Uncontrollability of Artificial Intelligence, In: IJCAI-21 Workshop on Artificial Intelligence Safety (AISafety2021), 19\u201320 August 2021. Montreal, Canada (2021)"},{"key":"44_CR14","unstructured":"Brcic, M., Yampolskiy, R.V.: Impossibility Results in AI: a survey. arXiv preprint arXiv:2109.00484 (2021)"},{"key":"44_CR15","unstructured":"Yampolskiy, R.V.: On the differences between human and machine intelligence. In: IJCAI-21 Workshop on Artificial Intelligence Safety (AISafety2021), 19\u201320 August 2021. Montreal, Canada (2021)"},{"key":"44_CR16","unstructured":"Banerjee, I., et al.: Reading race: AI recognises patient\u2019s racial identity in medical images. arXiv preprint arXiv:2107.10356 (2021)"},{"issue":"9","key":"44_CR17","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/aa7ca8","volume":"92","author":"RV Yampolskiy","year":"2017","unstructured":"Yampolskiy, R.V.: What are the ultimate limits to computational techniques: verifier theory and unverifiability. Phys. Scr. 92(9), 093001 (2017)","journal-title":"Phys. Scr."},{"key":"44_CR18","unstructured":"Bostrom, N.: Superintelligence: Paths, dangers, strategies. Oxford University Press (2014)"},{"key":"44_CR19","first-page":"287","volume":"2","author":"RV Yampolskiy","year":"2018","unstructured":"Yampolskiy, R.V.: Artificial consciousness: an illusionary solution to the hard problem. Reti, saperi, linguaggi 2, 287\u2013318 (2018)","journal-title":"Reti, saperi, linguaggi"},{"key":"44_CR20","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-31674-6_29","volume-title":"Philosophy and Theory of Artificial Intelligence","author":"RV Yampolskiy","year":"2013","unstructured":"Yampolskiy, R.V.: Artificial intelligence safety engineering: Why machine ethics is a wrong approach. In: Philosophy and Theory of Artificial Intelligence, pp. 389\u2013396. Springer, Berlin Heidelberg (2013)"},{"key":"44_CR21","doi-asserted-by":"crossref","unstructured":"Jaynes, T.L.: I Am Not Your Robot: the metaphysical challenge of humanity\u2019s AIS ownership. AI Soc. 1-14 (2021)","DOI":"10.1007\/s00146-021-01266-1"},{"key":"44_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41649-6","volume-title":"Artificial general intelligence","year":"2016","unstructured":"Steunebrink, B., Wang, P., Goertzel, B. (eds.): AGI -2016. LNCS (LNAI), vol. 9782. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41649-6"},{"key":"44_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/978-1-7998-4894-3.ch001","volume-title":"Machine Law, Ethics, and Morality in the Age of Artificial Intelligence:","author":"Roman V. Yampolskiy,","year":"2021","unstructured":"Roman V. Yampolskiy,: AI personhood: rights and laws. In: Steven John Thompson, (ed.) Machine Law, Ethics, and Morality in the Age of Artificial Intelligence:, pp. 1\u201311. IGI Global (2021). https:\/\/doi.org\/10.4018\/978-1-7998-4894-3.ch001"},{"key":"44_CR24","unstructured":"Udovich, S.: Recent developments in artificial intelligence and ip law: South Africa grants world\u2019s first patent for AI-created invention, In: National Law Review, vol. XI, no. 215, 3 August 2021"},{"key":"44_CR25","unstructured":"Tram\u00e8r, F., et al.: Stealing machine learning models via prediction {APIs}. In: 25th USENIX security symposium (USENIX Security 16) (2016)"},{"key":"44_CR26","unstructured":"Chandrasekaran, V., et al.: Exploring connections between active learning and model extraction. In: 29th USENIX Security Symposium (USENIX Security 20) (2020)"},{"key":"44_CR27","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1007\/978-3-319-21365-1_40","volume-title":"Artificial General Intelligence","author":"RV Yampolskiy","year":"2015","unstructured":"Yampolskiy, R.V.: On the limits of recursively self-improving AGI. In: Bieger, J., Goertzel, B., Potapov, A. (eds.) AGI 2015. LNCS (LNAI), vol. 9205, pp. 394\u2013403. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21365-1_40"},{"key":"44_CR28","doi-asserted-by":"crossref","unstructured":"Schwarting, M., Burton, T., Yampolskiy, R.: On the obfuscation of image sensor fingerprints. in information and computer technology (GOCICT). In: 2015 Annual Global Online Conference. IEEE (2015)","DOI":"10.1109\/GOCICT.2015.21"},{"key":"44_CR29","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3299523","author":"T Margoni","year":"2018","unstructured":"T Margoni: Artificial intelligence, machine learning and EU copyright law: Who owns AI? SSRN Electron. J. (2018). https:\/\/doi.org\/10.2139\/ssrn.3299523","journal-title":"SSRN Electron. J."}],"container-title":["Lecture Notes in Computer Science","Artificial General Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19907-3_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T07:09:24Z","timestamp":1673593764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19907-3_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031199066","9783031199073"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19907-3_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"14 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AGI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial General Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"agi2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/agi-conf.org\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"51% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,54","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13 additional posters were included","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}