Skip to main content

Showing 1–17 of 17 results for author: Mayer, J

Searching in archive cs. Search in all archives.
.
  1. Information Security and Privacy in the Digital World: Some Selected Topics

    Authors: Jaydip Sen, Joceli Mayer, Subhasis Dasgupta, Subrata Nandi, Srinivasan Krishnaswamy, Pinaki Mitra, Mahendra Pratap Singh, Naga Prasanthi Kundeti, Chandra Sekhara Rao MVP, Sudha Sree Chekuri, Seshu Babu Pallapothu, Preethi Nanjundan, Jossy P. George, Abdelhadi El Allahi, Ilham Morino, Salma AIT Oussous, Siham Beloualid, Ahmed Tamtaoui, Abderrahim Bajit

    Abstract: In the era of generative artificial intelligence and the Internet of Things, while there is explosive growth in the volume of data and the associated need for processing, analysis, and storage, several new challenges are faced in identifying spurious and fake information and protecting the privacy of sensitive data. This has led to an increasing demand for more robust and resilient schemes for aut… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: Published by IntechOpen, London Uk in Nov 2023, the book contains 8 chapters spanning over 131 pages. arXiv admin note: text overlap with arXiv:2307.02055, arXiv:2304.00258

  2. arXiv:2403.13763  [pdf, other

    cs.CV

    Practical End-to-End Optical Music Recognition for Pianoform Music

    Authors: Jiří Mayer, Milan Straka, Jan Hajič jr., Pavel Pecina

    Abstract: The majority of recent progress in Optical Music Recognition (OMR) has been achieved with Deep Learning methods, especially models following the end-to-end paradigm, reading input images and producing a linear sequence of tokens. Unfortunately, many music scores, especially piano music, cannot be easily converted to a linear sequence. This has led OMR researchers to use custom linearized encodings… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: 15+4 pages, 6 figures

    ACM Class: I.4.9; J.5

  3. arXiv:2308.12215  [pdf, other

    cs.LG cs.CL cs.CY

    The Challenges of Machine Learning for Trust and Safety: A Case Study on Misinformation Detection

    Authors: Madelyne Xiao, Jonathan Mayer

    Abstract: We examine the disconnect between scholarship and practice in applying machine learning to trust and safety problems, using misinformation detection as a case study. We survey literature on automated detection of misinformation across a corpus of 248 well-cited papers in the field. We then examine subsets of papers for data and code availability, design missteps, reproducibility, and generalizabil… ▽ More

    Submitted 19 June, 2024; v1 submitted 23 August, 2023; originally announced August 2023.

  4. arXiv:2304.14939  [pdf, other

    cs.CR

    Account Verification on Social Media: User Perceptions and Paid Enrollment

    Authors: Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan Mayer

    Abstract: We investigate how users perceive social media account verification, how those perceptions compare to platform practices, and what happens when a gap emerges. We use recent changes in Twitter's verification process as a natural experiment, where the meaning and types of verification indicators rapidly and significantly shift. The project consists of two components: a user survey and a measurement… ▽ More

    Submitted 24 June, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: To appear at the 32nd USENIX Security Symposium (2023)

  5. arXiv:2303.03979  [pdf, other

    cs.CR cs.CY

    SoK: Content Moderation for End-to-End Encryption

    Authors: Sarah Scheffler, Jonathan Mayer

    Abstract: Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common. These important advances for security and privacy create new content moderation challenges for online services, because services can no longer directly access plaintext content. While ongoing public policy debates about E2EE and content moderation in the United States and Eu… ▽ More

    Submitted 7 March, 2023; originally announced March 2023.

    Comments: To appear at PETS (Privacy Enhancing Technologies Symposium) 2023

  6. arXiv:2211.02274  [pdf, other

    cs.CY

    Rally and WebScience: A Platform and Toolkit for Browser-Based Research on Technology and Society Problems

    Authors: Anne Kohlbrenner, Ben Kaiser, Kartikeya Kandula, Rebecca Weiss, Jonathan Mayer, Ted Han, Robert Helmer

    Abstract: Empirical technology and society research is in a methodological crisis. Problems increasingly involve closed platforms, targeted content, and context-specific behavior. Prevailing research methods, such as surveys, tasks, and web crawls, pose design and ecological validity limitations. Deploying studies in participant browsers and devices is a promising direction. These vantage points can obser… ▽ More

    Submitted 30 November, 2022; v1 submitted 4 November, 2022; originally announced November 2022.

