Follow
Jonathan Mayer
Jonathan Mayer
Assistant Professor of Computer Science and Public Affairs, Princeton University
Verified email at princeton.edu - Homepage
Title
Cited by
Year
Group Moderation Under End-to-End Encryption
S Scheffler, J Mayer
Proceedings of the Symposium on Computer Science and Law, 36-47, 2024
2024
The Challenges of Machine Learning for Trust and Safety: A Case Study on Misinformation Detection
M Xiao, J Mayer
arXiv preprint arXiv:2308.12215, 2023
22023
Sok: Content moderation for end-to-end encryption
S Scheffler, J Mayer
arXiv preprint arXiv:2303.03979, 2023
92023
Public Verification for Private Hash Matching
S Scheffler, A Kulshrestha, J Mayer
Cryptology ePrint Archive, 2023
52023
Account verification on social media: user perceptions and paid enrollment
M Xiao, M Wang, A Kulshrestha, J Mayer
32nd USENIX Security Symposium (USENIX Security 23), 3099-3116, 2023
22023
Rally and webscience: A platform and toolkit for browser-based research on technology and society problems
A Kohlbrenner, B Kaiser, K Kandula, R Weiss, J Mayer, T Han, R Helmer
arXiv preprint arXiv:2211.02274, 2022
12022
Self-Censorship Under Law: A Case Study of the Hong Kong National Security Law
M Wang, J Mayer
arXiv preprint arXiv:2210.11636, 2022
22022
Network Measurement Methods for Locating and Examining Censorship Devices
RS Raman, M Wang, J Dalek, J Mayer, R Ensafi
18th International Conference on emerging Networking EXperiments and …, 2022
132022
Estimating Incidental Collection in Foreign Intelligence Surveillance: Large-Scale Multiparty Private Set Intersection with Union and Sum
A Kulshrestha, J Mayer
31st USENIX Security Symposium (USENIX Security 22), 1705-1722, 2022
62022
When a Small Change Makes a Big Difference: Algorithmic Fairness Among Similar Individuals
JR Bambauer, T Zarsky, J Mayer
UC Davis Law Review 55, 2337-2419, 2022
102022
Warnings That Work: Combating Misinformation Without Deplat‐forming
B Kaiser, J Mayer, JN Matias
Disinformation. https://www. lawfareblog. com/warnings-workcombating …, 2021
22021
What makes a dark pattern... dark? design attributes, normative considerations, and measurement methods
A Mathur, M Kshirsagar, J Mayer
Proceedings of the 2021 CHI conference on human factors in computing systems …, 2021
2532021
Privacy policies over time: Curation and analysis of a million-document dataset
R Amos, G Acar, E Lucherini, M Kshirsagar, A Narayanan, J Mayer
Proceedings of the Web Conference 2021, 2165-2176, 2021
1162021
We built a system like apple’s to flag child sexual abuse material—and concluded the tech was dangerous
J Mayer, A Kulshrestha
Washington Post 8, 2021
32021
Adapting Security Warnings to Counter Online Disinformation
B Kaiser, J Wei, E Lucherini, K Lee, JN Matias, J Mayer
30th USENIX Security Symposium (USENIX Security 21), 1163-1180, 2021
672021
Identifying Harmful Media in End-to-End Encrypted Communication: Efficient Private Membership Computation
A Kulshrestha, J Mayer
30th USENIX Security Symposium (USENIX Security 21), 893-910, 2021
382021
No WAN's Land: Mapping U.S. Broadband Coverage with Millions of Address Queries to ISPs
D Major, R Teixeira, J Mayer
Proceedings of the ACM Internet Measurement Conference, 393-419, 2020
182020
Classifying Network Vendors at Internet Scale
J Holland, R Teixeria, P Schmitt, K Borgolte, J Rexford, N Feamster, ...
arXiv preprint arXiv:2006.13086, 2020
72020
Technology Policy and Law
J Mayer, J Holland
2020
Identifying Disinformation Websites Using Infrastructure Features
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20), 2020
48*2020
The system can't perform the operation now. Try again later.
Articles 1–20