Emiliano De Cristofaro
Emiliano De Cristofaro

homepage
e.decristofaroatucl.ac.uk

  Affiliation history
Bibliometrics: publication history
Average citations per article6.24
Citation Count256
Publication count41
Publication years2006-2017
Available for download24
Average downloads per article285.46
Downloads (cumulative)6,851
Downloads (12 Months)1,674
Downloads (6 Weeks)217
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


41 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 41
Result page: 1 2 3

Sort by:

1 published by ACM
November 2017 IMC '17: Proceedings of the 2017 Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 18,   Downloads (12 Months): 33,   Downloads (Overall): 33

Full text available: PDFPDF
As the number and the diversity of news outlets on the Web grows, so does the opportunity for "alternative" sources of information to emerge. Using large social networks like Twitter and Facebook, misleading, false, or agenda-driven information can quickly and seamlessly spread online, deceiving people or influencing their opinions. Also, ...
Keywords: 4chan, Twitter, fake news, reddit, social networks, influence

2 published by ACM
September 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 4, October 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 27,   Downloads (12 Months): 106,   Downloads (Overall): 106

Full text available: PDFPDF
Online social networks offer convenient ways to reach out to large audiences. In particular, Facebook pages are increasingly used by businesses, brands, and organizations to connect with multitudes of users worldwide. As the number of likes of a page has become a de-facto measure of its popularity and profitability, an ...
Keywords: machine learning, Measurement, like farm detection, social networks

3 published by ACM
July 2017 HT '17: Proceedings of the 28th ACM Conference on Hypertext and Social Media
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 15,   Downloads (12 Months): 82,   Downloads (Overall): 82

Full text available: PDFPDF
Over the past few years, online bullying and aggression have become increasingly prominent, and manifested in many different forms on social media. However, there is little work analyzing the characteristics of abusive users and what distinguishes them from typical social media users. In this paper, we start addressing this gap ...
Keywords: cyberbullying, twitter, hate, gamergate, abusive

4 published by ACM
June 2017 WebSci '17: Proceedings of the 2017 ACM on Web Science Conference
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 25,   Downloads (12 Months): 96,   Downloads (Overall): 96

Full text available: PDFPDF
In recent years, bullying and aggression against social media users have grown significantly, causing serious consequences to victims of all demographics. Nowadays, cyberbullying affects more than half of young social media users worldwide, suffering from prolonged and/or coordinated digital harassment. Also, tools and technologies geared to understand and mitigate it ...
Keywords: cyberaggression, cyberbullying, twitter

5
April 2017 WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 21,   Downloads (12 Months): 141,   Downloads (Overall): 141

Full text available: PDFPDF
Online social networks constitute an integral part of people's every day social activity and the existence of aggressive and bullying phenomena in such spaces is inevitable. In this work, we analyze user behavior on Twitter in an effort to detect cyberbullies and cuber-aggressors by considering specific attributes of their online ...
Keywords: cyber-aggression, crowdsourcing, cyberbullying, twitter

6
April 2017 WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 11,   Downloads (12 Months): 65,   Downloads (Overall): 65

Full text available: PDFPDF
As food and nutrition occupy an increasingly prevalent space on the web, dishes and recipes shared online provide an invaluable mirror into culinary cultures and attitudes around the world. More specifically, ingredients, flavors, and nutrition information become strong signals of the taste preferences of individuals and civilizations. However, there is ...
Keywords: nutrition values, health statistics, ingredients, recipes, cuisines

7
April 2017 WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion
Publisher: International World Wide Web Conferences Steering Committee
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 16,   Downloads (12 Months): 117,   Downloads (Overall): 117

Full text available: PDFPDF
Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms. In extreme cases, these incidents have evolved into hate, discrimination, and bullying, and even materialized into real-world threats and attacks against individuals or groups. In this paper, we ...
Keywords: cyberbullying, twitter, gamergate, abusive

8 published by ACM
October 2016 GIS '16: Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 116,   Downloads (Overall): 118

Full text available: PDFPDF
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes. At the same time, however, the fine-grained collection of user locations raises serious privacy concerns, as this can reveal sensitive information about the users, such as, life style, political and ...
Keywords: location privacy, mobility analytics, data aggregation

9 published by ACM
August 2016 HotMIddlebox '16: Proceedings of the 2016 workshop on Hot topics in Middleboxes and Network Function Virtualization
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 8,   Downloads (12 Months): 167,   Downloads (Overall): 331

Full text available: PDFPDF
This paper presents SplitBox, an efficient system for privacy-preserving processing of network functions that are outsourced as software processes to the cloud. Specifically, cloud providers processing the network functions do not learn the network policies instructing how the functions are to be processed. First, we propose an abstract model of ...
Keywords: Firewalls, Network Function Virtualization, Middlebox Privacy, Secret Sharing

10 published by ACM
July 2016 WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 50,   Downloads (Overall): 102

