


default search action
BibTeX records: Joshua A. Kroll
@article{DBLP:journals/popets/LandisK24, author = {Christopher B. Landis and Joshua A. Kroll}, title = {Mitigating Inference Risks with the {NIST} Privacy Framework}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2024}, number = {1}, pages = {217--231}, year = {2024}, url = {https://doi.org/10.56553/popets-2024-0013}, doi = {10.56553/POPETS-2024-0013}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/LandisK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/RismaniSSJKMR23, author = {Shalaleh Rismani and Renee Shelby and Andrew Smart and Edgar W. Jatho III and Joshua A. Kroll and AJung Moon and Negar Rostamzadeh}, editor = {Albrecht Schmidt and Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and Tesh Goyal and Per Ola Kristensson and Anicia Peters and Stefanie Mueller and Julie R. Williamson and Max L. Wilson}, title = {From Plane Crashes to Algorithmic Harm: Applicability of Safety Engineering Frameworks for Responsible {ML}}, booktitle = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023}, pages = {2:1--2:18}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3544548.3581407}, doi = {10.1145/3544548.3581407}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/RismaniSSJKMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-02972, author = {Edgar W. Jatho III and Logan O. Mailloux and Eugene D. Williams and Patrick McClure and Joshua A. Kroll}, title = {Concrete Safety for {ML} Problems: System Safety for {ML} Development and Assessment}, journal = {CoRR}, volume = {abs/2302.02972}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.02972}, doi = {10.48550/ARXIV.2302.02972}, eprinttype = {arXiv}, eprint = {2302.02972}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-02972.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/KonighoferKPVC23, author = {Bettina K{\"{o}}nighofer and Joshua A. Kroll and Ruzica Piskac and Michael Veale and Filip Cano C{\'{o}}rdoba}, title = {Accountable Software Systems (Dagstuhl Seminar 23411)}, journal = {Dagstuhl Reports}, volume = {13}, number = {10}, pages = {24--49}, year = {2023}, url = {https://doi.org/10.4230/DagRep.13.10.24}, doi = {10.4230/DAGREP.13.10.24}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/KonighoferKPVC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-03535, author = {Shalaleh Rismani and Renee Shelby and Andrew Smart and Edgar W. Jatho III and Joshua A. Kroll and AJung Moon and Negar Rostamzadeh}, title = {From plane crashes to algorithmic harm: applicability of safety engineering frameworks for responsible {ML}}, journal = {CoRR}, volume = {abs/2210.03535}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.03535}, doi = {10.48550/ARXIV.2210.03535}, eprinttype = {arXiv}, eprint = {2210.03535}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-03535.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-04602, author = {Edgar W. Jatho III and Logan O. Mailloux and Shalaleh Rismani and Eugene D. Williams and Joshua A. Kroll}, title = {System Safety Engineering for Social and Ethical {ML} Risks: {A} Case Study}, journal = {CoRR}, volume = {abs/2211.04602}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.04602}, doi = {10.48550/ARXIV.2211.04602}, eprinttype = {arXiv}, eprint = {2211.04602}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-04602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/KrollMT21, author = {Joshua A. Kroll and James Bret Michael and David B. Thaw}, title = {Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks}, journal = {Computer}, volume = {54}, number = {6}, pages = {64--71}, year = {2021}, url = {https://doi.org/10.1109/MC.2021.3055703}, doi = {10.1109/MC.2021.3055703}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/KrollMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CarterKM21, author = {Thomas Carter and Joshua A. Kroll and James Bret Michael}, title = {Lessons Learned From Applying the {NIST} Privacy Framework}, journal = {{IT} Prof.}, volume = {23}, number = {4}, pages = {9--13}, year = {2021}, url = {https://doi.org/10.1109/MITP.2021.3086916}, doi = {10.1109/MITP.2021.3086916}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/CarterKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/Kroll21, author = {Joshua A. Kroll}, editor = {Madeleine Clare Elish and William Isaac and Richard S. Zemel}, title = {Outlining Traceability: {A} Principle for Operationalizing Accountability in Computing Systems}, booktitle = {FAccT '21: 2021 {ACM} Conference on Fairness, Accountability, and Transparency, Virtual Event / Toronto, Canada, March 3-10, 2021}, pages = {758--771}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3442188.3445937}, doi = {10.1145/3442188.3445937}, timestamp = {Fri, 05 May 2023 15:54:55 +0200}, biburl = {https://dblp.org/rec/conf/fat/Kroll21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-09385, author = {Joshua A. Kroll}, title = {Outlining Traceability: {A} Principle for Operationalizing Accountability in Computing Systems}, journal = {CoRR}, volume = {abs/2101.09385}, year = {2021}, url = {https://arxiv.org/abs/2101.09385}, eprinttype = {arXiv}, eprint = {2101.09385}, timestamp = {Sat, 30 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-09385.