Research Publications


Cybersecurity

de Castro, L., Lo, A. W., Reynolds, T., Susan, F., Vaikuntanathan, V., Weitzner, D., & Zhang, N. (2020). SCRAM: A Platform for Securely Measuring Cyber Risk . Harvard Data Science Review. https://doi.org/10.1162/99608f92.b4bb506a

Specter, M., Koppel, J., and Weitzner, D. (2020). The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. https://internetpolicy.mit.edu/securityanalysisofvoatz_public/

Huang, K., Herscovici, S., Madnick, S. (

Madnick, S., Johnson, S., & Huang, K. (2019). What Countries and Companies Can Do When Trade and Cybersecurity Overlap. In Harvard Business Review. https://hbr.org/2019/01/what-countries-and-companies-can-do-when-trade-and-cybersecurity-overlap

Frankle, J., Park, S., Shaar, D., Goldwasser, S., & Weitzner, D. (2018). Practical Accountability of Secret Processes. In 27th USENIX Security Symposium (USENIX Security 18) (pp. 657–674). Baltimore, MD: USENIX Association. Retrieved from https://www.usenix.org/conference/usenixsecurity18/presentation/frankie 

Weitzner, D. (2018). Promoting Economic Prosperity in Cyberspace. Ethics & International Affairs (Vol. 32, no. 4 (2018). pp. 425-439).

Feigenbaum, J, & Weitzner, D. (2018). On the incommensurability of laws and technical mechanisms: Or, what cryptography can’t do. In Cambridge International Workshop on Security Protocols. (pp. 266-279. Springer, Cham, 2018).

Weitzner, D. (2018). U.S. Privacy Legislation: Now Is The Time. From Boston Bar Association – Keynote address 2nd Annual Privacy & Cybersecurity Conference. https://internetpolicy.mit.edu/wp-content/uploads/2018/05/IPRI-Weitzner-BBA-Privacy-NowIsTime-2018.pdf

Brenner, J. (2017, March). Keeping America Safe: Toward More Secure Networks For Critical Sectors. https://internetpolicy.mit.edu/reports/Report-IPRI-CIS-CriticalInfrastructure-2017-Brenner.pdf

AI Policy

Gilpin, L.H., Testart, C., Frutchter, N., and Adebayo J. (2018). Explaining Explanations to Society. NIPS Workshop on Ethical, Social and Governance Issues in AI.

Frankle, J. & Carbin, M. (2018). The Lottery Ticket Hypothesis: Finding Sparse, Trainable Neural Networks. arXiv.org. https://arxiv.org/abs/1803.03635. Related blog post: https://internetpolicy.mit.edu/neural-networks-and-the-lottery-ticket-hypothesis/. (This work won the ICLR 2019 Best Paper Award.)

Gilpin, L.H., Olson, D., &  Alrashed, T. (2018). Perception of Speaker Personality Traits Using Speech Signals. CHI 2018 – Late Breaking Reports. https://dl.acm.org/citation.cfm?id=3170427.3188557

Gilpin, L.H., Zaman, C., Olson, D., & Yuan, B.Z. (2018). Simulating Human Explanations of Visual Scene Understanding. Human Robot Interaction (HRI) 2018. http://delivery.acm.org/10. 1145/3180000/3176994/p115-gilpin.pdf

Ahmad, W. (2018). Dealing with Fake News: Policy and Technical Measures. https://internetpolicy.mit.edu/wp-content/uploads/2018/04/Fake-news-recommendations-Wajeeha-MITs-IPRI.pdf

Gilpin, L. H., & Yuan, B. Z. AAAI Publications. https://www.aaai.org/ocs/index.php/SSS/SSS17/paper/view/15322

Privacy

Adebayo, J; Muelly, M; Liccardi, I; & Kim, B. (2020). Debugging Tests for Model Explanations. NeurIPS 2020 – Conference on Neural Information Processing Systems.

Nguyen, S. & Liccardi, I (2020). COVID-19, Data Privacy & App Design An analysis of privacy design elements of COVID-19 Apps. Tech Report 2020. Related blog post: https://internetpolicy.mit.edu/covid-19-apps-data-transparency-and-data-governance-through-ux-ui-design/.

