Research Publications
Cybersecurity
de Castro, L., Lo, A. W., Reynolds, T., Susan, F., Vaikuntanathan, V., Weitzner, D., & Zhang, N. (2020). SCRAM: A Platform for Securely Measuring Cyber Risk . Harvard Data Science Review. https://doi.org/10.1162/99608f92.b4bb506a
Specter, M., Koppel, J., and Weitzner, D. (2020). The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. https://internetpolicy.mit.edu/securityanalysisofvoatz_public/
Huang, K., Herscovici, S., Madnick, S. (
Madnick, S., Johnson, S., & Huang, K. (2019). What Countries and Companies Can Do When Trade and Cybersecurity Overlap. In Harvard Business Review. https://hbr.org/2019/01/what-countries-and-companies-can-do-when-trade-and-cybersecurity-overlap
Frankle, J., Park, S., Shaar, D., Goldwasser, S., & Weitzner, D. (2018). Practical Accountability of Secret Processes. In 27th USENIX Security Symposium (USENIX Security 18) (pp. 657–674). Baltimore, MD: USENIX Association. Retrieved from https://www.usenix.org/conference/usenixsecurity18/presentation/frankie
Weitzner, D. (2018). Promoting Economic Prosperity in Cyberspace. Ethics & International Affairs (Vol. 32, no. 4 (2018). pp. 425-439).
Feigenbaum, J, & Weitzner, D. (2018). On the incommensurability of laws and technical mechanisms: Or, what cryptography can’t do. In Cambridge International Workshop on Security Protocols. (pp. 266-279. Springer, Cham, 2018).
Weitzner, D. (2018). U.S. Privacy Legislation: Now Is The Time. From Boston Bar Association – Keynote address 2nd Annual Privacy & Cybersecurity Conference. https://internetpolicy.mit.edu/wp-content/uploads/2018/05/IPRI-Weitzner-BBA-Privacy-NowIsTime-2018.pdf
Brenner, J. (2017, March). Keeping America Safe: Toward More Secure Networks For Critical Sectors. https://internetpolicy.mit.edu/reports/Report-IPRI-CIS-CriticalInfrastructure-2017-Brenner.pdf
AI Policy
Gilpin, L.H., Testart, C., Frutchter, N., and Adebayo J. (2018). Explaining Explanations to Society. NIPS Workshop on Ethical, Social and Governance Issues in AI.
Frankle, J. & Carbin, M. (2018). The Lottery Ticket Hypothesis: Finding Sparse, Trainable Neural Networks. arXiv.org. https://arxiv.org/abs/1803.03635. Related blog post: https://internetpolicy.mit.edu/neural-networks-and-the-lottery-ticket-hypothesis/. (This work won the ICLR 2019 Best Paper Award.)
Gilpin, L.H., Olson, D., & Alrashed, T. (2018). Perception of Speaker Personality Traits Using Speech Signals. CHI 2018 – Late Breaking Reports. https://dl.acm.org/citation.cfm?id=3170427.3188557
Gilpin, L.H., Zaman, C., Olson, D., & Yuan, B.Z. (2018). Simulating Human Explanations of Visual Scene Understanding. Human Robot Interaction (HRI) 2018. http://delivery.acm.org/10. 1145/3180000/3176994/p115-gilpin.pdf
Ahmad, W. (2018). Dealing with Fake News: Policy and Technical Measures. https://internetpolicy.mit.edu/wp-content/uploads/2018/04/Fake-news-recommendations-Wajeeha-MITs-IPRI.pdf
Gilpin, L. H., & Yuan, B. Z. AAAI Publications. https://www.aaai.org/ocs/index.php/SSS/SSS17/paper/view/15322
Privacy
Adebayo, J; Muelly, M; Liccardi, I; & Kim, B. (2020). Debugging Tests for Model Explanations. NeurIPS 2020 – Conference on Neural Information Processing Systems.
Nguyen, S. & Liccardi, I (2020). COVID-19, Data Privacy & App Design An analysis of privacy design elements of COVID-19 Apps. Tech Report 2020. Related blog post: https://internetpolicy.mit.edu/covid-19-apps-data-transparency-and-data-governance-through-ux-ui-design/.
