Human-Centered Approaches to Fair and Responsible AI | 0 | 0.34 | 2020 |
SoK: Differential Privacy as a Causal Property | 1 | 0.36 | 2020 |
Human Comprehension of Fairness in Machine Learning. | 0 | 0.34 | 2020 |
Measuring Non-Expert Comprehension of Machine Learning Fairness Metrics | 0 | 0.34 | 2020 |
Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics. | 0 | 0.34 | 2019 |
Evaluating Anti-Fingerprinting Privacy Enhancing Technologies | 0 | 0.34 | 2019 |
Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews. | 0 | 0.34 | 2018 |
Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together. | 0 | 0.34 | 2018 |
The Effectiveness of Privacy Enhancing Technologies against Fingerprinting. | 0 | 0.34 | 2018 |
Exploring Server-side Blocking of Regions. | 1 | 0.36 | 2018 |
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. | 0 | 0.34 | 2018 |
Characterizing the Nature and Dynamics of Tor Exit Blocking | 0 | 0.34 | 2018 |
The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. | 0 | 0.34 | 2018 |
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. | 0 | 0.34 | 2018 |
Cybercasing 2.0: You Get What You Pay For. | 0 | 0.34 | 2018 |
Discrimination in Online Personalization: A Multidisciplinary Inquiry. | 0 | 0.34 | 2018 |
Differential Privacy as a Causal Property. | 0 | 0.34 | 2017 |
Exploring User Perceptions Of Discrimination In Online Targeted Advertising | 5 | 0.49 | 2017 |
SoK: Towards Grounding Censorship Circumvention in Empiricism. | 11 | 0.53 | 2016 |
Reviewer Integration and Performance Measurement for Malware Detection. | 11 | 0.63 | 2016 |
Automated Experiments on Ad Privacy Settings. | 0 | 0.34 | 2015 |
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels | 18 | 0.93 | 2015 |
Back to the Future: Malware Detection with Temporally Consistent Labels | 3 | 0.37 | 2015 |
On Modeling the Costs of Censorship. | 1 | 0.35 | 2014 |
Large-Margin Convex Polytope Machine. | 3 | 0.42 | 2014 |
Adversarial Active Learning | 3 | 0.45 | 2014 |
A Methodology for Information Flow Experiments | 1 | 0.35 | 2014 |
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. | 70 | 2.59 | 2014 |
Approaches to adversarial drift | 20 | 0.87 | 2013 |
Purpose Restrictions on Information Use. | 4 | 0.43 | 2013 |
On the Semantics of Purpose Requirements in Privacy Policies | 3 | 0.39 | 2011 |
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract) | 11 | 0.58 | 2011 |
Formal Verification of Differential Privacy for Interactive Systems | 7 | 0.45 | 2011 |
Extracting Conditional Confidentiality Policies | 3 | 0.41 | 2008 |
Towards reasonability properties for access-control policy languages | 28 | 1.28 | 2006 |
Scaling up the sample average approximation method for stochastic optimization with applications to trading agents | 6 | 0.56 | 2005 |
Verification and change-impact analysis of access-control policies | 214 | 9.41 | 2005 |
A stochastic programming approach to scheduling in TAC SCM | 18 | 2.33 | 2004 |
Botticelli: a supply chain management agent designed to optimize under uncertainty | 24 | 1.77 | 2004 |