<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:project = "&project;"
		xmlns:person = "&person;"
		xmlns:pub = "&pub;"
		xmlns:assert = "&assert;">
	<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/997/Study-shows-AI-generated-fake-cybersecurity-reports-fool-experts">
		<rdfs:label><![CDATA[Study shows AI-generated fake cybersecurity reports fool experts]]></rdfs:label>
		<pub:title><![CDATA[Study shows AI-generated fake cybersecurity reports fool experts]]></pub:title>
		<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-06-07T00:00:00-05:00</pub:publishedOn>
		<pub:abstract><![CDATA[There is growing concern about misinformation spreading in these critical fields as a result of common biases and practices in publishing scientific literature, even in peer-reviewed research papers. As a graduate student and as faculty members doing research in cybersecurity, we studied a new avenue of misinformation in the scientific community. We found that it’s possible for artificial intelligence systems to generate false information in critical fields like medicine and defense that is convincing enough to fool experts.]]></pub:abstract>
		<pub:note><![CDATA[DOI: <a href="https://10.64628/AAI.9eau7n3yd/> 10.64628/AAI.9eau7n3yd</a>]]></pub:note>
		<pub:counter>816</pub:counter>
		<pub:tag><![CDATA[ai]]></pub:tag>
		<pub:tag><![CDATA[cybersecurity]]></pub:tag>
		<pub:tag><![CDATA[disinformation]]></pub:tag>
		<pub:tag><![CDATA[transformers]]></pub:tag>
		<pub:booktitle><![CDATA[The Conversation]]></pub:booktitle>
		<pub:author>
			<rdf:List>
				<rdf:first>
					<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</rdf:first>
				<rdf:rest>					<rdf:List>
						<rdf:first>
							<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
						</rdf:first>
						<rdf:rest>							<rdf:List>
								<rdf:first>
									<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
								</rdf:first>
								<rdf:rest rdf:resource="&rdf;nil" />
							</rdf:List>
						</rdf:rest>
					</rdf:List>
				</rdf:rest>
			</rdf:List>
		</pub:author>
		<pub:firstAuthor>
<person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
		</pub:firstAuthor>
		<pub:softCopy><pub:SoftCopy>
			<pub:softCopyFormat><![CDATA[PDF Document]]></pub:softCopyFormat>
			<pub:softCopyURI><![CDATA[http://ebiquity.umbc.edu/get/a/publication/1113.pdf]]></pub:softCopyURI>
			<pub:softCopySize>2435248</pub:softCopySize>
			</pub:SoftCopy>
			</pub:softCopy>
	</pub:Article>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
