Aylin Caliskan
Aylin Caliskan
Assistant Professor of Computer Science, The George Washington University
Verifierad e-postadress på gwu.edu - Startsida
Titel
Citeras av
Citeras av
År
Semantics derived automatically from language corpora contain human-like biases
A Caliskan, JJ Bryson, A Narayanan
Science 356 (6334), 183-186, 2017
10922017
De-anonymizing Programmers via Code Stylometry
A Caliskan-Islam, R Harang, A Li, A Narayanan, C Voss, F Yamaguchi, ...
24th Usenix Security Symposium, 2015
1522015
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 2014
1052014
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization.
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies 7384, 299-318, 2012
902012
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Security Symposium (NDSS) 2018, 2018
832018
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
672013
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network
A Caliskan-Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35--46, 2014
532014
Translate once, translate twice, translate thrice and attribute: Identifying authors and machine translation tools in translated text
A Caliskan, R Greenstadt
2012 IEEE Sixth International Conference on Semantic Computing, 121-125, 2012
342012
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
RG Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael ...
Proceedings on Privacy Enhancing Technologies, 389–408, 2019
192019
How privacy flaws affect consumer perception
S Afroz, AC Islam, J Santell, A Chapin, R Greenstadt
2013 Third Workshop on Socio-Technical Aspects in Security and Trust, 10-17, 2013
152013
Stylometric fingerprints and privacy behavior in textual data
A Caliskan-Islam
Drexel University, 2015
112015
Poster: Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments
E Dauber, A Caliskan, R Harang, R Greenstadt
2018 IEEE/ACM 40th International Conference on Software Engineering …, 2018
82018
Detecting Emergent Intersectional Biases: Contextualized Word Embeddings Contain a Distribution of Human-like Biases
W Guo, A Caliskan
arXiv preprint arXiv:2006.03955, 2020
42020
From language to family and back: Native language and language family identification from english text
A Stolerman, A Caliskan, R Greenstadt
Proceedings of the 2013 NAACL HLT Student Research Workshop, 32-39, 2013
42013
A set of distinct facial traits learned by machines is not predictive of appearance bias in the wild
R Steed, A Caliskan
AI and Ethics, 1-12, 2021
3*2021
Iterative Effect-Size Bias in Ridehailing: Measuring Social Bias in Dynamic Pricing of 100 Million Rides
A Pandey, A Caliskan
arXiv preprint arXiv:2006.04599, 2020
32020
Social biases in word embeddings and their relation to human cognition
A Caliskan, M Lewis
https://psyarxiv.com/d84kg, 2020
12020
ValNorm: A New Word Embedding Intrinsic Evaluation Method Reveals Valence Biases are Consistent Across Languages and Over Decades
A Toney, A Caliskan
arXiv preprint arXiv:2006.03950, 2020
12020
Automatically Characterizing Targeted Information Operations Through Biases Present in Discourse on Twitter
A Toney, A Pandey, W Guo, D Broniatowski, A Caliskan
arXiv preprint arXiv:2004.08726, 2020
1*2020
How do we decide how much to reveal?
A Caliskan-Islam
ACM SIGCAS Computers and Society 45 (1), 14-15, 2015
12015
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20