Ahmad, W. & Liccardi, I (2020). Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors. CHI 2020 – ACM Conference on Human Factors in Computing Systems.
Nouwens, M; Liccardi, I; Veale, M; Karger, D; & Kagal, L. (2020). Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence. CHI 2020 – ACM Conference on Human Factors in Computing Systems.
Suresh, H; Lao, N; & Liccardi, I (2020). Misplaced Trust: Measuring the Interference of Machine Learning in Human Decision-Making. Web Science 2020 – ACM WEB Science Conference.
Fruchter, N. & Liccardi, I. (2018). Consumer Attitudes Towards Privacy and Security in Home Assistants. CHI 2018 – ACM Conference Extended Abstract on Human Factors in Computing Systems.
Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D. J., & Shadbolt, N. (2017, May). Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 5208-5220). ACM. http://people.csail.mit.edu/ilaria/papers/CHI2017.pdf
Sher, V., Bemis, K. G., Liccardi, I., & Chen, M. (2017, June). An Empirical Study on the Reliability of Perceiving Correlation Indices using Scatterplots. In Computer Graphics Forum (Vol. 36, No. 3, pp. 61-72). http://people.csail.mit.edu/ilaria/papers/EuroVis2017.pdf
Binns, R., Zhao, J., Van Kleek, M., Shadbolt, N., Liccardi, I., & Weitzner, D. (2017, May). My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems(pp. 2403-2409). ACM. http://people.csail.mit.edu/ilaria/papers/CHI2017-WIP.pdf
Advanced Network Architecture (ANA)
Ahmad, W. & Dethy, E. (2019). “Preventing Surveillance Cities: Developing a Set of Fundamental Privacy Provisions”. Journal of Science Policy & Governance, (Vol. 15, Issue 1). Available at: http://www.sciencepolicyjournal.org/uploads/5/4/3/4/5434385/ahmad_dethy_jspg_v15.pdf
Testart, C., Richter, P., King, A., Dainotti, A., & Clark, D. (2019). “Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table.” Proceedings of the Internet Measurement Conference. ACM, 2019. Paper download: https://dl.acm.org/citation.cfm?doid=3355369.3355581 (This work won a Best Paper award.)
Ahmad, W. (2019). “Why Botnets Persist: Designing Effective Technical and Policy Interventions”. Paper download: https://internetpolicy.mit.edu/publications-ipri-2019-02/
Klym, N. and Clark, D. (2019). “The Future of the Ad-Supported Internet Ecosystem”. Paper download: https://internetpolicy.mit.edu/publications-ipri-2019-01/
Clark, D. (2018). Designing an Internet. MIT press. https://mitpress.mit.edu/books/designing-internet
Wolff, J. and Lehr, W. (2018). “When cyber threats loom, what can state and local governments do?” Georgetown Journal of International Affairs.
Wolff, J. and Lehr, W. (2018). “Roles for Policy-Makers in Emerging Cyber Insurance Industry Partnerships,” TPRC46: Research Conference on Communications, Information and Internet Policy, American University, Washington, DC. Abstract available at SSRN: https://ssrn.com/abstract=3141409.
Testart, C. (2018). Reviewing a Historical Internet Vulnerability: Why Isn’t BGP More Secure and What Can We Do About it? TPRC (Vol. 46).
Lehr, W., Clark, D., Bauer, S., Berger, A., and Richter, P. (2018), “Whither the Public Internet?,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3141969.
Sicker, D. and Lehr, W.,(2018), “Telecom Déjà Vu: A Model for Sharing in Broadband Access”. Abstract available at SSRN: https://ssrn.com/abstract=3142172.
Lehr, W. and Sicker, D. (2018), “Communications Act 2021,” Journal of High Technology Law, (Vol. 18, No. 2 pp. 270-330). Available at https://cpb-us-e1.wpmucdn.com/sites.suffolk.edu/dist/5/1153/files/2018/05/Communications-Act-2021-1fkmij5.pdf.
