"Unlimited Realm of Exploration and Experimentation": Methods and Motivations of AI-Generated Sexual Content Creators
Pith reviewed 2026-05-21 14:52 UTC · model grok-4.3
The pith
Interviews with 28 AI-generated sexual content creators reveal motivations spanning personal sexual exploration, creative expression, technical experimentation, and occasional production of non-consensual images.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Through interviews with 28 creators who range from casual hobbyists to entrepreneurs and moderators of large online communities, the work establishes that AI-generated sexual content production serves multiple distinct purposes, including sexual exploration, creative expression, technical experimentation, and in a small number of cases the generation of non-consensual intimate imagery.
What carries the argument
Semi-structured interviews with 28 self-selected AIG-SC creators recruited from online communities, used to surface and categorize their stated methods and motivations.
If this is right
- Governance efforts should differentiate between the majority of creators focused on exploration or creativity and the minority who produce non-consensual images.
- Platform policies and AI tool design can target safeguards for non-consensual imagery while preserving space for consensual creative and technical uses.
- The same foundation models and applications that enable personal experimentation also lower barriers for harmful content, requiring layered rather than blanket restrictions.
Where Pith is reading between the lines
- The findings imply that future work could test whether similar motivational patterns appear in creators of non-sexual AI-generated imagery.
- Regulatory discussions might benefit from distinguishing hobbyist communities from commercial operators when setting liability rules.
- Technical interventions such as consent-verification layers could be explored to reduce NCII without blocking other reported uses.
Load-bearing premise
The people who volunteered for interviews accurately described their own activities and reasons without significant distortion from social pressure or self-presentation concerns.
What would settle it
A larger-scale survey or analysis of public activity logs that finds the majority of AI-generated sexual content production is driven by motives not mentioned in the interviews, such as direct commercial sale of the content itself, would undermine the reported spectrum.
read the original abstract
AI-generated media is radically changing the way content is both consumed and produced on the internet, and in no place is this potentially more visible than in sexual content. AI-generated sexual content (AIG-SC) is increasingly enabled by an ecosystem of individual AI developers, specialized third-party applications, and foundation model providers. AIG-SC raises a number of concerns from older debates about the line between pornography and obscenity to newer debates about fair use and labor displacement (in this case, of sex workers), and has spurred new regulations to curb the spread of non-consensual intimate imagery (NCII) created using the same technology used to create AIG-SC. However, despite the growing prevalence of AIG-SC, little is known about its creators, their motivations, and what types of content they produce. To inform effective governance in this space, we conducted an in-depth study to understand what AIG-SC creators make, along with how and why they make it. Interviews with 28 AIG-SC creators, ranging from hobbyists to entrepreneurs to those who moderate communities of hundreds of thousands of other creators, revealed a wide spectrum of motivations, including sexual exploration, creative expression, technical experimentation, and in a handful of cases, the creation of NCII.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The paper reports findings from semi-structured interviews with 28 creators of AI-generated sexual content (AIG-SC). It describes the ecosystem of individual developers, third-party tools, and foundation models enabling such content, and identifies a spectrum of motivations including sexual exploration, creative expression, technical experimentation, and in a small number of cases the production of non-consensual intimate imagery (NCII). The work positions these insights as relevant for informing governance and regulation.
Significance. If the methodological limitations are resolved, the study supplies timely qualitative evidence on an emerging domain of AI use that intersects with ongoing policy debates around NCII, fair use, and labor impacts. The range of participant roles (hobbyists to community moderators) provides useful breadth to the reported motivations.
major comments (2)
- [Methods] Methods section: the description of recruitment, sampling frame, response rate, interview protocol, and thematic analysis procedures is insufficiently detailed. This leaves the risk of selection bias in the self-selected online-community sample unquantified and weakens the evidential basis for the claimed spectrum of motivations.
- [Results and Discussion] Results and Discussion: the finding that NCII creation occurs 'in a handful of cases' rests entirely on self-reported data. No information is provided on anonymity assurances, screening for social desirability bias, or any corroboration steps, which is a load-bearing concern for claims involving potentially illegal activities.
minor comments (1)
- [Abstract] The abstract and introduction could more explicitly state the study's qualitative and exploratory scope to manage reader expectations about generalizability.
Simulated Author's Rebuttal
We thank the referee for their constructive comments, which highlight important areas for improving transparency in our qualitative study. We address each major comment below and have made revisions to the manuscript to incorporate additional methodological details and caveats.
read point-by-point responses
-
Referee: [Methods] Methods section: the description of recruitment, sampling frame, response rate, interview protocol, and thematic analysis procedures is insufficiently detailed. This leaves the risk of selection bias in the self-selected online-community sample unquantified and weakens the evidential basis for the claimed spectrum of motivations.
Authors: We agree that the Methods section requires expansion for greater transparency. In the revised manuscript, we will add specifics on recruitment channels (online communities and forums where calls for participants were posted), the purposive sampling strategy used to capture a range of creator roles, the semi-structured interview protocol with its core question domains, and the thematic analysis procedures including codebook development and iterative theme refinement. Because recruitment occurred via open online advertisements without a closed sampling frame, a conventional response rate cannot be computed; we will explicitly state this limitation and describe steps taken to broaden participation across hobbyist, entrepreneurial, and moderator perspectives. These changes will better situate the reported motivations while acknowledging the inherent constraints of studying this population. revision: yes
-
Referee: [Results and Discussion] Results and Discussion: the finding that NCII creation occurs 'in a handful of cases' rests entirely on self-reported data. No information is provided on anonymity assurances, screening for social desirability bias, or any corroboration steps, which is a load-bearing concern for claims involving potentially illegal activities.
Authors: We accept that greater detail on data collection safeguards is needed. The revised Methods section will describe the anonymity and confidentiality measures employed, including pseudonym use, non-collection of identifying details, and secure encrypted storage. We did not apply dedicated screening instruments for social desirability bias, a common limitation in qualitative interviews on sensitive topics, and will note this explicitly. Corroboration was not feasible or appropriate under our IRB protocol, as it would risk breaching privacy or requiring access to private content. We will add a Limitations subsection discussing reliance on self-reports for this finding and will qualify the NCII observation more cautiously in Results and Discussion as exploratory and based on a small number of disclosures. revision: yes
Circularity Check
No significant circularity; claims rest on primary interview data
full rationale
The paper reports findings from semi-structured interviews with 28 AIG-SC creators recruited via online communities. The central claims about motivations (sexual exploration, creative expression, technical experimentation, and NCII in a handful of cases) are derived directly from thematic analysis of participant accounts rather than any mathematical derivation, fitted parameters, or self-referential predictions. No equations, self-definitional constructs, or load-bearing self-citations appear in the provided abstract or reader's summary. The study is self-contained as an empirical qualitative investigation relying on primary data collection, with no reduction of results to inputs by construction.
Axiom & Free-Parameter Ledger
Forward citations
Cited by 1 Pith paper
-
Characterizing Resource Sharing Practices on Underground Internet Forum Synthetic Non-Consensual Intimate Image Content Creation Communities
An empirical study of 4chan and Reddit data shows that users of varying technical skill share primary resources for SNCII creation and secondary resources for dissemination, with knowledge transfer from experts to new...
Reference graph
Works this paper leans on
- [1]
-
[2]
Enough abuse. 2025. State Laws Criminalizing AI-generated or Computer-Edited CSAM
