Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

M2M security: Challenges and solutions

A Barki, A Bouabdallah, S Gharout… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of
attention in both industrial and academic sectors, and which is expected to grow in the next …

Prio: Private, robust, and scalable computation of aggregate statistics

H Corrigan-Gibbs, D Boneh - 14th USENIX symposium on networked …, 2017 - usenix.org
This paper presents Prio, a privacy-preserving system for the collection of aggregate
statistics. Each Prio client holds a private data value (eg, its current location), and a small set …

Flamingo: Multi-round single-server secure aggregation with applications to private federated learning

Y Ma, J Woods, S Angel… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
This paper introduces Flamingo, a system for secure aggregation of data across a large set
of clients. In secure aggregation, a server sums up the private inputs of clients and obtains …

Private memoirs of a smart meter

A Molina-Markham, P Shenoy, K Fu… - Proceedings of the 2nd …, 2010 - dl.acm.org
Household smart meters that measure power consumption in real-time at fine granularities
are the foundation of a future smart electricity grid. However, the widespread deployment of …

Measuring large-scale social networks with high resolution

A Stopczynski, V Sekara, P Sapiezynski, A Cuttone… - PloS one, 2014 - journals.plos.org
This paper describes the deployment of a large-scale study designed to measure human
interactions across a variety of communication channels, with high temporal resolution and …

Lightweight techniques for private heavy hitters

D Boneh, E Boyle, H Corrigan-Gibbs… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
This paper presents a new protocol for solving the private heavy-hitters problem. In this
problem, there are many clients and a small set of data-collection servers. Each client holds …

[BOOK][B] Reinventing the automobile: Personal urban mobility for the 21st century

WJ Mitchell, CE Borroni-Bird, LD Burns - 2010 - books.google.com
How to leave behind our unwieldy, gas-guzzling, carbon dioxide–emitting vehicles for cars
that are green, smart, connected, and fun. This book provides a long-overdue vision for a …

The internet of things: A survey from the data-centric perspective

CC Aggarwal, N Ashish, A Sheth - Managing and mining sensor data, 2013 - Springer
Advances in sensor data collection technology, such as pervasive and embedded devices,
and RFID Technology have lead to a large number of smart devices which are connected to …

[PDF][PDF] Location privacy via private proximity testing.

A Narayanan, N Thiagarajan, M Lakhani, M Hamburg… - NDSS, 2011 - crypto.stanford.edu
We study privacy-preserving tests for proximity: Alice can test if she is close to Bob without
either party revealing any other information about their location. We describe several secure …