Bauer, S. and Lehr, W. (2018), “Measuring Mobile Broadband Performance,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3138610.
Karimi, P., Raychaudhuri, D., Lehr, W., and Seskar, I. (2018), “SMAP: A Scalable and Distributed Architecture for Dynamic Spectrum Management,” IEEE DySPAN 2018, Seoul, Korea, October 2018.
Gomez, M., Lehr, W., Weiss, M., and McHenry, G. (2018), “Spectrum Valuation: Implications for Sharing and Secondary Markets,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3142182.
Dhamdhere, A., Clark, D., et al. (2018), Inferring Persistent Interdomain Congestion, SIGCOMM ’18, August 20–25, 2018, Budapest, Hungary. (This work won a Best Paper award.)
Clark, D., Dhamdhere, A., Claffy, K.C., and Luckie, M. (2018), Detecting Internet Congestion at Interconnection Points: An Empirical Analysis. TPRC 46.
Richter, P., Padmanabhan, R., Spring, N., Berger, A., and Clark, D. (2018) Advancing the Art of Internet Edge Outage Detection. ACM Internet Measurement Conference, October 2018, Boston MA.
Claffy, K.C., and Clark, D. (2017). The 9th Workshop on Active Internet Measurements (AIMS-9) Report. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, (47(5), 35-38).
https://www.caida.org/publications/papers/2017/aims2017_report/aims2017_report.pdf
Clark, D. (2017). Workshop on Internet Economics (WIE2016) Final Report. ACM SIGCOMM Computer Communication Review, 47(3), 34-39. https://ccronline.sigcomm.org/wp-content/uploads/2017/08/sigcomm-ccr-final99-1.pdf
Fruchter, N., Karpf, B., & Liccardi, I. (2017). Insights into Unsolicited Consumer Thoughts on IoT Device Privacy and Security. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2925355
Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A., & Berger, A. (2017). Inferring BGP Blackholing Activity in the Internet. http://people.csail.mit.edu/awberger/papers/Inferring_BGP_Blackholing_Activity_in_the_Internet.pdf
Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A., & Aben, E. (2017, August). Detecting Peering Infrastructure Outages in the Wild. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (pp. 446-459). ACM. https://dl.acm.org/citation.cfm?id=3098855
Stocker, V., Smaragdakis, G., Lehr, W., & Bauer, S. (2017). The growing complexity of content delivery networks: Challenges and implications for the Internet ecosystem. Telecommunications Policy. (Vol. 41 (10), No. 3, pp. 1003-1016). http://www.sciencedirect.com/science/article/pii/S0308596116302476
Klym, N. and Clark, D. (2017) The Future of the Ad-Supported Internet Ecosystem. IPRI Working paper.
Wolff, J. and Lehr, W. (2017), “Degrees of Ignorance About the Costs of Data Breaches: What Policymakers Can and Can’t Do About the Lack of Good Empirical Data,” 45th Research Conference on Communications, Information and Internet Policy (TPRC45), September 2017, Alexandria, VA. Available at SSRN: https://ssrn.com/abstract=2943867
Lehr, W. and Sicker D. (2017), “Would you like your Internet with or without Video,” Journal of Law, Technology & Policy, (vol. 2017 (issue 1 Spring)). Available at http://illinoisjltp.com/journal/wp-content/uploads/2017/05/Lehr.pdf.
Klym, N., and Clark, D. (Working draft: October 2017) The Convergence of Content and Conversation: Approaches to Regulating Social Media.
Lehr, W. and Sharafat, A. (2017), “ICT Engines for Sustainable Development,” in A. Sharafat & W. Lehr (eds.), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://handle.itu.int/11.1002/pub/80fc3264-en.
Sharafat, A. & Lehr, W. (Eds.) (2017), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://www.itu.int/pub/D-GEN-ICT_SDGS.01-2017.