Ahmad, W. & Liccardi, I (2020). Addressing Anonymous Abuses: Measuring the Effects of Technical Mechanisms on Reported User Behaviors. CHI 2020 – ACM Conference on Human Factors in Computing Systems.

Nouwens, M; Liccardi, I; Veale, M; Karger, D; & Kagal, L. (2020). Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence. CHI 2020 – ACM Conference on Human Factors in Computing Systems.

Suresh, H; Lao, N; & Liccardi, I (2020). Misplaced Trust: Measuring the Interference of Machine Learning in Human Decision-Making. Web Science 2020 – ACM WEB Science Conference.

Fruchter, N. & Liccardi, I. (2018). Consumer Attitudes Towards Privacy and Security in Home Assistants. CHI 2018 – ACM Conference Extended Abstract on Human Factors in Computing Systems.

Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D. J., & Shadbolt, N. (2017, May). Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 5208-5220). ACM. http://people.csail.mit.edu/ilaria/papers/CHI2017.pdf

Sher, V., Bemis, K. G., Liccardi, I., & Chen, M. (2017, June). An Empirical Study on the Reliability of Perceiving Correlation Indices using Scatterplots. In Computer Graphics Forum (Vol. 36, No. 3, pp. 61-72). http://people.csail.mit.edu/ilaria/papers/EuroVis2017.pdf

Binns, R., Zhao, J., Van Kleek, M., Shadbolt, N., Liccardi, I., & Weitzner, D. (2017, May). My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems(pp. 2403-2409). ACM. http://people.csail.mit.edu/ilaria/papers/CHI2017-WIP.pdf

Advanced Network Architecture (ANA)

Ahmad, W. & Dethy, E. (2019). “Preventing Surveillance Cities: Developing a Set of Fundamental Privacy Provisions”.  Journal of Science Policy & Governance, (Vol. 15, Issue 1). Available at: http://www.sciencepolicyjournal.org/uploads/5/4/3/4/5434385/ahmad_dethy_jspg_v15.pdf

Testart, C., Richter, P., King, A., Dainotti, A., & Clark, D. (2019). “Profiling BGP Serial Hijackers: Capturing Persistent Misbehavior in the Global Routing Table.” Proceedings of the Internet Measurement Conference. ACM, 2019. Paper download: https://dl.acm.org/citation.cfm?doid=3355369.3355581 (This work won a Best Paper award.)

Ahmad, W. (2019). “Why Botnets Persist: Designing Effective Technical and Policy Interventions”. Paper download: https://internetpolicy.mit.edu/publications-ipri-2019-02/

Klym, N. and Clark, D. (2019). “The Future of the Ad-Supported Internet Ecosystem”. Paper download: https://internetpolicy.mit.edu/publications-ipri-2019-01/

Clark, D. (2018). Designing an Internet. MIT press. https://mitpress.mit.edu/books/designing-internet

Wolff, J. and Lehr, W. (2018). “When cyber threats loom, what can state and local governments do?” Georgetown Journal of International Affairs.

Wolff, J. and Lehr, W. (2018). “Roles for Policy-Makers in Emerging Cyber Insurance Industry Partnerships,” TPRC46: Research Conference on Communications, Information and Internet Policy, American University, Washington, DC. Abstract available at SSRN: https://ssrn.com/abstract=3141409.

Testart, C. (2018). Reviewing a Historical Internet Vulnerability: Why Isn’t BGP More Secure and What Can We Do About it? TPRC  (Vol. 46).

Lehr, W., Clark, D., Bauer, S., Berger, A., and Richter, P. (2018), “Whither the Public Internet?,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3141969.

Sicker, D. and Lehr, W.,(2018), “Telecom Déjà Vu: A Model for Sharing in Broadband Access”. Abstract available at SSRN: https://ssrn.com/abstract=3142172.

Lehr, W. and Sicker, D. (2018), “Communications Act 2021,” Journal of High Technology Law, (Vol. 18, No. 2 pp. 270-330). Available at https://cpb-us-e1.wpmucdn.com/sites.suffolk.edu/dist/5/1153/files/2018/05/Communications-Act-2021-1fkmij5.pdf.

Bauer, S. and Lehr, W. (2018), “Measuring Mobile Broadband Performance,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3138610.

