{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T10:00:12Z","timestamp":1771236012912,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,2,7]],"date-time":"2020-02-07T00:00:00Z","timestamp":1581033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Open Philanthropy Project"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,2,7]]},"DOI":"10.1145\/3375627.3375815","type":"proceedings-article","created":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:10:22Z","timestamp":1580865022000},"page":"173-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["The Offense-Defense Balance of Scientific Knowledge"],"prefix":"10.1145","author":[{"given":"Toby","family":"Shevlane","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]},{"given":"Allan","family":"Dafoe","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,2,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Master-Keyed Lock Vulnerability. Retrieved","author":"Blaze Matt","year":"2019","unstructured":"Matt Blaze. 2003. Master-Keyed Lock Vulnerability. Retrieved November 3, 2019, from https:\/\/www.mattblaze.org\/masterkey.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193208"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3386\/w23782"},{"key":"e_1_3_2_1_4_1","volume-title":"Strategic Implications of Openness in AI Development. Global Policy","author":"Bostrom Nick","year":"2017","unstructured":"Nick Bostrom. 2017. Strategic Implications of Openness in AI Development. Global Policy (2017). Retrieved from https:\/\/ora.ox.ac.uk\/objects\/uuid:83ea712faba3- 4176--957a-3bb4af0209d6."},{"key":"e_1_3_2_1_5_1","volume-title":"Simon Beard, Haydn Belfield, Sebastian Farquhar, Clare Lyle, Rebecca Crootof, Owain Evans, Michael Page, Joanna Bryson, Roman Yampolskiy, and Dario Amodei.","author":"Brundage Miles","year":"2018","unstructured":"Miles Brundage, Shahar Avin, Jack Clark, Helen Toner, Peter Eckersley, Ben Garfinkel, Allan Dafoe, Paul Scharre, Thomas Zeitzoff, Bobby Filar, Hyrum Anderson, Heather Roff, Gregory C. Allen, Jacob Steinhardt, Carrick Flynn, Se\u00e1n \u00d3 h\u00c9igeartaigh, Simon Beard, Haydn Belfield, Sebastian Farquhar, Clare Lyle, Rebecca Crootof, Owain Evans, Michael Page, Joanna Bryson, Roman Yampolskiy, and Dario Amodei. 2018. The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. arXiv:1802.07228 [cs.AI] (2018)."},{"key":"e_1_3_2_1_6_1","volume-title":"Retrieved","author":"Crootof Rebecca","year":"2019","unstructured":"Rebecca Crootof. 2019. Artificial Intelligence Research Needs Responsible Publication Norms. Retrieved October 26, 2019, from Lawfare website: https:\/\/www.lawfareblog.com\/artificial-intelligence-research-needsresponsible- publication-norms."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2019.1631810"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1"},{"key":"e_1_3_2_1_9_1","volume-title":"Retrieved","author":"Gokaslan Aaron","year":"2019","unstructured":"Aaron Gokaslan and Vanya Cohen. 2019. OpenGPT-2: We Replicated GPT- 2 Because You Can Too. Retrieved October 25, 2019, from Medium website: https:\/\/blog.usejournal.com\/opengpt-2-we-replicated-gpt-2-because-youcan- too-45e34e6d36dc."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2307\/2009958"},{"key":"e_1_3_2_1_11_1","volume-title":"Not Your Father's Bots: AI Is Making Fake News Look Real. Foreign Affairs","author":"Kreps Sarah","year":"2019","unstructured":"Sarah Kreps and Miles McCain. 2019. Not Your Father's Bots: AI Is Making Fake News Look Real. Foreign Affairs (2019). Retrieved from https:\/\/www. foreignaffairs.com\/articles\/2019-08-02\/not-your-fathers-bots."},{"key":"e_1_3_2_1_12_1","volume-title":"Retrieved","author":"Leibowicz Claire","year":"2019","unstructured":"Claire Leibowicz, Steven Adler, and Peter Eckersley. 2019. When Is It Appropriate to Publish High-Stakes AI Research? Retrieved October 26, 2019, from Partnership on AI website: https:\/\/www.partnershiponai.org\/when-is-it-appropriate-topublish- high-stakes-ai-research\/."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/risa.13235"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"Radford Alec","year":"2019","unstructured":"Alec Radford, Jeff Wu, Dario Amodei, Jack Clark, Miles Brundage, and Ilya Sutskever. 2019. Better Language Models and Their Implications. Retrieved October 24, 2019, from OpenAI Blog website: https:\/\/openai.com\/blog\/betterlanguage- models\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Heathrow and Gatwick invest millions in anti-drone technology. The Guardian","author":"Rawlinson Kevin","year":"2019","unstructured":"Kevin Rawlinson. 2019. Heathrow and Gatwick invest millions in anti-drone technology. The Guardian (2019). Retrieved from https:\/\/www.theguardian.com\/ world\/2019\/jan\/03\/heathrow-and-gatwick-millions-anti-drone-technology."},{"key":"e_1_3_2_1_16_1","volume-title":"Security in 2019. Retrieved","author":"Roettgers Janko","year":"2019","unstructured":"Janko Roettgers. 2019. Mark Zuckerberg Says Facebook Will Spend More Than $3.7 Billion on Safety, Security in 2019. Retrieved November 3, 2019, from Variety website: https:\/\/variety.com\/2019\/digital\/news\/facebook-2019-safety-speding- 1203128797\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/09636410903546483"},{"key":"e_1_3_2_1_18_1","volume-title":"Retrieved","author":"Socher Richard","year":"2019","unstructured":"Richard Socher. 2019. Introducing a Conditional Transformer Language Model for Controllable Generation. Retrieved October 25, 2019, from Einstein Blog website: https:\/\/blog.einstein.ai\/introducing-a-conditional-transformer-languagemodel- for-controllable-generation\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Release Strategies and the Social Impacts of Language Models. arXiv:1908.09203 [cs.CL]","author":"Solaiman Irene","year":"2019","unstructured":"Irene Solaiman, Miles Brundage, Jack Clark, Amanda Askell, Ariel Herbert-Voss, JeffWu, Alec Radford, and JasmineWang. 2019. Release Strategies and the Social Impacts of Language Models. arXiv:1908.09203 [cs.CL] (2019)."},{"key":"e_1_3_2_1_20_1","volume-title":"Thieves are now using AI deepfakes to trick companies into sending them money. Retrieved","author":"Statt Nick","year":"2019","unstructured":"Nick Statt. 2019. Thieves are now using AI deepfakes to trick companies into sending them money. Retrieved November 3, 2019, from The Verge website: https:\/\/www.theverge.com\/2019\/9\/5\/20851248\/deepfakes-ai-fake-audiophone- calls-thieves-trick-companies-stealing-money."},{"key":"e_1_3_2_1_21_1","first-page":"163","article-title":"A Model for When Disclosure Helps Security: What Is Different about Computer and Network Security Symposium - The Digital Broadband Migration: Toward a Regulatory Regime for the Internet Age","volume":"1","author":"Swire Peter P.","year":"2004","unstructured":"Peter P. Swire. 2004. A Model for When Disclosure Helps Security: What Is Different about Computer and Network Security Symposium - The Digital Broadband Migration: Toward a Regulatory Regime for the Internet Age. Journal on Telecommunications & High Technology Law 1 (2004), 163--208.","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"e_1_3_2_1_22_1","volume-title":"Why We Released Grover. The Gradient","author":"Zellers Rowan","year":"2019","unstructured":"Rowan Zellers. 2019. Why We Released Grover. The Gradient (2019). Retrieved from https:\/\/thegradient.pub\/why-we-released-grover\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Zellers Rowan","year":"2019","unstructured":"Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, and Yejin Choi. 2019. Counteracting neural disinformation with Grover. Retrieved October 25, 2019, from Medium website: https:\/\/medium.com\/ai2-blog\/counteracting-neural-disinformation-withgrover- 6cf6690d463b."},{"key":"e_1_3_2_1_24_1","volume-title":"Defending Against Neural Fake News. arXiv:1905.12616 [cs.CL]","author":"Zellers Rowan","year":"2019","unstructured":"Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, and Yejin Choi. 2019. Defending Against Neural Fake News. arXiv:1905.12616 [cs.CL] (2019)."}],"event":{"name":"AIES '20: AAAI\/ACM Conference on AI, Ethics, and Society","location":"New York NY USA","acronym":"AIES '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["Proceedings of the AAAI\/ACM Conference on AI, Ethics, and Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375627.3375815","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3375627.3375815","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:14Z","timestamp":1750199894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3375627.3375815"}},"subtitle":["Does Publishing AI Research Reduce Misuse?"],"short-title":[],"issued":{"date-parts":[[2020,2,7]]},"references-count":24,"alternative-id":["10.1145\/3375627.3375815","10.1145\/3375627"],"URL":"https:\/\/doi.org\/10.1145\/3375627.3375815","relation":{},"subject":[],"published":{"date-parts":[[2020,2,7]]},"assertion":[{"value":"2020-02-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}