work page 2025
-
[3]
Stability AI. 2025. Acceptable Use Policy
work page 2025
-
[4]
Davey Alba and Cecilia D’Anastasio. 2024. Google Works to Reduce Non-Consensual Deepfake Porn in Search. Published: Bloomberg News
work page 2024
-
[5]
Apryl A Alexander. 2019. Sex for all: Sex positivity and intersectionality in clinical and counseling psychology.Journal of Black Sexuality and Relationships6, 1 (2019), 49–72
work page 2019
-
[6]
American Psychological Association. [n. d.]. Heteronormativity
-
[7]
Arnaud Anciaux and Julie A. Gramaccia. 2025. Imagining markets and crafting value: the emergence of an AI-generated pornographic content ecosystem.Porn Studies(May 2025), 1–16. doi:10.1080/23268743.2025.2492332
-
[8]
Anonymous, Danbooru community, and Gwern Branwen. 2022. Danbooru2021: A Large-Scale Crowdsourced & Tagged Anime Illustration Dataset
work page 2022
-
[9]
2023.Identity construction in the furry fandom
Jessica R Austin. 2023.Identity construction in the furry fandom. PhD Thesis. Anglia Ruskin Research Online (ARRO)
work page 2023
-
[10]
Unlimited Realm of Exploration and Experimentation
Anonymous Authors. 2025. “Unlimited Realm of Exploration and Experimentation”: Methods, Motivations, and Boundaries of Creators of AI-Generated Sexual Content - Replication Package
work page 2025
-
[11]
Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, and Kui Ren. 2024. Surrogateprompt: Bypassing the safety filter of text-to-image models via substitution. InProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. 1166–1180
work page 2024
-
[12]
Linda R Baggett, Ethan Eisen, Sara Gonzalez-Rivas, Lacy A Olson, Rebecca P Cameron, and Linda R Mona. 2017. Sex-positive assessment and treatment among female trauma survivors.Journal of clinical psychology73, 8 (2017), 965–974
work page 2017
-
[13]
Margaret Baldwin. 1984. The sexuality of inequality: The Minneapolis pornography ordinance.Law & Ineq.2 (1984), 629
work page 1984
-
[14]
Andrew Beck. 2024. Anti-Abortion Extremists Want to Use the 150-Year-Old Comstock Act to Ban Abortion Nationwide. (May 2024). Published: American Civil Liberties Union
work page 2024
-
[15]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology.Qualitative research in psychology3, 2 (2006), 77–101
work page 2006
-
[16]
Natalie Grace Brigham, Miranda Wei, Tadayoshi Kohno, and Elissa M Redmiles. 2024. " Violation of my {body:}" Perceptions of {AI-generated} non-consensual (intimate) imagery. InTwentieth Symposium on Usable Privacy and Security (SOUPS 2024). 373–392
work page 2024
-
[17]
Yvette Butler, Chibundo Egwuatu, Matthew Canham, and Ben D. Sawyer. 2025. Sex worker human digital twins and intellectual property: on collaborative futures for sex thinkers, technologists, and lawyers.Porn Studies(April 2025), 1–16. doi:10.1080/23268743.2025.2466612
-
[18]
Moira Carmody. 2005. Ethical erotics: Reconceptualizing anti-rape education.Sexualities8, 4 (2005), 465–480
work page 2005
-
[19]
Center for Democracy & Technology. 2025. TAKE IT DOWN Act Sign-On Letter: Concerns Regarding S. 146. Published: PDF letter submitted to U.S. Senate
work page 2025
-
[20]
Unlimited Realm of Exploration and Experimentation
Bilva Chandra, Jesse Dunietz, and Kathleen Roberts. 2024. Reducing Risks Posed by Synthetic Content An Overview of Technical Approaches to Digital Content Transparency. doi:10.6028/NIST.AI.100-4 PREPRINT. “Unlimited Realm of Exploration and Experimentation”: Methods and Motivations of AI-Generated Sexual Content Creators 25
-
[21]
Cohee and Ross. 2025. SillyTavern. https://sillytavernai.com/
work page 2025
-
[22]
Comfy Org. 2025. Comfy UI. https://www.comfy.org/
work page 2025
-
[23]
2019.Sex therapy with erotically marginalized clients: Nine principles of clinical support
Damon Constantinides, Shannon Sennott, and Davis Chandler. 2019.Sex therapy with erotically marginalized clients: Nine principles of clinical support. Routledge
work page 2019
-
[24]
2006.Using verbatim quotations in reporting qualitative social research: researchers’ views
Anne Corden, Roy Sainsbury, and others. 2006.Using verbatim quotations in reporting qualitative social research: researchers’ views. University of York York