Lehr (2017), “Analysis of Proposed Modifications to the CBRS PAL License Framework,” Ex parte comment submitted to Federal Communications Commission in the Matter of Promoting Investment in the 3550-3700 MHz Band, (Docket 17–258, December 2017.) Available at https://ecfsapi.fcc.gov/file/1228227728544/Lehr%20CBRS%20Comments%2017-258.pdf.
Klym, N. and Clark, D. (2017) The Future of the Ad-Supported Internet Ecosystem. IPRI Working paper.
Wolff, J. and Lehr, W. (2017), “Degrees of Ignorance About the Costs of Data Breaches: What Policymakers Can and Can’t Do About the Lack of Good Empirical Data,” 45th Research Conference on Communications, Information and Internet Policy (TPRC45), September 2017, Alexandria, VA. Available at SSRN: https://ssrn.com/abstract=2943867.
Lehr, W. and Sicker D. (2017), “Would you like your Internet with or without Video,” Journal of Law, Technology & Policy, (vol. 2017 (issue 1 Spring)). Available at http://illinoisjltp.com/journal/wp-content/uploads/2017/05/Lehr.pdf.
Klym, N., and Clark, D. (Working draft: October 2017) The Convergence of Content and Conversation: Approaches to Regulating Social Media.
Lehr, W. and Sharafat, A. (2017), “ICT Engines for Sustainable Development,” in A. Sharafat & W. Lehr (eds.), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://handle.itu.int/11.1002/pub/80fc3264-en.
Sharafat, A. & Lehr, W. (Eds.) (2017), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://www.itu.int/pub/D-GEN-ICT_SDGS.01-2017.
Lehr (2017), “Analysis of Proposed Modifications to the CBRS PAL License Framework,” Ex parte comment submitted to Federal Communications Commission in the Matter of Promoting Investment in the 3550-3700 MHz Band, (Docket 17–258, December 2017.) Available at https://ecfsapi.fcc.gov/file/1228227728544/Lehr%20CBRS%20Comments%2017-258.pdf.
Iosifidis, G., Koutsopoulos, I., & Smaragdakis, G. (2016). Distributed Storage Control Algorithms for Dynamic Networks. IEEE/ACM Transactions on Networking. http://ieeexplore.ieee.org/abstract/document/7797142/?reload=true.
Poularakis, K., Iosifidis, G., Smaragdakis, G., & Tassiulas, L. (2017). One Step at a Time: Optimizing SDN Upgrades in ISP Networks. In Proceedings of IEEE INFOCOM. http://people.csail.mit.edu/gsmaragd/publications/Infocom2017/Infocom2017.pdf.
Karpf, B. A. (2017). Dead reckoning: where we stand on privacy and security controls for the Internet of Things (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/111231.
Loving, J. H. (2017). Enabling malware remediation in expanding home networks (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/108839.
Markel, Z. A. (2017). Designing networked objects to achieve reasonable security (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/111236.
Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D. J., & Shadbolt, N. (2017). Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 5208-5220). ACM. https://dl.acm.org/citation.cfm?id=3025556.
Sher, V., Bemis, K. G., Liccardi, I., & Chen, M. (2017). An Empirical Study on the Reliability of Perceiving Correlation Indices using Scatterplots. In Computer Graphics Forum (Vol. 36, No. 3, pp. 61-72). http://onlinelibrary.wiley.com/doi/10.1111/cgf.13168/full.
Binns, R., Zhao, J., Van Kleek, M., Shadbolt, N., Liccardi, I., & Weitzner, D. (2017, May). My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2403-2409). ACM. https://dl.acm.org/citation.cfm?id=3053255.
Wolff, J. and Lehr, W. (2016), “Ex-post mitigation strategies for theft of non-financial data,” TPRC44, September 2016, Alexandria, VA. Available at available at SSRN: http://ssrn.com/abstract=2756842 or http://dx.doi.org/10.2139/ssrn.2756842.
Luckie, M., Dhamdhere, A., Huffaker, B., Clark, D., and Claffy, K. C. (2016) bdrmap: Inference of Borders Between IP Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC).
