PreprintsBias in Natural Language Processing Policy Brief, 2020 Disparate Impact of Artificial Intelligence Bias in Ridehailing Economy's Price Discrimination Algorithms Manuscript, 2020 ValNorm Quantifies Semantics to Reveal Consistent Valence Biases Across Languages and Over Centuries Manuscript, 2020 Detecting Emergent Intersectional Biases: Contextualized Word Embeddings Contain a Distribution of Human-like Biases Manuscript, 2020 Social biases in word embeddings and their relation to human cognition Book Chapter Preprint, 2020 Peer-reviewed PublicationsImage Representations Learned With Unsupervised Pre-Training Contain Human-like Biases The 2021 ACM Conference on Fairness, Accountability, and Transparency (ACM FAccT 2021) A Set of Distinct Facial Traits Learned by Machines Is Not Predictive of Appearance Bias in the Wild AI and Ethics, 2021 Automatically Characterizing Targeted Information Operations Through Biases Present in Discourse on Twitter 15th IEEE International Conference on Semantic Computing (ICSC 2021) If I Tap It, Will They Come? An Introductory Analysis of Fairness in a Large-Scale Ride Hailing Dataset Academy of Marketing Science 44th Annual Conference (AMS 2020) Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments The 19th Privacy Enhancing Technologies Symposium (PETS 2019) When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries The Network and Distributed System Security Symposium (NDSS 2018) - Source code Semantics derived automatically from language corpora contain human-like biases Science 2017 - Source code and data A Story of Discrimination and Unfairness 9th Hot Topics in Privacy Enhancing Technologies (HotPETS 2016)
De-anonymizing Programmers via Code Stylometry24th Usenix Security Symposium (Usenix 2015) - Source code Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social NetworkWorkshop on Privacy in the Electronic Society (WPES 2014)
How Privacy Flaws Affect Consumer PerceptionThe 3rd workshop on Socio-Technical Aspects in Security and Trust (STAST 2013) From Language to Family and Back: Native Language and Language Family Identification from English Text The 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop, NAACL HLT SRW 2013 Use Fewer Instances of the Letter "i": Toward Writing Style AnonymizationThe 12th Privacy Enhancing Technologies Symposium (PETS 2012)
Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text 6th IEEE International Conference on Semantic Computing (ICSC 2012) Other PublicationsComments in response to the National Institute of Standards and Technology Request for Information on Developing a Federal AI Standards Engagement Plan [Docket Number: [190312229–9229–01]] National Institute of Standards and Technology (NIST) White Paper, June 2019. How do we decide how much to reveal? (Hint: Our privacy behavior might be socially constructed.) Special Issue on Security, Privacy, and Human Behavior, ACM Computer Society, February 2015 ENVOY: Exploration and Navigation Vehicle for geolOgY University of Pennsylvania's Entry in NASA/NIA RASC-AL, 2011 |