Algorithmic bias in education

RS Baker, A Hawn - International Journal of Artificial Intelligence in …, 2022 - Springer
In this paper, we review algorithmic bias in education, discussing the causes of that bias and
reviewing the empirical literature on the specific ways that algorithmic bias is known to have …

[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

Ethical machines: The human-centric use of artificial intelligence

B Lepri, N Oliver, A Pentland - IScience, 2021 - cell.com
Today's increased availability of large amounts of human behavioral data and advances in
artificial intelligence (AI) are contributing to a growing reliance on algorithms to make …

Privacy-preserving data sharing infrastructures for medical research: systematization and comparison

FN Wirth, T Meurers, M Johns, F Prasser - BMC Medical Informatics and …, 2021 - Springer
Background Data sharing is considered a crucial part of modern medical research.
Unfortunately, despite its advantages, it often faces obstacles, especially data privacy …

Mediation of user models for enhanced personalization in recommender systems

S Berkovsky, T Kuflik, F Ricci - User Modeling and User-Adapted …, 2008 - Springer
Provision of personalized recommendations to users requires accurate modeling of their
interests and needs. This work proposes a general framework and specific methodologies …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

Privacy protection in pervasive systems: State of the art and technical challenges

C Bettini, D Riboni - Pervasive and Mobile Computing, 2015 - Elsevier
Pervasive and mobile computing applications are dramatically increasing the amount of
personal data released to service providers as well as to third parties. Data includes …

On the state of social media data for mental health research

K Harrigian, C Aguirre, M Dredze - arXiv preprint arXiv:2011.05233, 2020 - arxiv.org
Data-driven methods for mental health treatment and surveillance have become a major
focus in computational science research in the last decade. However, progress in the …

Symbolic finite state transducers: Algorithms and applications

M Veanes, P Hooimeijer, B Livshits, D Molnar… - Proceedings of the 39th …, 2012 - dl.acm.org
Finite automata and finite transducers are used in a wide range of applications in software
engineering, from regular expressions to specification languages. We extend these classic …

Secure data collection, storage and access in cloud-assisted IoT

W Wang, P Xu, LT Yang - IEEE cloud computing, 2018 - ieeexplore.ieee.org
The cloud-assisted Internet of Things (IoT) provides a promising solution to data booming
problems for the ability constraints of individual objects. However, with the leverage of cloud …