work page 2006
-
[25]
Gloria Cowan, Carole Lee, Daniella Levy, and Debra Snyder. 1988. Dominance and inequality in X-rated videocassettes.Psychology of Women Quarterly12, 3 (1988), 299–311
work page 1988
-
[26]
Malcolm Cowburn. 2005. Confidentiality and public protection: Ethical dilemmas in qualitative research with adult male sex offenders.Journal of sexual aggression11, 1 (2005), 49–63
work page 2005
-
[27]
Ana-Maria Cretu, Klim Kireev, Amro Abdalla, Wisdom Obinna, Raphael Meier, Sarah Adel Bargal, Elissa M. Redmiles, and Carmela Troncoso. 2025. Evaluating Concept Filtering Defenses against Child Sexual Abuse Material Generation by Text-to-Image Models. https://arxiv.org/abs/2512.05707 _eprint: 2512.05707
work page internal anchor Pith review Pith/arXiv arXiv 2025
-
[28]
Iliana Depounti, Paula Saukko, and Simone Natale. 2023. Ideal technologies, ideal women: AI and gender imaginaries in Redditors’ discussions on the Replika bot girlfriend.Media, Culture & Society45, 4 (May 2023), 720–736. doi:10.1177/01634437221119021
-
[29]
Brenda Dvoskin. 2023. Speaking Back to Sexual Privacy Invasions.SSRN Electronic Journal(2023). doi:10.2139/ssrn.4380748
-
[30]
Nicola M Döring. 2009. The Internet’s impact on sexuality: A critical review of 15 years of research.Computers in Human Behavior25, 5 (2009), 1089–1101
work page 2009
-
[31]
Asia A. Eaton, Adrian J. Scott, Asher Flynn, and Anastasia Powell. 2026. Perceptions of sexualized deepfake abuse across three nations: An exploration of how victim gender and race shape attitudes towards deepfake abuse in the United States, the United Kingdom, and Australia. Computers in Human Behavior177 (April 2026), 108899. doi:10.1016/j.chb.2025.108899
-
[32]
Benj Edwards. 2025. ChatGPT Can Now Write Erotica as OpenAI Eases Up on AI Paternalism
work page 2025
-
[33]
Serge Egelman, Cormac Herley, and Paul C Van Oorschot. 2013. Markets for zero-day exploits: Ethics and implications. InProceedings of the 2013 New Security Paradigms Workshop. 41–46
work page 2013
-
[34]
Emanuel Maiberg. 2023. Inside the AI Porn Marketplace Where Everything and Everyone Is for Sale.404 Media(Aug. 2023). https://www.404media. co/inside-the-ai-porn-marketplace-where-everything-and-everyone-is-for-sale/
work page 2023
-
[35]
Emanuel Maiberg and Jason Koebler. 2024. Inside the Booming ’AI Pimping’ Industry.404 Media(Nov. 2024). https://www.404media.co/inside- the-booming-ai-pimping-industry-3/
work page 2024
-
[36]
FBI. 2024. Child Sexual Abuse Material Created by Generative AI and Similar Online Tools is Illegal
work page 2024
-
[37]
Dawn Fisher. 2002. Adult sex offenders: who are they? Why and how do they do it? InSexual offending against children. Routledge, 1–24
work page 2002
-
[38]
Asher Flynn, Elena Cama, Anastasia Powell, and Adrian J. Scott. 2023. Victim-blaming and image-based sexual abuse.Journal of Criminology56, 1 (2023), 7–25. doi:10.1177/26338076221135327 _eprint: https://doi.org/10.1177/26338076221135327
-
[39]
Asher Flynn, Anastasia Powell, Asia Eaton, and Adrian J. Scott. 2025. Sexualized Deepfake Abuse: Perpetrator and Victim Perspectives on the Motivations and Forms of Non-Consensually Created and Shared Sexualized Deepfake Imagery.Journal of Interpersonal Violence(Sept. 2025), 08862605251368834. doi:10.1177/08862605251368834
-
[40]
Agence France-Presse. 2025. OpenAI will allow verified adults to use ChatGPT to generate erotic content
work page 2025
-
[41]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology. InProceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, Montreal QC Canada, 1–13. doi:10.1145/3173574.3174241
-
[42]
P Brooks Fuller, Kyla P Garrett Wagner, and Farnosh Mazandarani. 2019. Porn wars: Serious value, social harm, and the burdens of modern obscenity doctrine.Am. UJ Gender Soc. Pol’y & L.28 (2019), 121
work page 2019
-
[43]
Deep Ganguli, Liane Lovitt, Jackson Kernion, Amanda Askell, Yuntao Bai, Saurav Kadavath, Ben Mann, Ethan Perez, Nicholas Schiefer, Kamal Ndousse, and others. 2022. Red teaming language models to reduce harms: Methods, scaling behaviors, and lessons learned.arXiv preprint arXiv:2209.07858(2022)
work page internal anchor Pith review Pith/arXiv arXiv 2022