  7. arXiv:2210.11636  [pdf

    cs.CY

    Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law

    Authors: Mona Wang, Jonathan Mayer

    Abstract: We study how legislation that restricts speech can induce online self-censorship and alter online discourse, using the recent Hong Kong national security law as a case study. We collect a dataset of 7 million historical Tweets from Hong Kong users, supplemented with historical snapshots of Tweet streams collected by other researchers. We compare online activity before and after enactment of the na… ▽ More

    Submitted 17 February, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

    Journal ref: Privacy Enhancing Technologies, Free and Open Communications on the Internet. Issue 1. (2023) 46-55

  8. arXiv:2107.09647  [pdf, other

    cs.LG cs.RO eess.SY

    Proximal Policy Optimization for Tracking Control Exploiting Future Reference Information

    Authors: Jana Mayer, Johannes Westermann, Juan Pedro Gutiérrez H. Muriedas, Uwe Mettin, Alexander Lampe

    Abstract: In recent years, reinforcement learning (RL) has gained increasing attention in control engineering. Especially, policy gradient methods are widely used. In this work, we improve the tracking performance of proximal policy optimization (PPO) for arbitrary reference signals by incorporating information about future reference values. Two variants of extending the argument of the actor and the critic… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

  9. What Makes a Dark Pattern... Dark? Design Attributes, Normative Considerations, and Measurement Methods

    Authors: Arunesh Mathur, Jonathan Mayer, Mihir Kshirsagar

    Abstract: There is a rapidly growing literature on dark patterns, user interface designs -- typically related to shop** or privacy -- that researchers deem problematic. Recent work has been predominantly descriptive, documenting and categorizing objectionable user interfaces. These contributions have been invaluable in highlighting specific designs for researchers and policymakers. But the current literat… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

    Comments: 27 pages, 4 figures

    Journal ref: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems

  10. arXiv:2008.10772  [pdf, other

    cs.HC cs.CR cs.CY

    Adapting Security Warnings to Counter Online Disinformation

    Authors: Ben Kaiser, Jerry Wei, Eli Lucherini, Kevin Lee, J. Nathan Matias, Jonathan Mayer

    Abstract: Disinformation is proliferating on the internet, and platforms are responding by attaching warnings to content. There is little evidence, however, that these warnings help users identify or avoid disinformation. In this work, we adapt methods and results from the information security warning literature in order to design and evaluate effective disinformation warnings. In an initial laboratory stud… ▽ More

    Submitted 16 August, 2021; v1 submitted 24 August, 2020; originally announced August 2020.

    Comments: Published at USENIX Security '21

  11. Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset

    Authors: Ryan Amos, Gunes Acar, Eli Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan Mayer

    Abstract: Automated analysis of privacy policies has proved a fruitful research direction, with developments such as automated policy summarization, question answering systems, and compliance detection. Prior research has been limited to analysis of privacy policies from a single point in time or from short spans of time, as researchers did not have access to a large-scale, longitudinal, curated dataset. To… ▽ More

    Submitted 20 July, 2021; v1 submitted 20 August, 2020; originally announced August 2020.

