Search Results for author: Arvind Narayanan

Found 21 papers, 9 papers with code

Foundation Model Transparency Reports

no code implementations26 Feb 2024 Rishi Bommasani, Kevin Klyman, Shayne Longpre, Betty Xiong, Sayash Kapoor, Nestor Maslej, Arvind Narayanan, Percy Liang

Foundation models are critical digital technologies with sweeping societal impact that necessitates transparency.

Leakage and the Reproducibility Crisis in ML-based Science

no code implementations14 Jul 2022 Sayash Kapoor, Arvind Narayanan

To investigate the impact of reproducibility errors and the efficacy of model info sheets, we undertake a reproducibility study in a field where complex ML models are believed to vastly outperform older statistical models such as Logistic Regression (LR): civil war prediction.

The worst of both worlds: A comparative analysis of errors in learning from data in psychology and machine learning

no code implementations12 Mar 2022 Jessica Hullman, Sayash Kapoor, Priyanka Nanayakkara, Andrew Gelman, Arvind Narayanan

We conclude by discussing risks that arise when sources of errors are misdiagnosed and the need to acknowledge the role of human inductive biases in learning and reform.

Causal Inference

Mitigating Dataset Harms Requires Stewardship: Lessons from 1000 Papers

no code implementations6 Aug 2021 Kenny Peng, Arunesh Mathur, Arvind Narayanan

Machine learning datasets have elicited concerns about privacy, bias, and unethical applications, leading to the retraction of prominent datasets such as DukeMTMC, MS-Celeb-1M, and Tiny Images.

BIG-bench Machine Learning Management +1

T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems

1 code implementation19 Jul 2021 Eli Lucherini, Matthew Sun, Amy Winecoff, Arvind Narayanan

Simulation has emerged as a popular method to study the long-term societal consequences of recommender systems.

Friction Recommendation Systems

Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities

no code implementations10 Dec 2020 Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo

Universities have been forced to rely on remote educational technology to facilitate the rapid shift to online learning.

Cryptography and Security

Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites

1 code implementation16 Jul 2019 Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan

Dark patterns are user interface design choices that benefit an online service by coercing, steering, or deceiving users into making unintended and potentially harmful decisions.

Human-Computer Interaction Computers and Society

Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest

1 code implementation3 Sep 2018 Arunesh Mathur, Arvind Narayanan, Marshini Chetty

Based on our findings, we make various design and policy suggestions to help improve advertising disclosure practices on social media platforms.

Human-Computer Interaction Computers and Society Social and Information Networks

An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest

1 code implementation22 Mar 2018 Arunesh Mathur, Arvind Narayanan, Marshini Chetty

While disclosures relating to various forms of Internet advertising are well established and follow specific formats, endorsement marketing disclosures are often open-ended in nature and written by individual publishers.

Social and Information Networks Computers and Society Human-Computer Interaction

BlockSci: Design and applications of a blockchain analysis platform

2 code implementations8 Sep 2017 Harry Kalodner, Steven Goldfeder, Alishah Chator, Malte Möser, Arvind Narayanan

We present BlockSci, an open-source software platform for blockchain analysis.

Cryptography and Security Databases

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

no code implementations16 Aug 2017 Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster

The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home.

Cryptography and Security

Obfuscation in Bitcoin: Techniques and Politics

no code implementations16 Jun 2017 Arvind Narayanan, Malte Möser

In the cryptographic currency Bitcoin, all transactions are recorded in the blockchain - a public, global, and immutable ledger.

Computers and Society Cryptography and Security

The Future of Ad Blocking: An Analytical Framework and New Techniques

2 code implementations24 May 2017 Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan

Based on our state-space model, our new techniques, and this systematization, we offer insights into the likely "end game" of the arms race.

Cryptography and Security

Semantics derived automatically from language corpora contain human-like biases

1 code implementation25 Aug 2016 Aylin Caliskan, Joanna J. Bryson, Arvind Narayanan

Here we show for the first time that human-like semantic biases result from the application of standard machine learning to ordinary language---the same sort of language humans are exposed to every day.

BIG-bench Machine Learning Ethics +1

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

3 code implementations28 Dec 2015 Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan

Many distinguishing features present in source code, e. g. variable names, are removed in the compilation process, and compiler optimization may alter the structure of a program, further obscuring features that are known to be useful in determining authorship.

Cryptography and Security

How To Break Anonymity of the Netflix Prize Dataset

no code implementations18 Oct 2006 Arvind Narayanan, Vitaly Shmatikov

We present a new class of statistical de-anonymization attacks against high-dimensional micro-data, such as individual preferences, recommendations, transaction records and so on.

Cryptography and Security Databases

Cannot find the paper you are looking for? You can Submit a new open access paper.