-
[44]
PA Office of Attorney General. 2025. AG Sunday Leads Bipartisan Coalition Urging Search Engine, Payment App Companies to Stop the Spread of ‘Deepfake’ Videos and Photos
work page 2025
-
[45]
Cassidy Gibson, Daniel Olszewski, Natalie Grace Brigham, Anna Crowder, Kevin RB Butler, Patrick Traynor, Elissa M Redmiles, and Tadayoshi Kohno. 2025. Analyzing the {AI} Nudification Application Ecosystem. In34th USENIX Security Symposium (USENIX Security 25). 1–20
work page 2025
- [46]
-
[47]
Trystan S Goetze. 2024. AI art is theft: Labour, extraction, and exploitation: Or, on the dangers of stochastic Pollocks. InProceedings of the 2024 ACM Conference on Fairness, Accountability, and Transparency. 186–196
work page 2024
-
[48]
Google. 2025. Gemini App Policy Guidelines
work page 2025
-
[49]
Joshua B Grubbs, Christopher G Floyd, and Shane W Kraus. 2023. Pornography use and public health: examining the importance of online sexual behavior in the health sciences.American Journal of Public Health113, 1 (2023), 22–26. PREPRINT. Manuscript submitted to ACM 26 Mink et al
work page 2023
-
[50]
Joshua B Grubbs and Shane W Kraus. 2021. Pornography use and psychological science: A call for consideration.Current Directions in Psychological Science30, 1 (2021), 68–75. Publisher: Sage Publications Sage CA: Los Angeles, CA
work page 2021
-
[51]
Rose E Guingrich and Michael S A Graziano. 2025. Chatbots as Social Companions: How People Perceive Consciousness, Human Likeness, and Social Health Benefits in Machines. InOxford Intersections: AI in Society(1 ed.), Philipp Hacker (Ed.). Oxford University PressOxford. doi:10.1093/9780198945215.003.0011
-
[52]
Catherine Han, Anne Li, Deepak Kumar, and Zakir Durumeric. 2025. Characterizing the {MrDeepFakes} Sexual Deepfake Marketplace. In34th USENIX Security Symposium (USENIX Security 25). 5169–5188
work page 2025
-
[53]
Replika Removing Erotic Role-Play Is Like Grand Theft Auto Removing Guns or Cars
Kenneth R. Hanson and Hannah Bolthouse. 2024. “Replika Removing Erotic Role-Play Is Like Grand Theft Auto Removing Guns or Cars”: Reddit Discourse on Artificial Intelligence Chatbots and Sexual Technologies.Socius: Sociological Research for a Dynamic World10 (Jan. 2024), 23780231241259627. doi:10.1177/23780231241259627
-
[54]
Guy Harling, Michael M Chanda, Katrina F Ortblad, Magdalene Mwale, Steven Chongo, Catherine Kanchele, Nyambe Kamungoma, Leah G Barresi, Till Bärnighausen, and Catherine E Oldenburg. 2019. The influence of interviewers on survey responses among female sex workers in Zambia. BMC medical research methodology19, 1 (2019), 60
work page 2019
-
[55]
Will Hawkins, Brent Mittelstadt, and Chris Russell. 2025. Deepfakes on Demand: The rise of accessible non-consensual deepfake image generators. InProceedings of the 2025 ACM Conference on Fairness, Accountability, and Transparency (FAccT ’25). Association for Computing Machinery, New York, NY, USA, 1602–1614. doi:10.1145/3715275.3732107
-
[56]
Jeff Hearn, Kjerstin Andersson, and Malcolm Cowburn. 2007. Background paper on guidelines for researchers on doing research with perpetrators of sexual violence. (2007)
work page 2007
-
[57]
Nicola Henry and Gemma Beard. 2024. Image-based sexual abuse perpetration: A scoping review.Trauma, Violence, & Abuse25, 5 (2024), 3981–3998
work page 2024
-
[58]
Nicola Henry, Clare McGlynn, Asher Flynn, Kelly Johnson, Anastasia Powell, and Adrian J. Scott. 2021.Image-based sexual abuse: A study on the causes and consequences of non-consensual nude or sexual imagery. Routledge, Abingdon, Oxon
work page 2021
-
[59]
Cara Herbitter, Michelle D Vaughan, and David W Pantalone. 2024. Mental health provider bias and clinical competence in addressing asexuality, consensual non-monogamy, and BDSM: A narrative review.Sexual and Relationship Therapy39, 1 (2024), 131–154
work page 2024
-
[60]
Leo Herrera. 2025. Synthetic Genres 2. https://leoherrera.substack.com/p/synthetic-genres-2
work page 2025
-
[61]
Thomas J Holt. 2005.Hacks, cracks, and crime: An examination of the subculture and social organization of computer hackers. University of Missouri-Saint Louis
work page 2005
-
[62]