Lehr, W. (2016) “Spectrum License Design, Sharing, and Exclusion Rights,” University of Illinois Journal of Law, Technology & Policy, (Vol. 2016, Spring, No. 1, 1-33).
Bhattarai, S., Park, J., Gao, B., Bian, K., and Lehr, W. (2016), “An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research,” IEEE Transactions on Cognitive Communications and Networking, (2(2), 110-28).
Bhattarai, S., Jung-Min Park, and Lehr, W. (2016), “Exploiting Spatial-White-Space Opportunities in Dynamic Spectrum Sharing,” submitted to IEEE Globecom 2016, April 2016.
Weiss, M. and Lehr, W. (2016), “Enforcement in Spectrum Sharing,” submitted to IEEE JSAC Special Issue on Spectrum Sharing and Aggregation for Future Wireless Networks, April 2016.
Richter, P., Smaragdakis, G., Plonka, D., & Berger, A. (2016). Beyond counting: new perspectives on the active IPv4 address space. arXiv preprint arXiv:1606.00360. https://arxiv.org/abs/1606.00360
Stocker, V., Smaragdakis, G., Lehr, W., & Bauer, S. (2016). Content may be king, but (peering) location matters: A progress report on the evolution of content delivery in the internet. https://www.econstor.eu/handle/10419/148708
Claffy, K. C., Clark, D. D., Bauer, S., & Dhamdhere, A. D. (2016). Policy Challenges in Mapping Internet Interdomain Congestion. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756868
Bauer, S., Lehr, W., and Mou, M. (2016). Improving the Measurement and Analysis of Gigabit Broadband Networks. Browser Download This Paper. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757050
Bauer, S., & Lehr, W. (2015, September). Improving the Measurement and Analysis of Gigabit Broadband Network Performance. In Telecommunications Policy Research Conference.
Rock, C. T. (2016). Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services. https://dspace.mit.edu/handle/1721.1/104385
Jing, Y. (2016). Evaluating caching mechanisms in future Internet architectures (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/106120
Xu, S. (2016). Modeling user network transitions: various approaches (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/106397
Clark, D., Claffy, K.C.: “Anchoring policy development around stable points” Telecommunications Policy (Volume 39 Issue 10, November 2015).
Bauer, S., Lehr, W., and Hung, S. (2015), “Gigabit Broadband, Interconnection Propositions, and the Challenge of Managing Expectations,” TPRC2015, Alexandria, VA, September 2015. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586805.
Lehr, W., Kenneally, E., and Bauer, S. (2015), “The Road to an Open Internet is Paved with Pragmatic Disclosure & Transparency Policies,” 43rd Research Conference on Communication, Information and Internet Policy Paper (TPRC43). Available at https://ssrn.com/abstract=2587718.
Weiss, M., Lehr, W., Acker, A., and Gomez, M. (2015), Socio-Technical Considerations for Spectrum Access System (SAS) Design, IEEE DySPAN 2015. Available at http://d-scholarship.pitt.edu/25828/1/dyspan_revisions_4.pdf.
Reed, J., Park, J., Lehr, W., Sayed, A., and Woodney, L. (2015), “Executive Summary: The Second Enhancing Access to the Radio Spectrum Workshop,” a National Science Foundation Sponsored Event, Arlington, VA, 19-20 October 2015. Available at https://earsworkshop.wireless.vt.edu/pdfs/EARS_2015_workshop_report_final_ver.pdf.
Lehr, W., Kahn, C., and Kutsche C. (2015), “Final Report: Federal-Commercial Spectrum Sharing Workshop: Models, Applications, and Impacts of Incentives for Sharing,” NITRD Wireless Spectrum R&D Senior Steering Group Workshop VII Report, Stevens Institute of Technology, Hoboken, NJ, March 19, 2015. Available at https://www.nitrd.gov/nitrdgroups/images/d/dc/WSRD_Workshop_VII_Report.pdf.
Claffy, K.C. and Clark, D., (2014). Platform Models for Sustainable Internet Regulation. Journal of Information Policy (vol. 4 pp. 463-488). doi:10.5325/jinfopoli.4.2014.0463.
