Contributions to this post were provided by Alexandra Chouldechova (Carnegie Mellon University), Sampath Kannan (University of Pennsylvania), and Aaron Roth (University of Pennsylvania). The Computing Community Consortium held a workshop on Fair Representations and Fair Interactive Learning in 2018, which was led by Aaron Roth from University of Pennsylvania and Alexandra Chouldechova from Carnegie Mellon University. A group of 50 industry, academic, and government experts convened in Philadelphia to explore the roots of algorithmic bias. The workshop report has been highlighted on the front page of the May 2020 CACM Issue, which includes a snapshot of the report that interviewed both Roth and Chouldechova. We tend to believe that algorithmic […]
Computing Community Consortium Blog
The goal of the Computing Community Consortium (CCC) is to catalyze the computing research community to debate longer range, more audacious research challenges; to build consensus around research visions; to evolve the most promising visions toward clearly defined initiatives; and to work with the funding organizations to move challenges and visions toward funding initiatives. The purpose of this blog is to provide a more immediate, online mechanism for dissemination of visioning concepts and community discussion/debate about them.
Archive for the ‘Privacy’ category
Fairness and Machine Learning
April 29th, 2020 / in Announcements, CCC, Privacy, research horizons, Research News, resources, workshop reports / by Helen WrightNSF Disrupting Operations of Illicit Supply Networks (D-ISN) Solicitation
April 15th, 2020 / in Announcements, conferences, NSF, policy, Privacy, research horizons, Research News, resources, Security / by Helen WrightWith input from the U.S. Department of Labor’s Office of Child Labor, Forced Labor and Human Trafficking, the National Science Foundation (NSF) recently published a new solicitation on Disrupting Operations of Illicit Supply Networks (D-ISN) “to support the research needed to inform the economy, security, and resilience of the Nation and the world in responding to the global threat posed by illicit supply networks.” The proposal deadline is July 1st, 2020. Major goals of NSF’s D-ISN include: Improve understanding of the operations of illicit supply networks and strengthen the ability to detect, disrupt, and dismantle them. Enhance research communities that effectively integrate operational, computational, social, cultural and economic expertise to […]
Computing Researchers Respond to COVID-19: Staying Connected
April 7th, 2020 / in CCC, COVID, policy, Privacy, research horizons, Research News / by Helen WrightThe following is a guest blog post from Computing Community Consortium (CCC) council member Jennifer Rexford from Princeton University. Over the past few weeks, as I shelter in place like so many of us, I am increasingly grateful for the Internet. A research experiment that escaped from the lab, the Internet has become a critical global infrastructure over the past twenty years. As difficult as the current Covid-19 situation is, at least we can use the Internet to support the global collaboration of scientists, keep abreast of the latest developments, teach our students and children, stay in touch with friends and family, and even find much-needed moments of levity. The […]
5G Security and Privacy – A Research Roadmap
April 1st, 2020 / in CCC-led white papers, Privacy, Security / by Khari DouglasThe Computing Community Consortium (CCC) has released a white paper titled 5G Security and Privacy – A Research Roadmap. The white paper, written by CCC Council Member Elisa Bertino (Purdue University) with Syed Rafiul Hussain (Purdue University) and Omar Chowdhury (University of Iowa), aims to stimulate conversation around a research roadmap for the security of 5G-related technologies. From the abstract: “Cellular networks represent a critical infrastructure and their security is thus crucial. 5G – the latest generation of cellular networks – combines different technologies to increase capacity, reduce latency, and save energy. Due to its complexity and scale, however, ensuring its security is extremely challenging. In this white paper, we outline recent approaches […]