2017.The cert guide to coordinated vulnerability disclosure
Allen D Householder, Garret Wassermann, Art Manion, and Chris King. 2017.The cert guide to coordinated vulnerability disclosure. Technical Report
work page 2017
-
[63]
Edward J Hu, Yelong Shen, Phillip Wallis, Zeyuan Allen-Zhu, Yuanzhi Li, Shean Wang, Lu Wang, and Weizhu Chen. 2022. Lora: Low-rank adaptation of large language models.ICLR(2022)
work page 2022
-
[64]
2012.Ethical and safety recommendations for research on perpetration of sexual violence
Sexual Violence Research Initiative, Rachel Jewkes, Elizabeth Dartnall, Yandisa Sikweyiya, and others. 2012.Ethical and safety recommendations for research on perpetration of sexual violence. Sexual Violence Research Initiative, Medical Research Council
work page 2012
-
[65]
2023.How AI is being abused to create child sexual abuse imagery
Internet Watch Foundation. 2023.How AI is being abused to create child sexual abuse imagery. Technical Report. Internet Watch Foundation
work page 2023
-
[66]
Chantelle Ivanski and Taylor Kohut. 2017. Exploring definitions of sex positivity through thematic analysis.The Canadian Journal of Human Sexuality26, 3 (2017), 216–225
work page 2017
-
[67]
Harry H. Jiang, Lauren Brown, Jessica Cheng, Mehtab Khan, Abhishek Gupta, Deja Workman, Alex Hanna, Johnathan Flowers, and Timnit Gebru
-
[68]
InProceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society
AI Art and its Impact on Artists. InProceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society. ACM, Montréal QC Canada, 363–374. doi:10.1145/3600211.3604681
-
[69]
Josefina Jiménez Aceves and Laura Tarzia. 2024. Understanding the perspectives and experiences of male perpetrators of sexual violence against women: A scoping review and thematic synthesis.Trauma, Violence, & Abuse25, 4 (2024), 3226–3240
work page 2024
-
[70]
2004.Hacktivism and cyberwars: Rebels with a cause?Routledge
Tim Jordan and Paul Taylor. 2004.Hacktivism and cyberwars: Rebels with a cause?Routledge
work page 2004
-
[71]
Yuval Karniel and Haim Wismonsky. 2004. Pornography, Community and the Internet-Freedom of Speech and Obscenity on the Internet.Rutgers Computer & Tech. LJ30 (2004), 105
work page 2004
- [72]
-
[73]
Chuck Kleinhans. 2006. The Change from Film to Video Pornography: Implications for Analysis. InPornography: Film and Culture, Peter Lehman (Ed.). Rutgers University Press, New Brunswick, NJ, 154–167
work page 2006
-
[74]
Tadayoshi Kohno, Yasemin Acar, and Wulf Loh. 2023. Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations. InUSENIX Security
work page 2023
- [75]
-
[76]
Six Silberman, Reuben Binns, Jun Zhao, and Asia J
Lin Kyi, Amruta Mahuli, M. Six Silberman, Reuben Binns, Jun Zhao, and Asia J. Biega. 2025. Governance of Generative AI in Creative Work: Consent, Credit, Compensation, and Beyond. InProceedings of the 2025 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama Japan, 1–16. doi:10.1145/3706598.3713799
-
[77]
Unlimited Realm of Exploration and Experimentation
Kyle Wiggers and Amanda Silberling. 2022. Meet Unstable Diffusion, the group trying to monetize AI porn generators.TechCrunch(Nov. 2022). https://techcrunch.com/2022/11/17/meet-unstable-diffusion-the-group-trying-to-monetize-ai-porn-generators/ PREPRINT. “Unlimited Realm of Exploration and Experimentation”: Methods and Motivations of AI-Generated Sexual C...
work page 2022
-
[78]
Linnea Laestadius, Andrea Bishop, Michael Gonzalez, Diana Illenčík, and Celeste Campos-Castillo. 2024. Too human and not human enough: A grounded theory analysis of mental health harms from emotional dependence on the social chatbot Replika.New Media & Society26, 10 (Oct. 2024), 5923–5941. doi:10.1177/14614448221142007
-
[79]
1984.Hackers: Heroes of the computer revolution
Steven Levy. 1984.Hackers: Heroes of the computer revolution. Vol. 14. Anchor Press/Doubleday Garden City, NY
work page 1984
-
[80]
Li Fe-Fei, Fergus, and Perona. 2003. A Bayesian approach to unsupervised one-shot learning of object categories. InProceedings Ninth IEEE International Conference on Computer Vision. IEEE, Nice, France, 1134–1141 vol.2. doi:10.1109/ICCV.2003.1238476
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.