Karimi, P., Raychaudhuri, D., Lehr, W., and Seskar, I. (2018), “SMAP: A Scalable and Distributed Architecture for Dynamic Spectrum Management,” IEEE DySPAN 2018, Seoul, Korea, October 2018.

Gomez, M., Lehr, W., Weiss, M., and McHenry, G. (2018), “Spectrum Valuation: Implications for Sharing and Secondary Markets,” TPRC46. Available at SSRN: https://ssrn.com/abstract=3142182.

Dhamdhere, A., Clark, D., et al. (2018), Inferring Persistent Interdomain Congestion, SIGCOMM ’18, August 20–25, 2018, Budapest, Hungary. (This work won a Best Paper award.)

Clark, D., Dhamdhere, A., Claffy, K.C., and Luckie, M. (2018), Detecting Internet Congestion at Interconnection Points: An Empirical Analysis. TPRC 46.

Richter, P., Padmanabhan, R., Spring, N., Berger, A., and Clark, D. (2018) Advancing the Art of Internet Edge Outage Detection. ACM Internet Measurement Conference, October 2018, Boston MA.

Claffy, K.C., and Clark, D. (2017). The 9th Workshop on Active Internet Measurements (AIMS-9) Report. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, (47(5), 35-38). 

https://www.caida.org/publications/papers/2017/aims2017_report/aims2017_report.pdf

Clark, D. (2017). Workshop on Internet Economics (WIE2016) Final Report. ACM SIGCOMM Computer Communication Review, 47(3), 34-39. https://ccronline.sigcomm.org/wp-content/uploads/2017/08/sigcomm-ccr-final99-1.pdf

Fruchter, N., Karpf, B., & Liccardi, I. (2017). Insights into Unsolicited Consumer Thoughts on IoT Device Privacy and Security.  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2925355

Giotsas, V., Smaragdakis, G., Dietzel, C., Richter, P., Feldmann, A., & Berger, A. (2017). Inferring BGP Blackholing Activity in the Internet. http://people.csail.mit.edu/awberger/papers/Inferring_BGP_Blackholing_Activity_in_the_Internet.pdf

Giotsas, V., Dietzel, C., Smaragdakis, G., Feldmann, A., Berger, A., & Aben, E. (2017, August). Detecting Peering Infrastructure Outages in the Wild. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (pp. 446-459). ACM. https://dl.acm.org/citation.cfm?id=3098855

Stocker, V., Smaragdakis, G., Lehr, W., & Bauer, S. (2017). The growing complexity of content delivery networks: Challenges and implications for the Internet ecosystem. Telecommunications Policy. (Vol. 41 (10), No. 3, pp. 1003-1016). http://www.sciencedirect.com/science/article/pii/S0308596116302476

Klym, N. and Clark, D. (2017) The Future of the Ad-Supported Internet Ecosystem. IPRI Working paper.

Wolff, J. and Lehr, W. (2017), “Degrees of Ignorance About the Costs of Data Breaches: What Policymakers Can and Can’t Do About the Lack of Good Empirical Data,” 45th Research Conference on Communications, Information and Internet Policy (TPRC45), September 2017, Alexandria, VA. Available at SSRN: https://ssrn.com/abstract=2943867

Lehr, W. and Sicker D. (2017), “Would you like your Internet with or without Video,” Journal of Law, Technology & Policy, (vol. 2017 (issue 1 Spring)). Available at http://illinoisjltp.com/journal/wp-content/uploads/2017/05/Lehr.pdf.

Klym, N., and Clark, D. (Working draft: October 2017) The Convergence of Content and Conversation: Approaches to Regulating Social Media.

Lehr, W. and Sharafat, A. (2017), “ICT Engines for Sustainable Development,” in A. Sharafat & W. Lehr (eds.), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://handle.itu.int/11.1002/pub/80fc3264-en.

Sharafat, A. & Lehr, W. (Eds.) (2017), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://www.itu.int/pub/D-GEN-ICT_SDGS.01-2017.

Lehr (2017), “Analysis of Proposed Modifications to the CBRS PAL License Framework,” Ex parte comment submitted to Federal Communications Commission in the Matter of Promoting Investment in the 3550-3700 MHz Band, (Docket 17–258, December 2017.) Available at https://ecfsapi.fcc.gov/file/1228227728544/Lehr%20CBRS%20Comments%2017-258.pdf.

