|The malicious use of artificial intelligence: Forecasting, prevention, and mitigation|
M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ...
arXiv preprint arXiv:1802.07228, 2018
|Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims|
M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ...
arXiv preprint arXiv:2004.07213, 2020
|Beyond the AI Arms Race: America, China, and the dangers of zero-sum thinking|
R Zwetsloot, H Toner, J Ding
Foreign Affairs, 2018
|Can China Grow Its Own AI Tech Base?|
L Laskai, H Toner
AI Policy and China: Realities of State-Led Development, 3-8, 2019
|Testimony before the U.S.-China Economic and Security Review Commission on “Technology, Trade, and Military-Civil Fusion: China’s Pursuit of Artificial Intelligence, New …|
https://www.uscc.gov/sites/default/files/June%207%20Hearing_Panel%201_Helen …, 2019