Skip to main content

Showing 1–4 of 4 results for author: O'Brien, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.01661  [pdf, other

    cs.CR

    SoK: SCT Auditing in Certificate Transparency

    Authors: Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark

    Abstract: The Web public key infrastructure is essential to providing secure communication on the Internet today, and certificate authorities play a crucial role in this ecosystem by issuing certificates. These authorities may misissue certificates or suffer misuse attacks, however, which has given rise to the Certificate Transparency (CT) project. The goal of CT is to store all issued certificates in publi… ▽ More

    Submitted 3 March, 2022; originally announced March 2022.

    Comments: PETS 2022, issue 3

  2. arXiv:1810.12630  [pdf, ps, other

    physics.soc-ph cs.SI

    Spreading of Memes on Multiplex Networks

    Authors: Joseph D. O'Brien, Ioannis K. Dassios, James P. Gleeson

    Abstract: A model for the spreading of online information or "memes" on multiplex networks is introduced and analyzed using branching-process methods. The model generalizes that of [Gleeson et al., Phys.Rev. X., 2016] in two ways. First, even for a monoplex (single-layer) network, the model is defined for any specific network defined by its adjacency matrix, instead of being restricted to an ensemble of ran… ▽ More

    Submitted 28 February, 2019; v1 submitted 30 October, 2018; originally announced October 2018.

    Comments: 15 pages, 3 figures

    Journal ref: New J. Phys. 21 (2019) 025001

  3. arXiv:1810.10731  [pdf, ps, other

    cs.LG cs.CR cs.CY stat.ML

    Law and Adversarial Machine Learning

    Authors: Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen

    Abstract: When machine learning systems fail because of adversarial manipulation, how should society expect the law to respond? Through scenarios grounded in adversarial ML literature, we explore how some aspects of computer crime, copyright, and tort law interface with perturbation, poisoning, model stealing and model inversion attacks to show how some attacks are more likely to result in liability than ot… ▽ More

    Submitted 4 December, 2018; v1 submitted 25 October, 2018; originally announced October 2018.

    Comments: Minor edits. Corrected typos, Added references. 4 pages, submitted to NIPS 2018 Workshop on Security in Machine Learning

  4. arXiv:1711.01134  [pdf

    cs.AI stat.ML

    Accountability of AI Under the Law: The Role of Explanation

    Authors: Finale Doshi-Velez, Mason Kortz, Ryan Budish, Chris Bavitz, Sam Gershman, David O'Brien, Kate Scott, Stuart Schieber, James Waldo, David Weinberger, Adrian Weller, Alexandra Wood

    Abstract: The ubiquity of systems using artificial intelligence or "AI" has brought increasing attention to how those systems should be regulated. The choice of how to regulate AI systems will require care. AI systems have the potential to synthesize large amounts of data, allowing for greater levels of personalization and precision than ever before---applications range from clinical decision support to aut… ▽ More

    Submitted 20 December, 2019; v1 submitted 3 November, 2017; originally announced November 2017.