Klym, N. and Clark, D. (2017) The Future of the Ad-Supported Internet Ecosystem. IPRI Working paper.

Wolff, J. and Lehr, W. (2017), “Degrees of Ignorance About the Costs of Data Breaches: What Policymakers Can and Can’t Do About the Lack of Good Empirical Data,” 45th Research Conference on Communications, Information and Internet Policy (TPRC45), September 2017, Alexandria, VA. Available at SSRN: https://ssrn.com/abstract=2943867.

Lehr, W. and Sicker D. (2017), “Would you like your Internet with or without Video,” Journal of Law, Technology & Policy, (vol. 2017 (issue 1 Spring)). Available at http://illinoisjltp.com/journal/wp-content/uploads/2017/05/Lehr.pdf.

Klym, N., and Clark, D. (Working draft: October 2017) The Convergence of Content and Conversation: Approaches to Regulating Social Media.

Lehr, W. and Sharafat, A. (2017), “ICT Engines for Sustainable Development,” in A. Sharafat & W. Lehr (eds.), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://handle.itu.int/11.1002/pub/80fc3264-en.

Sharafat, A. & Lehr, W. (Eds.) (2017), ICT-centric economic growth, innovation and job creation, Geneva, Switzerland: International Telecommunications Union (ITU). Available at http://www.itu.int/pub/D-GEN-ICT_SDGS.01-2017.

Lehr (2017), “Analysis of Proposed Modifications to the CBRS PAL License Framework,” Ex parte comment submitted to Federal Communications Commission in the Matter of Promoting Investment in the 3550-3700 MHz Band, (Docket 17–258, December 2017.) Available at https://ecfsapi.fcc.gov/file/1228227728544/Lehr%20CBRS%20Comments%2017-258.pdf.

Iosifidis, G., Koutsopoulos, I., & Smaragdakis, G. (2016). Distributed Storage Control Algorithms for Dynamic Networks. IEEE/ACM Transactions on Networking. http://ieeexplore.ieee.org/abstract/document/7797142/?reload=true.

Poularakis, K., Iosifidis, G., Smaragdakis, G., & Tassiulas, L. (2017). One Step at a Time: Optimizing SDN Upgrades in ISP Networks. In Proceedings of IEEE INFOCOM. http://people.csail.mit.edu/gsmaragd/publications/Infocom2017/Infocom2017.pdf.

Karpf, B. A. (2017). Dead reckoning: where we stand on privacy and security controls for the Internet of Things (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/111231.

Loving, J. H. (2017). Enabling malware remediation in expanding home networks (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/108839.

Markel, Z. A. (2017). Designing networked objects to achieve reasonable security (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/111236.

Van Kleek, M., Liccardi, I., Binns, R., Zhao, J., Weitzner, D. J., & Shadbolt, N. (2017). Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 5208-5220). ACM. https://dl.acm.org/citation.cfm?id=3025556.

Sher, V., Bemis, K. G., Liccardi, I., & Chen, M. (2017). An Empirical Study on the Reliability of Perceiving Correlation Indices using Scatterplots. In Computer Graphics Forum (Vol. 36, No. 3, pp. 61-72). http://onlinelibrary.wiley.com/doi/10.1111/cgf.13168/full.

Binns, R., Zhao, J., Van Kleek, M., Shadbolt, N., Liccardi, I., & Weitzner, D. (2017, May). My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making. In Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2403-2409). ACM. https://dl.acm.org/citation.cfm?id=3053255.

Wolff, J. and Lehr, W. (2016), “Ex-post mitigation strategies for theft of non-financial data,” TPRC44, September 2016, Alexandria, VA. Available at available at SSRN: http://ssrn.com/abstract=2756842 or http://dx.doi.org/10.2139/ssrn.2756842.

Luckie, M., Dhamdhere, A., Huffaker, B., Clark, D., and Claffy, K. C. (2016) bdrmap: Inference of Borders Between IP Networks. In Proceedings of the ACM SIGCOMM Internet Measurement Conference (IMC).

Lehr, W. (2016) “Spectrum License Design, Sharing, and Exclusion Rights,” University of Illinois Journal of Law, Technology & Policy, (Vol. 2016, Spring, No. 1, 1-33).

