Model-Based Discrimination Analysis: A Position Paper
暂无分享,去创建一个
Steffen Staab | Jan Jürjens | Qusai Ramadan | Daniel Strüber | Amir Shayan Ahmadian | Steffen Staab | J. Jürjens | D. Strüber | A. Ahmadian | Qusai Ramadan
[1] Jun Sakuma,et al. Fairness-aware Learning through Regularization Approach , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[2] Toon Calders,et al. Three naive Bayes approaches for discrimination-free classification , 2010, Data Mining and Knowledge Discovery.
[3] ChenPeter Pin-Shan. The entity-relationship modeltoward a unified view of data , 1976 .
[4] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[5] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[6] Krishna P. Gummadi,et al. Learning Fair Classifiers , 2015, 1507.05259.
[7] Toon Calders,et al. Discrimination Aware Decision Tree Learning , 2010, 2010 IEEE International Conference on Data Mining.
[8] Andrew D. Selbst,et al. Big Data's Disparate Impact , 2016 .
[9] Catuscia Palamidessi. CONCUR 2000 — Concurrency Theory , 2000, Lecture Notes in Computer Science.
[10] Josep Domingo-Ferrer,et al. Discrimination- and privacy-aware patterns , 2014, Data Mining and Knowledge Discovery.
[11] Jan Jürjens,et al. Secure systems development with UML , 2004 .
[12] Yuriy Brun,et al. Fairness testing: testing software for discrimination , 2017, ESEC/SIGSOFT FSE.
[13] Matt Fredrikson,et al. Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs , 2017, CCS.
[14] Frank A. Pasquale. The Black Box Society: The Secret Algorithms That Control Money and Information , 2015 .
[15] Jan Jürjens,et al. Secure Information Flow for Concurrent Processes , 2000, CONCUR.
[16] Steffen Staab,et al. Data Mining and Automated Discrimination: A Mixed Legal/Technical Perspective , 2016, IEEE Intelligent Systems.
[17] Kousha Etessami,et al. Optimizing Büchi Automata , 2000, CONCUR.
[18] Jan Jürjens,et al. Model-Based Privacy Analysis in Industrial Ecosystems , 2017, ECMFA.
[19] Jan Jürjens,et al. Model-based privacy and security analysis with CARiSMA , 2017, ESEC/SIGSOFT FSE.
[20] Matt Fredrikson,et al. Proxy Discrimination∗ in Data-Driven Systems Theory and Experiments with Machine Learnt Programs , 2017 .