Zobrazeno 1 - 10
of 178
pro vyhledávání: '"FEIGENBAUM, JOAN"'
Autor:
Malchik, Caleb, Feigenbaum, Joan
Internet companies derive value from users by recording and influencing their behavior. Users can pressure companies to refrain from certain invasive and manipulative practices by selectively withdrawing their attention, an exercise of data leverage
Externí odkaz:
http://arxiv.org/abs/2201.10677
Autor:
Judson, Samuel, Feigenbaum, Joan
Insightful interdisciplinary collaboration is essential to the principled governance of complex technologies, like those produced by modern computing research and development. Technical research on the interaction between computation and society ofte
Externí odkaz:
http://arxiv.org/abs/2201.07413
Autor:
Meng, Xianrui, Feigenbaum, Joan
Although machine learning (ML) is widely used for predictive tasks, there are important scenarios in which ML cannot be used or at least cannot achieve its full potential. A major barrier to adoption is the sensitive nature of predictive queries. Ind
Externí odkaz:
http://arxiv.org/abs/2011.04789
Autor:
Barman, Ludovic, Dacosta, Italo, Zamani, Mahdi, Zhai, Ennan, Pyrgelis, Apostolos, Ford, Bryan, Hubaux, Jean-Pierre, Feigenbaum, Joan
Organizational networks are vulnerable to traffic-analysis attacks that enable adversaries to infer sensitive information from the network traffic - even if encryption is used. Typical anonymous communication networks are tailored to the Internet and
Externí odkaz:
http://arxiv.org/abs/1710.10237
The question of how government agencies can acquire actionable, useful information about legitimate but unknown targets without intruding upon the electronic activity of innocent parties is extremely important. We address this question by providing e
Externí odkaz:
http://arxiv.org/abs/1607.03659
Tor users are vulnerable to deanonymization by an adversary that can observe some Tor relays or some parts of the network. We demonstrate that previous network-aware path-selection algorithms that propose to solve this problem are vulnerable to attac
Externí odkaz:
http://arxiv.org/abs/1511.05453
Two-party secure function evaluation (SFE) has become significantly more feasible, even on resource-constrained devices, because of advances in server-aided computation systems. However, there are still bottlenecks, particularly in the input validati
Externí odkaz:
http://arxiv.org/abs/1506.02954
Motivated by the effectiveness of correlation attacks against Tor, the censorship arms race, and observations of malicious relays in Tor, we propose that Tor users capture their trust in network elements using probability distributions over the sets
Externí odkaz:
http://arxiv.org/abs/1406.3583
Autor:
Feigenbaum, Joan, Ford, Bryan
Obtaining and maintaining anonymity on the Internet is challenging. The state of the art in deployed tools, such as Tor, uses onion routing (OR) to relay encrypted connections on a detour passing through randomly chosen relays scattered around the In
Externí odkaz:
http://arxiv.org/abs/1312.5307