Bhattarai, S., Park, J., Gao, B., Bian, K., and Lehr, W. (2016), “An Overview of Dynamic Spectrum Sharing: Ongoing Initiatives, Challenges, and a Roadmap for Future Research,” IEEE Transactions on Cognitive Communications and Networking, (2(2), 110-28).

Bhattarai, S., Jung-Min Park, and Lehr, W. (2016), “Exploiting Spatial-White-Space Opportunities in Dynamic Spectrum Sharing,” submitted to IEEE Globecom 2016, April 2016.

Weiss, M. and Lehr, W. (2016), “Enforcement in Spectrum Sharing,” submitted to IEEE JSAC Special Issue on Spectrum Sharing and Aggregation for Future Wireless Networks, April 2016.

Richter, P., Smaragdakis, G., Plonka, D., & Berger, A. (2016). Beyond counting: new perspectives on the active IPv4 address space. arXiv preprint arXiv:1606.00360. https://arxiv.org/abs/1606.00360

Stocker, V., Smaragdakis, G., Lehr, W., & Bauer, S. (2016). Content may be king, but (peering) location matters: A progress report on the evolution of content delivery in the internet. https://www.econstor.eu/handle/10419/148708

Claffy, K. C., Clark, D. D., Bauer, S., & Dhamdhere, A. D. (2016). Policy Challenges in Mapping Internet Interdomain Congestion. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2756868

Bauer, S.,  Lehr, W., and Mou, M. (2016). Improving the Measurement and Analysis of Gigabit Broadband Networks. Browser Download This Paper. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2757050

Bauer, S., & Lehr, W. (2015, September). Improving the Measurement and Analysis of Gigabit Broadband Network Performance. In Telecommunications Policy Research Conference.

Rock, C. T. (2016). Examining Key Mobility Resources through Denial of Service Attacks on proposed Global Name Resolution Services. https://dspace.mit.edu/handle/1721.1/104385

Jing, Y. (2016). Evaluating caching mechanisms in future Internet architectures (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/106120

Xu, S. (2016). Modeling user network transitions: various approaches (Master’s thesis, Massachusetts Institute of Technology). https://dspace.mit.edu/handle/1721.1/106397

Clark, D., Claffy, K.C.: “Anchoring policy development around stable pointsTelecommunications Policy  (Volume 39 Issue 10, November 2015).

Bauer, S., Lehr, W., and Hung, S. (2015), “Gigabit Broadband, Interconnection Propositions, and the Challenge of Managing Expectations,” TPRC2015, Alexandria, VA, September 2015. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2586805.

Lehr, W., Kenneally, E., and Bauer, S. (2015), “The Road to an Open Internet is Paved with Pragmatic Disclosure & Transparency Policies,” 43rd Research Conference on Communication, Information and Internet Policy Paper (TPRC43). Available at https://ssrn.com/abstract=2587718.

Weiss, M., Lehr, W., Acker, A., and Gomez, M. (2015), Socio-Technical Considerations for Spectrum Access System (SAS) Design, IEEE DySPAN 2015. Available at http://d-scholarship.pitt.edu/25828/1/dyspan_revisions_4.pdf.

Reed, J., Park, J., Lehr, W., Sayed, A., and Woodney, L. (2015), “Executive Summary: The Second Enhancing Access to the Radio Spectrum Workshop,” a National Science Foundation Sponsored Event, Arlington, VA, 19-20 October 2015. Available at https://earsworkshop.wireless.vt.edu/pdfs/EARS_2015_workshop_report_final_ver.pdf.

Lehr, W., Kahn, C., and Kutsche C. (2015), “Final Report: Federal-Commercial Spectrum Sharing Workshop: Models, Applications, and Impacts of Incentives for Sharing,” NITRD Wireless Spectrum R&D Senior Steering Group Workshop VII Report, Stevens Institute of Technology, Hoboken, NJ, March 19, 2015. Available at https://www.nitrd.gov/nitrdgroups/images/d/dc/WSRD_Workshop_VII_Report.pdf.

Claffy, K.C. and Clark, D., (2014). Platform Models for Sustainable Internet Regulation. Journal of Information Policy (vol. 4 pp. 463-488). doi:10.5325/jinfopoli.4.2014.0463.

