no code implementations • 7 Mar 2024 • Shayne Longpre, Sayash Kapoor, Kevin Klyman, Ashwin Ramaswami, Rishi Bommasani, Borhane Blili-Hamelin, Yangsibo Huang, Aviya Skowron, Zheng-Xin Yong, Suhas Kotha, Yi Zeng, Weiyan Shi, Xianjun Yang, Reid Southen, Alexander Robey, Patrick Chao, Diyi Yang, Ruoxi Jia, Daniel Kang, Sandy Pentland, Arvind Narayanan, Percy Liang, Peter Henderson
Independent evaluation and red teaming are critical for identifying the risks posed by generative AI systems.
no code implementations • 27 Feb 2024 • Sayash Kapoor, Rishi Bommasani, Kevin Klyman, Shayne Longpre, Ashwin Ramaswami, Peter Cihon, Aspen Hopkins, Kevin Bankston, Stella Biderman, Miranda Bogen, Rumman Chowdhury, Alex Engler, Peter Henderson, Yacine Jernite, Seth Lazar, Stefano Maffulli, Alondra Nelson, Joelle Pineau, Aviya Skowron, Dawn Song, Victor Storchan, Daniel Zhang, Daniel E. Ho, Percy Liang, Arvind Narayanan
To understand their risks of misuse, we design a risk assessment framework for analyzing their marginal risk.
no code implementations • 26 Feb 2024 • Rishi Bommasani, Kevin Klyman, Shayne Longpre, Betty Xiong, Sayash Kapoor, Nestor Maslej, Arvind Narayanan, Percy Liang
Foundation models are critical digital technologies with sweeping societal impact that necessitates transparency.
no code implementations • 10 Jan 2024 • Sayash Kapoor, Peter Henderson, Arvind Narayanan
Is AI set to redefine the legal profession?
no code implementations • 15 Aug 2023 • Sayash Kapoor, Emily Cantrell, Kenny Peng, Thanh Hien Pham, Christopher A. Bail, Odd Erik Gundersen, Jake M. Hofman, Jessica Hullman, Michael A. Lones, Momin M. Malik, Priyanka Nanayakkara, Russell A. Poldrack, Inioluwa Deborah Raji, Michael Roberts, Matthew J. Salganik, Marta Serra-Garcia, Brandon M. Stewart, Gilles Vandewiele, Arvind Narayanan
Machine learning (ML) methods are proliferating in scientific research.
no code implementations • 14 Jul 2022 • Sayash Kapoor, Arvind Narayanan
To investigate the impact of reproducibility errors and the efficacy of model info sheets, we undertake a reproducibility study in a field where complex ML models are believed to vastly outperform older statistical models such as Logistic Regression (LR): civil war prediction.
no code implementations • 12 Mar 2022 • Jessica Hullman, Sayash Kapoor, Priyanka Nanayakkara, Andrew Gelman, Arvind Narayanan
We conclude by discussing risks that arise when sources of errors are misdiagnosed and the need to acknowledge the role of human inductive biases in learning and reform.
no code implementations • 6 Aug 2021 • Kenny Peng, Arunesh Mathur, Arvind Narayanan
Machine learning datasets have elicited concerns about privacy, bias, and unethical applications, leading to the retraction of prominent datasets such as DukeMTMC, MS-Celeb-1M, and Tiny Images.
1 code implementation • 19 Jul 2021 • Eli Lucherini, Matthew Sun, Amy Winecoff, Arvind Narayanan
Simulation has emerged as a popular method to study the long-term societal consequences of recommender systems.
no code implementations • 10 Dec 2020 • Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo
Universities have been forced to rely on remote educational technology to facilitate the rapid shift to online learning.
Cryptography and Security
2 code implementations • ECCV 2020 • Angelina Wang, Alexander Liu, Ryan Zhang, Anat Kleiman, Leslie Kim, Dora Zhao, Iroha Shirai, Arvind Narayanan, Olga Russakovsky
Machine learning models are known to perpetuate and even amplify the biases present in the data.
1 code implementation • 16 Jul 2019 • Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan
Dark patterns are user interface design choices that benefit an online service by coercing, steering, or deceiving users into making unintended and potentially harmful decisions.
Human-Computer Interaction Computers and Society
1 code implementation • 3 Sep 2018 • Arunesh Mathur, Arvind Narayanan, Marshini Chetty
Based on our findings, we make various design and policy suggestions to help improve advertising disclosure practices on social media platforms.
Human-Computer Interaction Computers and Society Social and Information Networks
1 code implementation • 22 Mar 2018 • Arunesh Mathur, Arvind Narayanan, Marshini Chetty
While disclosures relating to various forms of Internet advertising are well established and follow specific formats, endorsement marketing disclosures are often open-ended in nature and written by individual publishers.
Social and Information Networks Computers and Society Human-Computer Interaction
2 code implementations • 8 Sep 2017 • Harry Kalodner, Steven Goldfeder, Alishah Chator, Malte Möser, Arvind Narayanan
We present BlockSci, an open-source software platform for blockchain analysis.
Cryptography and Security Databases
no code implementations • 16 Aug 2017 • Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster
The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.
Cryptography and Security
no code implementations • 16 Jun 2017 • Arvind Narayanan, Malte Möser
In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger.
Computers and Society Cryptography and Security
2 code implementations • 24 May 2017 • Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan
Based on our state-space model, our new techniques, and this systematization, we offer insights into the likely "end game" of the arms race.
Cryptography and Security
1 code implementation • 25 Aug 2016 • Aylin Caliskan, Joanna J. Bryson, Arvind Narayanan
Here we show for the first time that human-like semantic biases result from the application of standard machine learning to ordinary language---the same sort of language humans are exposed to every day.
3 code implementations • 28 Dec 2015 • Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan
Many distinguishing features present in source code, e. g. variable names, are removed in the compilation process, and compiler optimization may alter the structure of a program, further obscuring features that are known to be useful in determining authorship.
Cryptography and Security
no code implementations • 18 Oct 2006 • Arvind Narayanan, Vitaly Shmatikov
We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on.
Cryptography and Security Databases