Aylin Caliskan
Aylin Caliskan
Assistant Professor of Computer Science, The George Washington University
Bestätigte E-Mail-Adresse bei gwu.edu - Startseite
Zitiert von
Zitiert von
Semantics derived automatically from language corpora contain human-like biases
A Caliskan, J Bryson, A Narayanan
Science 356 (6334), 183-186, 2017
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Li, A Narayanan, C Voss, F Yamaguchi, ...
24th Usenix Security Symposium, 2015
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 2014
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization.
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies 7384, 299-318, 2012
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Security Symposium (NDSS) 2018, 2018
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network
A Caliskan-Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35--46, 2014
Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text
A Caliskan, R Greenstadt
2012 IEEE Sixth International Conference on Semantic Computing, 121-125, 2012
Semantics derived automatically from language corpora necessarily contain human biases
AC Islam, JJ Bryson, A Narayanan
CoRR, abs/1608.07187, 2016
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
RG Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael ...
Proceedings on Privacy Enhancing Technologies, 389–408, 2019
How privacy flaws affect consumer perception
S Afroz, AC Islam, J Santell, A Chapin, R Greenstadt
2013 Third Workshop on Socio-Technical Aspects in Security and Trust, 10-17, 2013
Stylometric fingerprints and privacy behavior in textual data
A Caliskan-Islam
Drexel University, 2015
Poster: Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
Detecting Emergent Intersectional Biases: Contextualized Word Embeddings Contain a Distribution of Human-like Biases
W Guo, A Caliskan
arXiv preprint arXiv:2006.03955, 2020
From language to family and back: Native language and language family identification from english text
A Stolerman, A Caliskan, R Greenstadt
Proceedings of the 2013 NAACL HLT Student Research Workshop, 32-39, 2013
A set of distinct facial traits learned by machines is not predictive of appearance bias in the wild
R Steed, A Caliskan
AI and Ethics, 2021
Iterative Effect-Size Bias in Ridehailing: Measuring Social Bias in Dynamic Pricing of 100 Million Rides
A Pandey, A Caliskan
arXiv preprint arXiv:2006.04599, 2020
Social biases in word embeddings and their relation to human cognition
A Caliskan, M Lewis
https://psyarxiv.com/d84kg, 2020
ValNorm: A New Word Embedding Intrinsic Evaluation Method Reveals Valence Biases are Consistent Across Languages and Over Decades
A Toney, A Caliskan
arXiv preprint arXiv:2006.03950, 2020
How do we decide how much to reveal?
A Caliskan-Islam
ACM SIGCAS Computers and Society 45 (1), 14-15, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20