Publications

Publication date:

From a simple text prompt, generative-AI image models can create stunningly realistic and creative images bounded, it seems, by only our imagination. These models have achieved this remarkable feat thanks, in part, to the ingestion of billions of images collected from nearly every corner of the internet. Many creators have understandably expressed concern over how their intellectual…

Publication date:

Diagnosis of soil-transmitted helminthiasis and schistosomiasis for surveillance relies on microscopic detection of ova in Kato–Katz (KK) prepared slides. Artificial intelligence (AI)-based platforms for parasitic eggs may be developed using a robust image set with defined labels by reference microscopists. This study aimed to determine interobserver variability among reference…

Publication date:

Online interpersonal harm, such as harassment and discrimination, is prevalent on social media platforms. Most platforms adopt content moderation as the primary solution, relying on measures like bans and content removal. These measures follow principles of punitive justice, which holds that perpetrators of harm should receive punishment in proportion to the offense. However, these strategies…

Publication date:

With drastic changes to abortion policy, the months following the Dobbs leak and subsequent decision in 2022 were a uniquely uncertain and difficult time for abortion access in the United States. To understand experiences of challenges to abortion access during that time, we used a hybrid inductive and deductive thematic coding approach to analyse descriptions of…

Publication date:

Personal mobility data from mobile phones and other sensors are increasingly used to inform policymaking during pandemics, natural disasters, and other humanitarian crises. However, even aggregated mobility traces can reveal private information about individual movements to potentially malicious actors. This paper develops and tests an approach for releasing private mobility data, which…

Publication date:

Understanding how people perceive algorithmic decision-making is remains critical, as these systems are increasingly integrated into areas such as education, healthcare, and criminal justice. These perceptions can shape trust in, compliance with, and the perceived legitimacy of automated systems. Focusing on San Francisco’s decade-long policy of algorithmic school assignments, we draw on…

Publication date:

The representation of mobility in literary narratives has important implications for the cultural understanding of human movement and migration. In this paper, we introduce novel methods for measuring the physical mobility of literary characters through narrative space and time. We capture mobility through geographically defined space, as well as through generic locations such as homes,…

Publication date:

Social protection programs are essential to assisting the poor, but governments and humanitarian agencies are rarely resourced to provide aid to all those in need, so accurate targeting of benefits is critical. In developed economies, targeting decisions typically rely on administrative income data or broad survey-based social registries. In low-income countries, however, poverty…

Publication date:

With funding from a 2019 National Park Service Japanese American Confinement Sites grant, The Bancroft Library digitized the complete set of Form WRA-26 “individual records” for more than 110,000 Japanese Americans incarcerated in War Relocation Authority camps during WWII. The library partnered with Doxie.AI to utilize AI/machine learning to automate text extraction from over 220,000 images;…

Publication date:

In response to the rise of various fringe movements in recent years, from anti-vaxxers to QAnon, there has been increased public and scholarly attention to misinformation and conspiracy theories and the online communities that produce them. However, efforts at understanding the radicalisation process largely focus on those who go on to commit violent crimes. This article draws on three waves…

Publication date:

The 30-chapter book contains a compelling collection of short essays that serves as a beacon for aspiring founders and business leaders alike. In this thought-provoking anthology, the author shares insights, experiences, and valuable lessons learned first-hand in building and funding successful ventures. Each short essay offers a unique perspective on key facets of entrepreneurship, through…

Publication date:
Image data has grown exponentially as systems have increased their ability to collect and store it. Unfortunately, there are limits to human resources both in time and knowledge to fully interpret and manage that data. Computer Vision (CV) has grown in popularity as a discipline for better understanding visual data. Computer Vision has become a powerful tool for imaging analytics in orthopedic…
Publication date:
Total joint arthroplasty (TJA) is becoming one of the most common surgeries within the United States, creating an abundance of analyzable data to improve patient experience and outcomes. Unfortunately, a large majority of this data is concealed in electronic health records only accessible by manual extraction, which takes extensive time and resources. Natural language processing (NLP), a field…
Publication date:
The growth of artificial intelligence (AI) combined with the collection and storage of large amounts of data in the electronic medical record collection (EMR) has created an opportunity for orthopaedic research and translation into the clinical environment. Machine learning (ML) is a type of AI tool well suited for processing the large amount of available data. Specific areas of ML frequently…
Publication date:

What would it feel like to run outside, right now, and attempt a somersault on the first surface you find? Taking seriously an invitation like this to imagine a (perhaps unlikely) future, prompts the activation of evolutionary machinery in the mind and body that took millions of years to emerge. The ability to answer this question depends upon a surprisingly complex model of yourself, the…

Publication date:

We formalize a notion of a privacy wrapper, defined as an algorithm that can take an arbitrary and untrusted script and produce an output with differential privacy guarantees. Our novel privacy wrapper, named TAHOE, incorporates two design ideas: a type of stability under subsetting, and randomization over subset size. We show that TAHOE imposes differential privacy for every possible script.…

Publication date:

The sudden unexpected rise in monkeypox cases worldwide has become an increasing concern. The zoonotic disease characterized by smallpox-like symptoms has already spread to nearly twenty countries and several continents and is labeled a potential pandemic by experts. monkeypox infections do not have specific treatments. However, since smallpox viruses are similar to monkeypox viruses…

Publication date:

Human errors in criminal investigations have previously led to devastating miscarriages of justice. For example, flaws in forensic identification based on physical or photographic evidence are notoriously unreliable. The criminal justice system has, therefore, started to turn to artificial intelligence (AI) to improve the reliability and fairness of forensic identification. So as not to repeat…

Publication date:

Due to data collection, there is a potential risk concerning security and privacy, so IoT reliability and survivability are of utmost concern. In this paper, we address the concern using two methods. The first method is device identification, which uses an extensive set of machine learning algorithms for identifying IoT devices. The algorithms include Logistic Regression, K- Nearest…

Publication date:

The Internet of Things (IoT) is connecting more devices every day. Security is critical to ensure that the devices operate in a trusted environment. The lack of proper IoT security encourages cybercriminals to target many smart devices across the network and gain sensitive information. Distributed Denial of Service (DDoS) attacks are common in the IoT infrastructure and involve hijacking IoT…