Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Law and Society

PDF

Articles, Book Chapters, & Popular Press

2020

Privacy

Articles 1 - 2 of 2

Full-Text Articles in Law

Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn Jan 2020

Identity Manipulation: Responding To Advances In Artificial Intelligence And Robotics, Suzie Dunn

Articles, Book Chapters, & Popular Press

Advances in artificial intelligence (AI) and robotics technologies have destabilized our ability to control our identity. Today, it is increasingly accessible for the average person to appropriate the voice, image, and body of another individual through the use of technology. Deepfake videos swap new faces into existing videos, facial re-enactment allows for the face of one person to be superimposed on the face of someone else in a real time video, artificial speech synthesis can clone another person’s voice, and 3D printing and modern robotics can reproduce life-size copies of living people. These are all examples of the ways technology …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …