-
Challenging algorithmic profiling
The limits of data protection and anti-discrimination in responding to emergent discrimination The potential for biases being built into algorithms has been known for some time... -
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
European Data Governance Act
The proposal for a Regulation of the European Parliament and of the Council on data governance is the first of a set of measures announced in the 2020 European strategy for...-
HTML
The resource: 'html' is not accessible as guest user. You must login to access it!
-
HTML
-
Social Justice and Equality and Primary Care How Can Big Data Help
A growing body of research emphasises the role of ‘social determinants of health’ in generating inequalities in health outcomes. How, if at all, should primary care providers... -
Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms
The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create... -
Will big data algorithms dismantle the foundations of liberalism
In Homo Deus, Yuval Noah Harari argues that technological advances of the twenty-first century will usher in a significant shift in how humans make important life decisions.... -
The Trouble with Algorithmic Decisions
An Analytic Road Map to Examine Efficiency and Fairness in Automated and Opaque Decision Making We are currently witnessing a sharp rise in the use of algorithmic... -
Identifying and exploiting homogeneous communities in labeled networks
Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a... -
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
The fundamental rights challenges of algorithms
Algorithms form an increasingly important part of our daily lives, even if we are often unaware of it. They are enormously useful in many different ways. They facilitate the... -
Epidemics and city. How mobility and well being changed with COVID19 era
How did the COVID-19 epidemics change our mobility habits, and how did it impact on people’s well-being and on the virus transmissibility? In the first webinar of the seminar...-
HTML
The resource: 'Epidemics and the city: ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph
Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The... -
The democracy of emergency at the time of the coronavirus the virtues of privacy
The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and... -
Privacy in the clouds
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by... -
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big Data Ethics
The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and... -
The role of geography in the complex diffusion of innovations
The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion... -
Fair detection of poisoning attacks in federated learning
Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF