How unique is your web browser? P Eckersley International Symposium on Privacy Enhancing Technologies Symposium, 1-18, 2010 | 1092 | 2010 |
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... https://arxiv.org/pdf/1802.07228, 2018 | 302 | 2018 |
On locational privacy, and how to avoid losing it forever AJ Blumberg, P Eckersley Electronic frontier foundation 10 (11), 1-7, 2009 | 121 | 2009 |
An observatory for the SSLiverse P Eckersley, J Burns Defcon, 2010 | 86* | 2010 |
Simulation of the effects of global normalization procedures in functional MRI M Gavrilescu, ME Shaw, GW Stuart, P Eckersley, ID Svalbe, GF Egan Neuroimage 17 (2), 532-542, 2002 | 85 | 2002 |
Virtual Markets for Virtual Goods: The Mirror Image of Digital Copyright? PD Eckersley Harvard Journal of Law and Technology 18 (1), 85-166, 2004 | 81 | 2004 |
Neuroscience data and tool sharing P Eckersley, GF Egan, E De Schutter, T Yiyuan, M Novak, V Sebesta, ... Neuroinformatics 1 (2), 149-165, 2003 | 62 | 2003 |
Automatic certificate management environment (ACME) R Barnes, J Hoffman-Andrews, J Kasten Internet-Draft draft-ietf-acme-acme-09, IETF Secretariat, 2017 | 52 | 2017 |
Explainable machine learning in deployment U Bhatt, A Xiang, S Sharma, A Weller, A Taly, Y Jia, J Ghosh, R Puri, ... Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020 | 51 | 2020 |
Sovereign key cryptography for internet domains P Eckersley | 42 | 2012 |
Is the SSLiverse a safe place P Eckersley, J Burns Chaos Communication Congress, 2010 | 34 | 2010 |
Toward trustworthy AI development: mechanisms for supporting verifiable claims M Brundage, S Avin, J Wang, H Belfield, G Krueger, G Hadfield, H Khlaaf, ... arXiv preprint arXiv:2004.07213, 2020 | 31 | 2020 |
Roadmap to pandemic resilience: massive scale testing, tracing, and supported isolation (TTSI) as the path to pandemic resilience for a free society D Allen, S Block, J Cohen, P Eckersley, M Rosenthal Safra Center for Ethics at Harvard University 20, 2020 | 30 | 2020 |
Iranian hackers obtain fraudulent HTTPS certificates: How close to a Web security meltdown did we get P Eckersley Electronic Frontier Foundation 23, 2011 | 30 | 2011 |
Ó hÉigeartaigh M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... S., Beard, S., Belfield, H., Farquhar, S., Lyle, C., Crootof, R., Evans, O …, 2018 | 27 | 2018 |
Packet forgery by ISPs: A report on the Comcast affair P Eckersley, F von Lohmann, S Schoen Electronic Frontier Foundation, 2007 | 27 | 2007 |
A primer on information theory and privacy P Eckersley Electronic Frontier Foundation, 2010 | 23 | 2010 |
Outpacing the virus: digital response to containing the spread of COVID-19 while mitigating privacy risks V Hart, D Siddarth, B Cantrell, L Tretikov, P Eckersley, J Langford, ... Safra Center for Ethics, 2020 | 21 | 2020 |
Impossibility and Uncertainty Theorems in AI Value Alignment (or why your AGI should not have a utility function) P Eckersley arXiv preprint arXiv:1901.00064, 2018 | 20 | 2018 |
The Malicious Use of Artificial Intelligence: Forecasting M Brundage, S Avin, J Clark, H Toner, P Eckersley, B Garfinkel, A Dafoe, ... Prevention, and Mitigation, 2018 | 20 | 2018 |