{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:42:47Z","timestamp":1730342567993,"version":"3.28.0"},"reference-count":59,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T00:00:00Z","timestamp":1653955200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,31]]},"DOI":"10.23919\/cycon55549.2022.9811008","type":"proceedings-article","created":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T16:09:32Z","timestamp":1656950972000},"page":"155-171","source":"Crossref","is-referenced-by-count":2,"title":["Subverting Skynet: The Strategic Promise of Lethal Autonomous Weapons and the Perils of Exploitation"],"prefix":"10.23919","author":[{"given":"Lennart","family":"Maschmeyer","sequence":"first","affiliation":[{"name":"ETH Zurich,Center for Security Studies,Zurich,Switzerland"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.172"},{"key":"ref38","article-title":"SECNAV: F-35C Should Be Navy&#x2019;s Last Manned Strike Jet","author":"myers","year":"2015","journal-title":"Navy Times"},{"key":"ref33","article-title":"DeepBio&#x2019;s AI-Based Prostate Cancer Pathology Diagnosis Wins New Tech Certification","author":"lee","year":"2021","journal-title":"KBR"},{"journal-title":"Artificial Intelligence in the Age of Neural Networks and Brain Computing","year":"2019","author":"kozma","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1162\/ISEC_a_00138"},{"key":"ref30","article-title":"How a Piece of Tape Tricked a Tesla into Reading a 35MPH Sign as 85MPH","author":"keck","year":"2020","journal-title":"Gizmodo"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1162\/isec_a_00418"},{"key":"ref36","article-title":"Information Technology and Military Power","author":"lindsay","year":"2020","journal-title":"Cornell Studies in Security Affairs"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/09636412.2013.816122"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2018.8433167"},{"journal-title":"Artificial Intelligence International Competition and the Balance of Power (May 2018)","year":"2018","author":"horowitz","key":"ref28"},{"key":"ref27","article-title":"Carnegie Mellon Dean of Computer Science on the Future of AI","author":"high","year":"2017","journal-title":"Forbes"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2019.1621174"},{"journal-title":"DeepMind","article-title":"AlphaStar: Grandmaster Level in StarCraft II Using Multi-Agent Reinforcement Learning","year":"2019","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2010.489700"},{"key":"ref20","article-title":"Centaur Army: Bob Work, Robotics, and the Third Offset Strategy","author":"freedberg","year":"2015","journal-title":"Breaking Defense"},{"key":"ref22","article-title":"Whoever Leads in Artificial Intelligence in 2030 Will Rule the World until 2100","author":"gill","year":"2020","journal-title":"Brookings (blog)"},{"key":"ref21","article-title":"Who Putin Thinks Will Rule the World","author":"gigova","year":"2017","journal-title":"CNN"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/isec_a_00425"},{"journal-title":"Back Door for Hackers? F-35 Cyber Weaknesses in the Spotlight","year":"2019","key":"ref23"},{"key":"ref26","article-title":"Deep Learning Scaling Is Predictable, Empirically","author":"hestness","year":"2017","journal-title":"arXiv 1712 00409 [cs stat]"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511521737"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2020.551299"},{"journal-title":"Stopping Killer Robots","year":"2020","key":"ref51"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-021-21466-z"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3116866"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.23919\/CyCon49761.2020.9131717"},{"key":"ref56","first-page":"89","article-title":"Laws and Lawyers: Lethal Autonomous Weapons Bring LOAC Issues to the Design Table, and Judge Advocates Need to Be There","volume":"228","author":"vazquez","year":"2019","journal-title":"Military Law Review"},{"journal-title":"Directive 3000 09","article-title":"Autonomy in Weapons Systems","year":"2017","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-019-00879-x"},{"key":"ref53","article-title":"The Feasibility and Inevitability of Stealth Attacks","author":"tyukin","year":"2021","journal-title":"ArXiv 