Publications

Publication date: 2024

In response to the rise of various fringe movements in recent years, from anti-vaxxers to QAnon, there has been increased public and scholarly attention to misinformation and conspiracy theories and the online communities that produce them. However, efforts at understanding the radicalisation process largely focus on those who go on to commit violent crimes. This article draws on three waves...

Publication date: 2023
Image data has grown exponentially as systems have increased their ability to collect and store it. Unfortunately, there are limits to human resources both in time and knowledge to fully interpret and manage that data. Computer Vision (CV) has grown in popularity as a discipline for better understanding visual data. Computer Vision has become a powerful tool for imaging analytics in orthopedic...
Publication date: 2023
Total joint arthroplasty (TJA) is becoming one of the most common surgeries within the United States, creating an abundance of analyzable data to improve patient experience and outcomes. Unfortunately, a large majority of this data is concealed in electronic health records only accessible by manual extraction, which takes extensive time and resources. Natural language processing (NLP), a field...
Publication date: 2023
The growth of artificial intelligence (AI) combined with the collection and storage of large amounts of data in the electronic medical record collection (EMR) has created an opportunity for orthopaedic research and translation into the clinical environment. Machine learning (ML) is a type of AI tool well suited for processing the large amount of available data. Specific areas of ML frequently...
Publication date: 2023

What would it feel like to run outside, right now, and attempt a somersault on the first surface you find? Taking seriously an invitation like this to imagine a (perhaps unlikely) future, prompts the activation of evolutionary machinery in the mind and body that took millions of years to emerge. The ability to answer this question depends upon a surprisingly complex model of yourself, the...

Publication date: 2023

We formalize a notion of a privacy wrapper, defined as an algorithm that can take an arbitrary and untrusted script and produce an output with differential privacy guarantees. Our novel privacy wrapper, named TAHOE, incorporates two design ideas: a type of stability under subsetting, and randomization over subset size. We show that TAHOE imposes differential privacy for every possible script....

Publication date: 2023

The sudden unexpected rise in monkeypox cases worldwide has become an increasing concern. The zoonotic disease characterized by smallpox-like symptoms has already spread to nearly twenty countries and several continents and is labeled a potential pandemic by experts. monkeypox infections do not have specific treatments. However, since smallpox viruses are similar to monkeypox viruses...

Publication date: 2023

Human errors in criminal investigations have previously led to devastating miscarriages of justice. For example, flaws in forensic identification based on physical or photographic evidence are notoriously unreliable. The criminal justice system has, therefore, started to turn to artificial intelligence (AI) to improve the reliability and fairness of forensic identification. So as not to repeat...

Publication date: 2023

Due to data collection, there is a potential risk concerning security and privacy, so IoT reliability and survivability are of utmost concern. In this paper, we address the concern using two methods. The first method is device identification, which uses an extensive set of machine learning algorithms for identifying IoT devices. The algorithms include Logistic Regression, K- Nearest Neighbour...

Publication date: 2023

The Internet of Things (IoT) is connecting more devices every day. Security is critical to ensure that the devices operate in a trusted environment. The lack of proper IoT security encourages cybercriminals to target many smart devices across the network and gain sensitive information. Distributed Denial of Service (DDoS) attacks are common in the IoT infrastructure and involve hijacking IoT...

Publication date: 2023

Over the last few decades, the expansion of technology and the internet has led to the number of users proliferating on social media, with a simultaneous increase in hate speech. A critical concern is, hate speech is not only responsible for igniting violence and spreading hatred, but its detection also requires a considerable amount of computing resources and content monitoring by human...

Publication date: 2022

When does web search work? There is a significant amount of research showing where and how web search seems to fail. Researchers identify various contributing causes of web search breakdowns: the for-profit orientation of advertising driven companies, racial capitalism, the agonistic playing field with search engine optimizers and others trying to game the algorithm, or perhaps ‘user error’....

Publication date: 2022

This dissertation explores how machine learning and artificial intelligence can be applied within music composition and production. My approach in this research stems from an underlying perspective that these technologies are deeply intertwined with the people who use them or are affected by them: we can’t hope to understand one side of the picture without looking at the other. From this...

Publication date: 2022

In early 2017, a journalist and search engine expert wrote about “Google’s biggest ever search quality crisis.” Months later, Google hired him as the first Google “Search Liaison” (GSL). By October 2021, when someone posted to Twitter a screenshot of misleading Google Search results for “had a seizure now what,” users tagged the Twitter account of the GSL in reply. The GSL frequently publicly...

Publication date: 2022

Google Scholar has become an important player in the scholarly economy. Whereas typical academic publishers sell bibliometrics, analytics and ranking products, Alphabet, through Google Scholar, provides “free” tools for academic search and scholarly evaluation that have made it central to academic practice. Leveraging political imperatives for open access publishing, Google Scholar has managed...

Publication date: 2022

The IoT network is expected to harbor several zettabytes of information in the future. Since trust and integrity are critical to IoT, it is essential to imbibe trust into the IoT environment for ensuring dependability and reliability. We propose a machine learning-based trustworthy system for the IoT-based smart home environment. Multiple appliances connected through the internet are...

Publication date: 2022

The emergence of trust and solidarity is arguably foundational for economic development and social order. Yet many studies, often survey-based, document large disparities in general trust and social cohesion between countries. Can mutual trust and solidarity arise between people even in areas of low general trust, or do national cultural contexts block such connections? We report an...

Publication date: 2022
There are increasing concerns about the bias and fairness of artificial intelligence (AI) models as they are put into clinical practice. Among the steps for implementing machine learning tools into clinical workflow, model development is an important stage where different types of biases can occur. This report focuses on four aspects of model development where such bias may arise: data...

Pages