Full text available: PDFPDF
As social networking takes to the mobile world, smartphone apps provide users with ever-changing ways to interact with each other. Over the past couple of years, an increasing number of apps have entered the market offering end-to-end encryption, self-destructing messages, or some degree of anonymity. However, little work thus far ...
Keywords: anonymity, android, privacy, security

11 published by ACM
March 2016 SDN-NFV Security '16: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 5,   Downloads (12 Months): 92,   Downloads (Overall): 224

Full text available: PDFPDF
Aiming to reduce the cost and complexity of maintaining networking infrastructures, organizations are increasingly outsourcing their network functions (e.g., firewalls, traffic shapers and intrusion detection systems) to the cloud, and a number of industrial players have started to offer network function virtualization (NFV)-based solutions. Alas, outsourcing network functions in its ...
Keywords: nfv privacy, homomorphic encryption, peks

12 published by ACM
June 2015 WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 6,   Downloads (12 Months): 101,   Downloads (Overall): 293

Full text available: PDFPDF
This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps. We perform static and dynamic analysis on 100 apps, downloaded at least 10M times, that request full network access. Our experiments show that, although prior work has drawn a lot of attention to SSL ...
Keywords: privacy, Android security, information leakage

13 published by ACM
June 2015 WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 24,   Downloads (Overall): 140

Full text available: PDFPDF
Social relationships are a natural basis on which humans make trust decisions. Online Social Networks (OSNs) are increasingly often used to let users base trust decisions on the existence and the strength of social relationships. While most OSNs allow users to discover the length of the social path to other ...
Keywords: mobile social networks, proximity, privacy

14 published by ACM
November 2014 IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 9,   Downloads (12 Months): 73,   Downloads (Overall): 260

Full text available: PDFPDF
Internet censorship is enforced by numerous governments worldwide, however, due to the lack of publicly available information, as well as the inherent risks of performing active measurements, it is often hard for the research community to investigate censorship practices in the wild. Thus, the leak of 600GB worth of logs ...
Keywords: censorship, measurements, internet filtering

15 published by ACM
November 2014 IMC '14: Proceedings of the 2014 Conference on Internet Measurement Conference
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 10,   Downloads (12 Months): 112,   Downloads (Overall): 378

Full text available: PDFPDF
Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform. Recently, the number of likes of a Facebook page has become a measure of its popularity and profitability, and an underground market of services boosting page ...
Keywords: online social networks, honeypots, malicious activities

16 published by ACM
November 2014 WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic Society
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 4,   Downloads (12 Months): 34,   Downloads (Overall): 96

Full text available: PDFPDF
Advances in DNA sequencing are bringing mass computational genomic testing increasingly closer to reality. The sensitivity of genetic data, however, prompts the need for carefully protecting patients' privacy. Also, it is crucial to conceal the test's specifics, which often constitute a pharmaceutical company's trade secret. This paper presents two cryptographic ...
Keywords: genomics, cryptographic protocols, privacy

17
May 2014 Journal of Computer Security: Volume 22 Issue 3, May 2014
Publisher: IOS Press
Bibliometrics:
Citation Count: 5

Electronic information is increasingly often shared among entities without complete mutual trust. To address related security and privacy issues, a few cryptographic techniques have emerged that support privacy-preserving information sharing and retrieval. One interesting open problem in this context involves two parties that need to assess the similarity of their ...
Keywords: Secure Computation, Privacy-Enhancing Technologies, Privacy-Preserving Protocols

18 published by ACM
December 2013 ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 3,   Downloads (12 Months): 24,   Downloads (Overall): 347

Full text available: PDFPDF
The increasing penetration of Online Social Networks (OSNs) prompts the need for effectively accessing and utilizing social networking information. In numerous applications, users need to make trust and/or access control decisions involving other (possibly stranger) users, and one important factor is often the existence of common social relationships. This motivates ...
Keywords: access control, privacy enhancing technologies, social networks

19 published by ACM
November 2013 WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 5,   Downloads (12 Months): 26,   Downloads (Overall): 163

Full text available: PDFPDF
Recent progress in genomics and bioinformatics is bringing complete and on-demand sequencing of human (and other) genomes closer and closer to reality. Despite exciting new opportunities, affordable and ubiquitous genome sequencing prompts some serious privacy and ethical concerns, owing to extreme sensitivity and uniqueness of genomic information. At the same ...
Keywords: cryptographic protocols, privacy, genomics

20 published by ACM
July 2013 ACM SIGCOMM Computer Communication Review: Volume 43 Issue 3, July 2013
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 10,   Downloads (12 Months): 81,   Downloads (Overall): 557

Full text available: PDFPDF
As the Internet struggles to cope with scalability, mobility, and security issues, new network architectures are being proposed to better accommodate the needs of modern systems and applications. In particular, Content-Oriented Networking (CON) has emerged as a promising next-generation Internet architecture: it sets to decouple content from hosts, at the ...
Keywords: content-oriented networking, privacy



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us