Clark, D., Bauer, S., Lehr, W., Claffy, K.C., Dhamdhere, A.D., Huffaker, B., Luckie, M. “Measurement and Analysis of Internet Interconnection and Congestion” Journal of Information Policy, (Vol 4).

Lehr, W. and Oliver, M. (2014), “Small cells and the mobile broadband ecosystem,” Euro ITS2014, Brussels, June 2014. Available at http://econpapers.repec.org/paper/zbwitse14/101406.htm.

Lehr, W. (2014) “Benefits of Competition in Mobile Services,” a white paper submitted as Ex Parte to FCC in the matter of Wireless Telecommunications Bureau Seeks Comment on the State of Mobile Wireless Competition, (WT Docket No. 13-135, 24, March 2014). Available at http://apps.fcc.gov/ecfs/document/view?id=7521094963.

Lehr, W. (2014), “PALs as Options to Exclude GAA,” Reply Comments submitted in the matter of Amendment of the Commission’s Rules with Regard to Commercial Operations in the 3550-3650 MHz Band, (GN Docket 12-354, August 15, 2014). Available at http://apps.fcc.gov/ecfs/document/view?id=7521763142.

Lehr, W. (2014), “The Mistake of One-Sided Open Internet Policy,” a white paper, prepared with support from the American Cable Association, July 2014. Available at http://apps.fcc.gov/ecfs/document/view?id=7521683605.

Bauer, S., Clark, D., and Lehr, W. (2009) The Evolution of Internet Congestion. In Research Conference on Communication, Information and Internet Policy (TPRC).

Decentralized Information Group (DIG)

Gilpin, L.H. (2018). Reasonableness Monitors. The Twenty-Third AAAI/SIGAI Doctoral Consortium (DC). https://aaai.org/ocs/index.php/AAAI/AAAI18/paper/view/17361

Gilpin, L.H., Macbeth, J.C., & Florentine, E. (2018). Monitoring Scene Understanders with Conceptual Primitive Decomposition and Commonsense Knowledge. The Sixth Annual Conference on Advances in Cognitive Systems (ACS 2018).

Gilpin, L.H., Bau, D., Yuan, B.Z., Bajawal, A., Specter, M., & Kagal, L. (2018). Explaining Explanations: An Approach to Evaluating Interpretability of Machine Learning. The 5th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2018).

Capadisli, S., Guy, A., Verborgh, R., Lange, C., Auer, S., & Berners-Lee, T. (2017, June). Decentralised Authoring, Annotations and Notifications for a Read-Write Web with dokieli. In International Conference on Web Engineering (pp. 469-481). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-60131-1_33

Sambra, A., & Kagal, L. (2017, June). Open Governance as a Service. In Proceedings of the 2017 ACM on Web Science Conference (pp. 413-414). ACM. https://dl.acm.org/citation.cfm?id=3098873

App Inventor

Bau, D., Gray, J., Kelleher, C., Sheldon, J., & Turbak, F. (2017). Learnable programming: blocks and beyond. Communications of the ACM, 60(6), 72-80. https://dl.acm.org/citation.cfm?id=3015455

DENG, X., & PATTON, E. W. (2017). Enabling Multi-User Computational Thinking with Collaborative Blocks Programming in MIT App Inventor. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 168. http://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=179

Jane, I. M., MEDLOCK-WALTON, P., & TISSENBAUM, M. (2017). App Inventor VR Editor for Computational Thinking. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 160. https://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=171

RUAN, L. L., PATTON, E. W., & TISSENBAUM, M. (2017). Evaluations of Programming Complexity in App Inventor. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 2. http://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=13

Sherman, M. A. (2017). Detecting student progress during programming activities by analyzing edit operations on their blocks-based programs (Doctoral dissertation, University of Massachusetts Lowell). https://search.proquest.com/docview/1929235847?pq-origsite=gscholar

Tissenbaum, M., Sheldon, J., Seop, L., Lee, C. H., & Lao, N. (2017, April). Critical computational empowerment: Engaging youth as shapers of the digital future. In Global Engineering Education Conference (EDUCON), 2017 IEEE (pp. 1705-1708). IEEE. http://ieeexplore.ieee.org/abstract/document/7943078/