    Comments: 16 pages, 13 figures, public dataset

    Journal ref: In Proceedings of the Web Conference 2021 (WWW '21), April 19-23, 2021, Ljubljana, Slovenia. ACM, New York, NY, USA, 12 pages

  12. arXiv:2006.13086  [pdf, other

    cs.NI cs.CR

    Classifying Network Vendors at Internet Scale

    Authors: Jordan Holland, Ross Teixeira, Paul Schmitt, Kevin Borgolte, Jennifer Rexford, Nick Feamster, Jonathan Mayer

    Abstract: In this paper, we develop a method to create a large, labeled dataset of visible network device vendors across the Internet by map** network-visible IP addresses to device vendors. We use Internet-wide scanning, banner grabs of network-visible devices across the IPv4 address space, and clustering techniques to assign labels to more than 160,000 devices. We subsequently probe these devices and us… ▽ More

    Submitted 24 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Comments: 11 Pages, 2 figures, 7 tables

  13. arXiv:2003.07684  [pdf, other

    cs.CY

    Identifying Disinformation Websites Using Infrastructure Features

    Authors: Austin Hounsel, Jordan Holland, Ben Kaiser, Kevin Borgolte, Nick Feamster, Jonathan Mayer

    Abstract: Platforms have struggled to keep pace with the spread of disinformation. Current responses like user reports, manual analysis, and third-party fact checking are slow and difficult to scale, and as a result, disinformation can spread unchecked for some time after being created. Automation is essential for enabling platforms to respond rapidly to disinformation. In this work, we explore a new direct… ▽ More

    Submitted 28 September, 2020; v1 submitted 28 February, 2020; originally announced March 2020.

  14. arXiv:1907.07032  [pdf, other

    cs.HC cs.CY

    Dark Patterns at Scale: Findings from a Crawl of 11K Shop** Websites

    Authors: Arunesh Mathur, Gunes Acar, Michael J. Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan

    Abstract: Dark patterns are user interface design choices that benefit an online service by coercing, steering, or deceiving users into making unintended and potentially harmful decisions. We present automated techniques that enable experts to identify dark patterns on a large set of websites. Using these techniques, we study shop** websites, which often use dark patterns to influence users into making mo… ▽ More

    Submitted 20 September, 2019; v1 submitted 16 July, 2019; originally announced July 2019.

    Comments: 32 pages, 11 figures, ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

    Journal ref: Proceedings of the ACM Human-Computer Interaction, Vol. 3, CSCW, Article 81 (November 2019)

  15. Learning Temporal Coherence via Self-Supervision for GAN-based Video Generation

    Authors: Mengyu Chu, You Xie, Jonas Mayer, Laura Leal-Taixé, Nils Thuerey

    Abstract: Our work explores temporal self-supervision for GAN-based video generation tasks. While adversarial training successfully yields generative models for a variety of areas, temporal relationships in the generated data are much less explored. Natural temporal changes are crucial for sequential generation tasks, e.g. video super-resolution and unpaired video translation. For the former, state-of-the-a… ▽ More

    Submitted 21 May, 2020; v1 submitted 23 November, 2018; originally announced November 2018.

    Comments: Project page: https://ge.in.tum.de/publications/2019-tecogan-chu/, code link: https://github.com/thunil/TecoGAN

  16. arXiv:1808.06820  [pdf, other

    cs.RO

    SLAMBench2: Multi-Objective Head-to-Head Benchmarking for Visual SLAM

    Authors: Bruno Bodin, Harry Wagstaff, Sajad Saeedi, Luigi Nardi, Emanuele Vespa, John H Mayer, Andy Nisbet, Mikel Luján, Steve Furber, Andrew J Davison, Paul H. J. Kelly, Michael O'Boyle

    Abstract: SLAM is becoming a key component of robotics and augmented reality (AR) systems. While a large number of SLAM algorithms have been presented, there has been little effort to unify the interface of such algorithms, or to perform a holistic comparison of their capabilities. This is a problem since different SLAM applications can have different functional and non-functional requirements. For example,… ▽ More

    Submitted 21 August, 2018; originally announced August 2018.

    Journal ref: 2018 IEEE International Conference on Robotics and Automation (ICRA'18)

  17. arXiv:1705.08568  [pdf, other

    cs.CR

    The Future of Ad Blocking: An Analytical Framework and New Techniques

    Authors: Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan

    Abstract: We present a systematic study of ad blocking - and the associated "arms race" - as a security problem. We model ad blocking as a state space with four states and six state transitions, which correspond to techniques that can be deployed by either publishers or ad blockers. We argue that this is a complete model of the system. We propose several new ad blocking techniques, including ones that borro… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.