Name
Affiliation
Papers
MICHAEL CARL TSCHANTZ
Comput. Sci. Dept., Carnegie Mellon Univ., Pittsburgh, PA|c|
39
Collaborators
Citations 
PageRank 
73
466
31.72
Referers 
Referees 
References 
1120
1089
555
Search Limit
1001000
Title
Citations
PageRank
Year
Human-Centered Approaches to Fair and Responsible AI00.342020
SoK: Differential Privacy as a Causal Property10.362020
Human Comprehension of Fairness in Machine Learning.00.342020
Measuring Non-Expert Comprehension of Machine Learning Fairness Metrics00.342020
Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.00.342019
Evaluating Anti-Fingerprinting Privacy Enhancing Technologies00.342019
Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews.00.342018
Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together.00.342018
The Effectiveness of Privacy Enhancing Technologies against Fingerprinting.00.342018
Exploring Server-side Blocking of Regions.10.362018
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability.00.342018
Characterizing the Nature and Dynamics of Tor Exit Blocking00.342018
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.00.342018
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability.00.342018
Cybercasing 2.0: You Get What You Pay For.00.342018
Discrimination in Online Personalization: A Multidisciplinary Inquiry.00.342018
Differential Privacy as a Causal Property.00.342017
Exploring User Perceptions Of Discrimination In Online Targeted Advertising50.492017
SoK: Towards Grounding Censorship Circumvention in Empiricism.110.532016
Reviewer Integration and Performance Measurement for Malware Detection.110.632016
Automated Experiments on Ad Privacy Settings.00.342015
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels180.932015
Back to the Future: Malware Detection with Temporally Consistent Labels30.372015
On Modeling the Costs of Censorship.10.352014
Large-Margin Convex Polytope Machine.30.422014
Adversarial Active Learning30.452014
A Methodology for Information Flow Experiments10.352014
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.702.592014
Approaches to adversarial drift200.872013
Purpose Restrictions on Information Use.40.432013
On the Semantics of Purpose Requirements in Privacy Policies30.392011
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract)110.582011
Formal Verification of Differential Privacy for Interactive Systems70.452011
Extracting Conditional Confidentiality Policies30.412008
Towards reasonability properties for access-control policy languages281.282006
Scaling up the sample average approximation method for stochastic optimization with applications to trading agents60.562005
Verification and change-impact analysis of access-control policies2149.412005
A stochastic programming approach to scheduling in TAC SCM182.332004
Botticelli: a supply chain management agent designed to optimize under uncertainty241.772004