Publications

Found 25 results
Author Title Type [ Year(Asc)]
Filters: Author is Michael Carl Tschantz  [Clear All Filters]
2023
Tschantz, M. Carl (2023).  A Mathematical Model of Contextual Integrity. ICSI Technical Report.
2020
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
2019
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
2015
Datta, A., Tschantz M. Carl, & Datta A. (2015).  Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. Proceedings on Privacy Enhancing Technologies. 2015(1), 92-112.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
2014
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Kantchelian, A., Tschantz M. Carl, Huang L., Bartlett P. L., Joseph A. D., & Tygar J.D.. (2014).  Large-margin Convex Polytope Machine. Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
Tschantz, M. Carl, Afroz S., Paxson V., & Tygar J.D.. (2014).  On Modeling the Costs of Censorship. CoRR. abs/1409.3211,