Anna Cinzia Squicciarini
Orcid: 0000-0002-7396-1895Affiliations:
- Pennsylvania State University, College of Information Sciences and Technology, State College, PA, USA
According to our database1,
Anna Cinzia Squicciarini
authored at least 220 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Soc. Netw. Anal. Min., December, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024
2023
Lived experiences of online harm amongst marginalized and vulnerable individuals in support-seeking communities on Reddit.
CoRR, 2023
Proceedings of the Uncertainty in Artificial Intelligence, 2023
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the Proceedings 26th International Conference on Extending Database Technology, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
ACM Trans. Web, 2022
Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability.
IEEE Trans. Mob. Comput., 2022
Contagion of Offensive Behavior for Transient Interactions in Online Commenting Platforms.
Int. J. Hum. Comput. Interact., 2022
TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies.
CoRR, 2022
CoRR, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
The Contribution of Verified Accounts to Self-Disclosure in COVID-Related Twitter Conversations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks.
Proceedings of the 30th International Conference on Advances in Geographic Information Systems, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
The Expertise Involved in Deciding which HITs are Worth Doing on Amazon Mechanical Turk.
Proc. ACM Hum. Comput. Interact., 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2021
A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Proceedings of the Workshop on Scientific Document Understanding co-located with 35th AAAI Conference on Artificial Inteligence, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
CoRR, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
A Semantics-based Approach to Disclosure Classification in User-Generated Online Content.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020
Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Time-Efficient Geo-Obfuscation to Protect Worker Location Privacy over Road Networks in Spatial Crowdsourcing.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the 3rd Workshop on Affective Content Analysis (AffCon 2020) co-located with Thirty-Fourth AAAI Conference on Artificial Intelligence (AAAI 2020), 2020
2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Cybern., 2019
Consensus and Information Cascades in Game-Theoretic Imitation Dynamics with Static and Dynamic Network Topologies.
SIAM J. Appl. Dyn. Syst., 2019
CoRR, 2019
Comput. Secur., 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing Via Geo-Indistinguishability.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019
Proceedings of the 2nd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
ACM Comput. Surv., 2018
Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018
Proceedings of the 29th on Hypertext and Social Media, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, 2018
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018
2017
WIREs Data Mining Knowl. Discov., 2017
IEEE Trans. Mob. Comput., 2017
MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Cloud Comput., 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017
Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017
2016
A hybrid epidemic model for deindividuation and antinormative behavior in online social networks.
Soc. Netw. Anal. Min., 2016
Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters.
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
Proceedings of the 13th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2016
An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks.
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
Telecommun. Syst., 2015
J. Internet Serv. Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
An evolutionary game model for the spread of non-cooperative behavior in online social networks.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the 12th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2015
Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
Proceedings of the 15th IEEE/ACM International Symposium on Cluster, 2015
Identification and characterization of cyberbullying dynamics in an online social network.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015
2014
Soc. Netw. Anal. Min., 2014
CoRR, 2014
Comput. Secur., 2014
Ann. des Télécommunications, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 11th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2014
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
Proceedings of the Connecting Collections, Cultures, and Communities, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE 14th International Conference on Information Reuse & Integration, 2013
Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Comput. Secur., 2012
Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach.
Proceedings of the 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 8th International Conference on Network and Service Management, 2012
Proceedings of the 8th International Conference on Network and Service Management, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation.
IEEE Trans. Serv. Comput., 2011
J. Assoc. Inf. Sci. Technol., 2011
IEEE Secur. Priv., 2011
Comput. Stand. Interfaces, 2011
Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks.
Computer, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the IEEE International Conference on Web Services, 2011
A3P: adaptive policy prediction for shared images over popular content sharing sites.
Proceedings of the HT'11, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011
Proceedings of the IEEE International Conference on Cloud Computing, 2011
2010
World Wide Web, 2010
IEEE Trans. Syst. Man Cybern. Part C, 2010
IEEE Trans. Parallel Distributed Syst., 2010
Proceedings of the 19th International Conference on World Wide Web, 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010
Vulnerabilities leading to denial of services attacks in grid computing systems: a survey.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
Springer, ISBN: 978-3-540-87741-7, 2010
2009
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices.
J. Softw., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the POLICY 2009, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
An assessment of accountability policies for large-scale distributed computing systems.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
End-to-end accountability in grid computing systems for coalition information sharing.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering.
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
ACM Trans. Inf. Syst. Secur., 2007
J. Comput. Secur., 2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Proceedings of the Human Interface and the Management of Information. Interacting in Information Environments, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
J. Comput. Secur., 2006
Int. J. Web Based Communities, 2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
Traceable and Automatic Compliance of Privacy Policies in Federated Digital Identity Management.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the 2006 Workshop on Digital Identity Management, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
2004
IEEE Trans. Knowl. Data Eng., 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004
Proceedings of the Current Trends in Database Technology - EDBT 2004 Workshops, 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the Communications and Multimedia Security, 2003