Publications
From a simple text prompt, generative-AI image models can create stunningly realistic and creative images bounded, it seems, by only our imagination. These models have achieved this remarkable feat thanks, in part, to the ingestion of billions of images collected from nearly every corner of the internet. Many creators have understandably expressed concern over how their intellectual…
Diagnosis of soil-transmitted helminthiasis and schistosomiasis for surveillance relies on microscopic detection of ova in Kato–Katz (KK) prepared slides. Artificial intelligence (AI)-based platforms for parasitic eggs may be developed using a robust image set with defined labels by reference microscopists. This study aimed to determine interobserver variability among reference…
Online interpersonal harm, such as harassment and discrimination, is prevalent on social media platforms. Most platforms adopt content moderation as the primary solution, relying on measures like bans and content removal. These measures follow principles of punitive justice, which holds that perpetrators of harm should receive punishment in proportion to the offense. However, these strategies…
With drastic changes to abortion policy, the months following the Dobbs leak and subsequent decision in 2022 were a uniquely uncertain and difficult time for abortion access in the United States. To understand experiences of challenges to abortion access during that time, we used a hybrid inductive and deductive thematic coding approach to analyse descriptions of…
Personal mobility data from mobile phones and other sensors are increasingly used to inform policymaking during pandemics, natural disasters, and other humanitarian crises. However, even aggregated mobility traces can reveal private information about individual movements to potentially malicious actors. This paper develops and tests an approach for releasing private mobility data, which…
Understanding how people perceive algorithmic decision-making is remains critical, as these systems are increasingly integrated into areas such as education, healthcare, and criminal justice. These perceptions can shape trust in, compliance with, and the perceived legitimacy of automated systems. Focusing on San Francisco’s decade-long policy of algorithmic school assignments, we draw on…
The representation of mobility in literary narratives has important implications for the cultural understanding of human movement and migration. In this paper, we introduce novel methods for measuring the physical mobility of literary characters through narrative space and time. We capture mobility through geographically defined space, as well as through generic locations such as homes,…
Social protection programs are essential to assisting the poor, but governments and humanitarian agencies are rarely resourced to provide aid to all those in need, so accurate targeting of benefits is critical. In developed economies, targeting decisions typically rely on administrative income data or broad survey-based social registries. In low-income countries, however, poverty…
With funding from a 2019 National Park Service Japanese American Confinement Sites grant, The Bancroft Library digitized the complete set of Form WRA-26 “individual records” for more than 110,000 Japanese Americans incarcerated in War Relocation Authority camps during WWII. The library partnered with Doxie.AI to utilize AI/machine learning to automate text extraction from over 220,000 images;…
In response to the rise of various fringe movements in recent years, from anti-vaxxers to QAnon, there has been increased public and scholarly attention to misinformation and conspiracy theories and the online communities that produce them. However, efforts at understanding the radicalisation process largely focus on those who go on to commit violent crimes. This article draws on three waves…
The 30-chapter book contains a compelling collection of short essays that serves as a beacon for aspiring founders and business leaders alike. In this thought-provoking anthology, the author shares insights, experiences, and valuable lessons learned first-hand in building and funding successful ventures. Each short essay offers a unique perspective on key facets of entrepreneurship, through…
What would it feel like to run outside, right now, and attempt a somersault on the first surface you find? Taking seriously an invitation like this to imagine a (perhaps unlikely) future, prompts the activation of evolutionary machinery in the mind and body that took millions of years to emerge. The ability to answer this question depends upon a surprisingly complex model of yourself, the…
We formalize a notion of a privacy wrapper, defined as an algorithm that can take an arbitrary and untrusted script and produce an output with differential privacy guarantees. Our novel privacy wrapper, named TAHOE, incorporates two design ideas: a type of stability under subsetting, and randomization over subset size. We show that TAHOE imposes differential privacy for every possible script.…
The sudden unexpected rise in monkeypox cases worldwide has become an increasing concern. The zoonotic disease characterized by smallpox-like symptoms has already spread to nearly twenty countries and several continents and is labeled a potential pandemic by experts. monkeypox infections do not have specific treatments. However, since smallpox viruses are similar to monkeypox viruses…
Human errors in criminal investigations have previously led to devastating miscarriages of justice. For example, flaws in forensic identification based on physical or photographic evidence are notoriously unreliable. The criminal justice system has, therefore, started to turn to artificial intelligence (AI) to improve the reliability and fairness of forensic identification. So as not to repeat…
Due to data collection, there is a potential risk concerning security and privacy, so IoT reliability and survivability are of utmost concern. In this paper, we address the concern using two methods. The first method is device identification, which uses an extensive set of machine learning algorithms for identifying IoT devices. The algorithms include Logistic Regression, K- Nearest…
The Internet of Things (IoT) is connecting more devices every day. Security is critical to ensure that the devices operate in a trusted environment. The lack of proper IoT security encourages cybercriminals to target many smart devices across the network and gain sensitive information. Distributed Denial of Service (DDoS) attacks are common in the IoT infrastructure and involve hijacking IoT…