Accountable algorithms
JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …
M2M security: Challenges and solutions
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …
attention in both industrial and academic sectors, and which is expected to grow in the next …
Prio: Private, robust, and scalable computation of aggregate statistics
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …
Flamingo: Multi-round single-server secure aggregation with applications to private federated learning
This paper introduces Flamingo, a system for secure aggregation of data across a large set
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …
Private memoirs of a smart meter
A Molina-Markham, P Shenoy, K Fu… - Proceedings of the 2nd …, 2010 - dl.acm.org
Household smart meters that measure power consumption in real-time at fine granularities
are the foundation of a future smart electricity grid. However, the widespread deployment of …
are the foundation of a future smart electricity grid. However, the widespread deployment of …
Measuring large-scale social networks with high resolution
This paper describes the deployment of a large-scale study designed to measure human
interactions across a variety of communication channels, with high temporal resolution and …
interactions across a variety of communication channels, with high temporal resolution and …
Lightweight techniques for private heavy hitters
This paper presents a new protocol for solving the private heavy-hitters problem. In this
problem, there are many clients and a small set of data-collection servers. Each client holds …
problem, there are many clients and a small set of data-collection servers. Each client holds …
[BOOK][B] Reinventing the automobile: Personal urban mobility for the 21st century
WJ Mitchell, CE Borroni-Bird, LD Burns - 2010 - books.google.com
How to leave behind our unwieldy, gas-guzzling, carbon dioxide–emitting vehicles for cars
that are green, smart, connected, and fun. This book provides a long-overdue vision for a …
that are green, smart, connected, and fun. This book provides a long-overdue vision for a …
The internet of things: A survey from the data-centric perspective
Advances in sensor data collection technology, such as pervasive and embedded devices,
and RFID Technology have lead to a large number of smart devices which are connected to …
and RFID Technology have lead to a large number of smart devices which are connected to …
[PDF][PDF] Location privacy via private proximity testing.
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without
either party revealing any other information about their location. We describe several secure …
either party revealing any other information about their location. We describe several secure …