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmhci/MulliganKKW19, author = {Deirdre K. Mulligan and Joshua A. Kroll and Nitin Kohli and Richmond Y. Wong}, title = {This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology}, journal = {Proc. {ACM} Hum. Comput. Interact.}, volume = {3}, number = {{CSCW}}, pages = {119:1--119:36}, year = {2019}, url = {https://doi.org/10.1145/3359221}, doi = {10.1145/3359221}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmhci/MulliganKKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuckieBKKKc19, author = {Matthew J. Luckie and Robert Beverly and Ryan Koga and Ken Keys and Joshua A. Kroll and K. C. Claffy}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {465--480}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354232}, doi = {10.1145/3319535.3354232}, timestamp = {Mon, 11 Aug 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LuckieBKKKc19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/KrollKL19, author = {Joshua A. Kroll and Nitin Kohli and Paul Laskowski}, editor = {Vijay Gadepally and Timothy G. Mattson and Michael Stonebraker and Fusheng Wang and Gang Luo and Yanhui Laing and Alevtina Dubovitskaya}, title = {Privacy and Policy in Polystores: {A} Data Management Research Agenda}, booktitle = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11721}, pages = {68--81}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33752-0\_5}, doi = {10.1007/978-3-030-33752-0\_5}, timestamp = {Wed, 03 Aug 2022 16:12:01 +0200}, biburl = {https://dblp.org/rec/conf/vldb/KrollKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-11869, author = {Deirdre K. Mulligan and Joshua A. Kroll and Nitin Kohli and Richmond Y. Wong}, title = {This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology}, journal = {CoRR}, volume = {abs/1909.11869}, year = {2019}, url = {http://arxiv.org/abs/1909.11869}, eprinttype = {arXiv}, eprint = {1909.11869}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-11869.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Kroll18, author = {Joshua A. Kroll}, title = {Data Science Data Governance {[AI} Ethics]}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {6}, pages = {61--70}, year = {2018}, url = {https://doi.org/10.1109/MSEC.2018.2875329}, doi = {10.1109/MSEC.2018.2875329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Kroll18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Kroll15, author = {Joshua A. Kroll}, title = {Accountable Algorithms}, school = {Princeton University, {USA}}, year = {2015}, url = {https://arks.princeton.edu/ark:/88435/dsp014b29b837r}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Kroll15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BonneauMCNKF15, author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten}, title = {SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {104--121}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.14}, doi = {10.1109/SP.2015.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BonneauMCNKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonneauMCNKF15, author = {Joseph Bonneau and Andrew Miller and Jeremy Clark and Arvind Narayanan and Joshua A. Kroll and Edward W. Felten}, title = {Research Perspectives and Challenges for Bitcoin and Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2015}, url = {http://eprint.iacr.org/2015/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonneauMCNKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/KrollSA14, author = {Joshua A. Kroll and Gordon Stewart and Andrew W. Appel}, title = {Portable Software Fault Isolation}, booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna, Austria, 19-22 July, 2014}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/CSF.2014.10}, doi = {10.1109/CSF.2014.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/KrollSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BonneauNMCKF14, author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Mixcoin: Anonymity for Bitcoin with Accountable Mixes}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {486--504}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_31}, doi = {10.1007/978-3-662-45472-5\_31}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/BonneauNMCKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EdmundsonSKF14, author = {Anne Edmundson and Anna Kornfeld Simpson and Joshua A. Kroll and Edward W. Felten}, editor = {Jedidiah R. Crandall and Vern Paxson}, title = {Security Audit of Safeplug "Tor in a Box"}, booktitle = {4th {USENIX} Workshop on Free and Open Communications on the Internet, {FOCI} '14, San Diego, CA, USA, August 18, 2014}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/foci14/workshop-program/presentation/edmundson}, timestamp = {Mon, 01 Feb 2021 08:42:51 +0100}, biburl = {https://dblp.org/rec/conf/uss/EdmundsonSKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonneauNMCKF14, author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten}, title = {Mixcoin: Anonymity for Bitcoin with accountable mixes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2014}, url = {http://eprint.iacr.org/2014/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonneauNMCKF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.