2106 13997 [Cs]"},{"key":"ref52","article-title":"Best Public Datasets for Machine Learning and Data Science","author":"ai","year":"2021","journal-title":"Medium"},{"key":"ref10","article-title":"Intelligence, Espionage, Counterespionage and Covert Operations: A Guide to Information Sources","volume":"2","author":"blackstock","year":"1978","journal-title":"International Relations Information Guide Series"},{"journal-title":"Neural Network Fundamentals with Graphs Algorithms and Applications","year":"1996","author":"bose","key":"ref11"},{"journal-title":"NATO 2030 United for a New Era","year":"2020","key":"ref40"},{"journal-title":"Superintelligence Paths Dangers Strategies","year":"2014","author":"bostrom","key":"ref12"},{"key":"ref13","article-title":"In Defense of Killer Robots","author":"brooks","year":"2015","journal-title":"Foreign Policy (blog)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.4159\/9780674246010"},{"key":"ref15","article-title":"The Terminator","author":"cameron","year":"1984","journal-title":"Action \/ science-fiction film Orion Pictures"},{"key":"ref16","article-title":"Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning","author":"chen","year":"2017","journal-title":"arXiv 1712 05526"},{"key":"ref17","article-title":"Attacking Artificial Intelligence","author":"comiter","year":"2019","journal-title":"Harvard Kennedy School Belfer Center for Science and International Affairs"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00175"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.orbis.2017.05.003"},{"journal-title":"The Sword and The Shield The Mitrokhin Archive and The Secret History of The KGB","year":"1999","author":"andrew","key":"ref4"},{"journal-title":"The Mitrokhin Archive The KGB in Europe and the West","year":"2000","author":"andrew","key":"ref3"},{"key":"ref6","first-page":"889","article-title":"The Artificial Intelligence Black Box and the Failure of Intent and Causation","volume":"31","author":"bathaee","year":"2017","journal-title":"Harvard Journal of Law & Technology (Harvard JOLT)"},{"key":"ref5","article-title":"Synthesizing Robust Adversarial Examples","author":"athalye","year":"2018","journal-title":"arXiv 1707 07397"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt7s19h"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(92)90013-P"},{"journal-title":"New Imaging Technology May Reduce Need for Skin Biopsies","year":"2021","key":"ref49"},{"key":"ref9","article-title":"Anomaly Localization in Model Gradients Under Backdoor Attacks against Federated Learning","author":"bilgin","year":"2021","journal-title":"ArXiv 2111 14683 [Cs]"},{"journal-title":"Defense Primer U S Policy on Lethal Autonomous Weapon Systems","year":"2020","author":"sayler","key":"ref46"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1080\/15027570.2018.1481907"},{"journal-title":"Army of None Autonomous Weapons and the Future of War","year":"2018","author":"scharre","key":"ref48"},{"key":"ref47","article-title":"A Million Mistakes a Second","author":"scharre","year":"2018","journal-title":"Foreign Policy (blog)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2018.1518374"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2015.7298640"},{"key":"ref44","article-title":"Towards Practical Deployment-Stage Backdoor Attack on Deep Neural Networks","author":"qi","year":"2021","journal-title":"ArXiv 2111 12965 [Cs]"},{"key":"ref43","article-title":"Why the Next Fighter Will Be Manned, and the One after That","author":"pietrucha","year":"2015","journal-title":"War on the Rocks (blog)"}],"event":{"name":"2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)","start":{"date-parts":[[2022,5,31]]},"location":"Tallinn, Estonia","end":{"date-parts":[[2022,6,3]]}},"container-title":["2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9810978\/9810902\/09811008.pdf?arnumber=9811008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T17:49:52Z","timestamp":1661795392000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9811008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,31]]},"references-count":59,"URL":"https:\/\/doi.org\/10.23919\/cycon55549.2022.9811008","relation":{},"subject":[],"published":{"date-parts":[[2022,5,31]]}}}