Publications
Found 25 results
Author Title Type [ Year] Filters: Author is Michael Carl Tschantz [Clear All Filters]
A Mathematical Model of Contextual Integrity.
ICSI Technical Report.
(2023). Human Comprehension of Fairness in Machine Learning.
AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
(2020). Human-Centered Approaches to Fair and Responsible AI.
CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
(2020).
(2019).
Evaluating Anti-Fingerprinting Privacy Enhancing Technologies.
Proceedings of the WWW'19 (World Wide Web Conference).
(2019). Privacy Concerns of Multimodal Sensor Systems.
The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
(2019). The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
(2018).
(2018).
(2018). Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews.
Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
(2018).
(2018). Assessing user perceptions of online targeted advertising.
Proceedings of USENIX Security 2017.
(2017). Characterizing the Nature and Dynamics of Tor Exit Blocking..
Proceedings of USENIX Security 2017.
(2017).
(2017).
(2016).
Reviewer Integration and Performance Measurement for Malware Detection.
13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
(2016). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016). Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.
Proceedings on Privacy Enhancing Technologies. 2015(1), 92-112.
(2015). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015). Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
(2015). Censorship Arms Race: Research vs. Practice.
Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
(2015). A Methodology for Information Flow Experiments.
2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
(2015). Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
(2014). Large-margin Convex Polytope Machine.
Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
(2014). On Modeling the Costs of Censorship.
CoRR. abs/1409.3211,
(2014).