Clark, D., Bauer, S., Lehr, W., Claffy, K.C., Dhamdhere, A.D., Huffaker, B., Luckie, M. “Measurement and Analysis of Internet Interconnection and Congestion” Journal of Information Policy, (Vol 4).
Lehr, W. and Oliver, M. (2014), “Small cells and the mobile broadband ecosystem,” Euro ITS2014, Brussels, June 2014. Available at http://econpapers.repec.org/paper/zbwitse14/101406.htm.
Lehr, W. (2014) “Benefits of Competition in Mobile Services,” a white paper submitted as Ex Parte to FCC in the matter of Wireless Telecommunications Bureau Seeks Comment on the State of Mobile Wireless Competition, (WT Docket No. 13-135, 24, March 2014). Available at http://apps.fcc.gov/ecfs/document/view?id=7521094963.
Lehr, W. (2014), “PALs as Options to Exclude GAA,” Reply Comments submitted in the matter of Amendment of the Commission’s Rules with Regard to Commercial Operations in the 3550-3650 MHz Band, (GN Docket 12-354, August 15, 2014). Available at http://apps.fcc.gov/ecfs/document/view?id=7521763142.
Lehr, W. (2014), “The Mistake of One-Sided Open Internet Policy,” a white paper, prepared with support from the American Cable Association, July 2014. Available at http://apps.fcc.gov/ecfs/document/view?id=7521683605.
Bauer, S., Clark, D., and Lehr, W. (2009) The Evolution of Internet Congestion. In Research Conference on Communication, Information and Internet Policy (TPRC).
Decentralized Information Group (DIG)
Gilpin, L.H. (2018). Reasonableness Monitors. The Twenty-Third AAAI/SIGAI Doctoral Consortium (DC). https://aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/17361
Gilpin, L.H., Macbeth, J.C., & Florentine, E. (2018). Monitoring Scene Understanders with Conceptual Primitive Decomposition and Commonsense Knowledge. The Sixth Annual Conference on Advances in Cognitive Systems (ACS 2018).
Gilpin, L.H., Bau, D., Yuan, B.Z., Bajawal, A., Specter, M., & Kagal, L. (2018). Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning. The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018).
Capadisli, S., Guy, A., Verborgh, R., Lange, C., Auer, S., & Berners-Lee, T. (2017, June). Decentralised Authoring, Annotations and Notifications for a Read-Write Web with dokieli. In International Conference on Web Engineering (pp. 469-481). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-60131-1_33
Sambra, A., & Kagal, L. (2017, June). Open Governance as a Service. In Proceedings of the 2017 ACM on Web Science Conference (pp. 413-414). ACM. https://dl.acm.org/citation.cfm?id=3098873
App Inventor
Bau, D., Gray, J., Kelleher, C., Sheldon, J., & Turbak, F. (2017). Learnable programming: blocks and beyond. Communications of the ACM, 60(6), 72-80. https://dl.acm.org/citation.cfm?id=3015455
DENG, X., & PATTON, E. W. (2017). Enabling Multi-User Computational Thinking with Collaborative Blocks Programming in MIT App Inventor. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 168. http://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=179
Jane, I. M., MEDLOCK-WALTON, P., & TISSENBAUM, M. (2017). App Inventor VR Editor for Computational Thinking. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 160. https://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=171
RUAN, L. L., PATTON, E. W., & TISSENBAUM, M. (2017). Evaluations of Programming Complexity in App Inventor. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 2. http://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=13
Sherman, M. A. (2017). Detecting student progress during programming activities by analyzing edit operations on their blocks-based programs (Doctoral dissertation, University of Massachusetts Lowell). https://search.proquest.com/docview/1929235847?pq-origsite=gscholar
Tissenbaum, M., Sheldon, J., Seop, L., Lee, C. H., & Lao, N. (2017, April). Critical computational empowerment: Engaging youth as shapers of the digital future. In Global Engineering Education Conference (EDUCON), 2017 IEEE (pp. 1705-1708). IEEE. http://ieeexplore.ieee.org/abstract/document/7943078/