TISSENBAUM, M., SHELDON, J., PATTON, E., GUPTA, A., ZHANG, E., & GOPINATH, D. (2017). Off the Screen, and Into the World of Everyday Objects: Computational Thinking for Youth with the Internet of Things. Siu-cheung KONG The Education University of Hong Kong, Hong Kong, 145. https://www.eduhk.hk/cte2017/doc/CTE2017%20Proceedings.pdf#page=156

Capadisli, S., Guy, A., Lange, C., Auer, S., Sambra, A., & Berners-Lee, T. (2017, May). Linked Data Notifications: a resource-centric communication protocol. In European Semantic Web Conference (pp. 537-553). Springer, Cham. https://link.springer.com/chapter/10.1007/978-3-319-58068-5_33

Student Theses

Master’s Theses

Julius Adebayo, “FairML : ToolBox for diagnosing bias in predictive modeling

Grace Abuhamad, “The fallacy of equating “blindness” with fairness : ensuring trust in machine learning applications to consumer credit

Ahmed Alawaji, “Privacy and security risks for national health records systems

Jessica Van Brummelen, “Tools to create and democratize conversational artificial intelligence

Kelsey Chan, “Building an online community of creators through MIT App Inventor

Tianye Chen, “Augmenting anomaly detection for autonomous vehicles with symbolic rules

Nichole Clark, “Through the Screen and into the World: Augmented Reality Components with MIT App Inventor

Aubrey Joyce Colter, Evaluating and improving the Usability of MIT App Inventor

Samuel DeLaughter, “A comparative analysis of denial of service vulnerabilities in network protocols

Xinyue Deng, “Group collaboration with App Inventor

Elizabeth Dethy, “Assessing the usefulness of NetworkDissection in identifying the interpretability of facial characterization networks

Kayode Ezike, “SolidVC : a decentralized framework for Verifiable Credentials on the web

Nathaniel Fruchter, “Enhancing ISP-consumer security notifications

Nicola Greco, “Decentralized infrastructure for file storage

Brandon Karpf, “Dead reckoning : where we stand on privacy and security controls for the Internet of Things

Keertan Kini, “Vessel: a lightweight container for network analysis

Nikita Kodali, “Not a zero sum game : how to simultaneously maximize efficiency and privacy in data-driven urban governance

Natalie Lao, “Developing cloud and shared data capabilities to support primary school students in creating mobile applications that affect their communities”

WeiHua Li, “Helping the Helpers: A Toolkit for Mobile Humanitarian Assistance Apps

Kevin Liu, “Generating and Adjudicating Digital Legal Agreements Using Ethereum Smart Contracts

James Howard LovingEnabling Malware Remediation in Expanding Home Networks

Zane Markel, “Designing networked objects to achieve reasonable security

Miranda McClellan, “WebRTC based network performance measurements

Merry Mou, “Evaluating a TCP model-based network performance measurement method

Vaikkunth Mugunthan, “Improving the adaptability of differential privacy

Xavier Mwangi, “Scalable mobility support in future internet architectures

Cecilia Andrea Testart Pacheco, “Understanding the institutional landscape of cyber security

Sunoo Park, “On time and order in multiparty computation

Amn Rahman, “Improving the transparency of government requests for user data from ICT companies

Das Sourav, “Predicting unknown adverse drug reactions using an unsupervised node embedding algorithm

Jesse Sowell, “Deficiencies in online privacy policies : factors and policy recommendations

Mike Specter, “The economics of cryptographic trust : understanding certificate authorities

Danny Tang, “Empowering novices to understand and use machine learning with personalized image classification models, intuitive analysis tools, and MIT App Inventor

Aaron Vontell, “Bility : automated accessibility testing for mobile applications

Clark Wood, “A formal methods safe harbor

Benjamin Xie, “Progression of Computational Thinking Skills Demonstrated by App Inventor Users”

Kevin Zhu, “An educational approach to machine learning with mobile applications

PhD Theses

Greg Falco, “Cybersecurity for urban critical infrastructure

Leilani Gilpin, “Anomaly Detection through Explanations”.

Natalie Lao, “Reorienting Machine Learning Education Towards Tinkerers and ML-Engaged Citizens”

Sunoo Park, “Cryptography for societal benefit

Jesse Sowell, “Finding order in a contentious Internet