TISSENBAUM, M., SHELDON, J., PATTON, E., GUPTA, A., ZHANG, E., & GOPINATH, D. (2017). Off the Screen, and Into the World of Everyday Objects: Computational Thinking for Youth with the Internet of Things. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 145. https://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=156
Capadisli, S., Guy, A., Lange, C., Auer, S., Sambra, A., & Berners-Lee, T. (2017, May). Linked Data Notifications: a resource-centric communication protocol. In European Semantic Web Conference (pp. 537-553). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-58068-5_33
Student Theses
Master’s Theses
Julius Adebayo, “FairML : ToolBox for diagnosing bias in predictive modeling”
Grace Abuhamad, “The fallacy of equating “blindness” with fairness : ensuring trust in machine learning applications to consumer credit”
Ahmed Alawaji, “Privacy and security risks for national health records systems”
Jessica Van Brummelen, “Tools to create and democratize conversational artificial intelligence”
Kelsey Chan, “Building an online community of creators through MIT App Inventor”
Tianye Chen, “Augmenting anomaly detection for autonomous vehicles with symbolic rules”
Nichole Clark, “Through the Screen and into the World: Augmented Reality Components with MIT App Inventor”
Aubrey Joyce Colter, Evaluating and improving the Usability of MIT App Inventor”
Samuel DeLaughter, “A comparative analysis of denial of service vulnerabilities in network protocols”
Xinyue Deng, “Group collaboration with App Inventor”
Elizabeth Dethy, “Assessing the usefulness of NetworkDissection in identifying the interpretability of facial characterization networks”
Kayode Ezike, “SolidVC : a decentralized framework for Verifiable Credentials on the web”
Nathaniel Fruchter, “Enhancing ISP-consumer security notifications”
Nicola Greco, “Decentralized infrastructure for file storage”
Brandon Karpf, “Dead reckoning : where we stand on privacy and security controls for the Internet of Things”
Keertan Kini, “Vessel: a lightweight container for network analysis”
Nikita Kodali, “Not a zero sum game : how to simultaneously maximize efficiency and privacy in data-driven urban governance”
Natalie Lao, “Developing cloud and shared data capabilities to support primary school students in creating mobile applications that affect their communities”
WeiHua Li, “Helping the Helpers: A Toolkit for Mobile Humanitarian Assistance Apps”
Kevin Liu, “Generating and Adjudicating Digital Legal Agreements Using Ethereum Smart Contracts”
James Howard Loving “Enabling Malware Remediation in Expanding Home Networks”
Zane Markel, “Designing networked objects to achieve reasonable security”
Miranda McClellan, “WebRTC based network performance measurements”
Merry Mou, “Evaluating a TCP model-based network performance measurement method”
Vaikkunth Mugunthan, “Improving the adaptability of differential privacy”
Xavier Mwangi, “Scalable mobility support in future internet architectures”
Cecilia Andrea Testart Pacheco, “Understanding the institutional landscape of cyber security”
Sunoo Park, “On time and order in multiparty computation”
Amn Rahman, “Improving the transparency of government requests for user data from ICT companies”
Das Sourav, “Predicting unknown adverse drug reactions using an unsupervised node embedding algorithm”
Jesse Sowell, “Deficiencies in online privacy policies : factors and policy recommendations”
Mike Specter, “The economics of cryptographic trust : understanding certificate authorities”
Aaron Vontell, “Bility : automated accessibility testing for mobile applications”
Clark Wood, “A formal methods safe harbor”
Benjamin Xie, “Progression of Computational Thinking Skills Demonstrated by App Inventor Users”
Kevin Zhu, “An educational approach to machine learning with mobile applications”
PhD Theses
Greg Falco, “Cybersecurity for urban critical infrastructure”
Leilani Gilpin, “Anomaly Detection through Explanations”.
Natalie Lao, “Reorienting Machine Learning Education Towards Tinkerers and ML-Engaged Citizens”
Sunoo Park, “Cryptography for societal benefit”
Jesse Sowell, “Finding order in a contentious Internet”