Christo Wilson

Orcid: 0000-0002-5268-004X

According to our database1, Christo Wilson authored at least 105 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Johnny Still Can't Opt-out: Assessing the IAB CCPA Compliance Framework.
Proc. Priv. Enhancing Technol., 2024

Reducing Population-level Inequality Can Improve Demographic Group Fairness: a Twitter Case Study.
CoRR, 2024

Market or Markets? Investigating Google Search's Market Shares Under Horizontal and Vertical Segmentation.
CoRR, 2024

Perceptions in Pixels: Analyzing Perceived Gender and Skin Tone in Real-world Image Search Results.
Proceedings of the ACM on Web Conference 2024, 2024

U. S. Users' Exposure to YouTube Videos On- and Off-platform.
Proceedings of the 16th ACM Web Science Conference, 2024

Market or Markets? Investigating Google Search's Market Shares under Vertical Segmentation.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

Search Engine Revenue from Navigational and Brand Advertising.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

2023
The effectiveness of embedded values analysis modules in Computer Science education: An empirical study.
Big Data Soc., January, 2023

Enhancing the ethics of user-sourced online data collection and sharing.
Nat. Comput. Sci., 2023

Google the Gatekeeper: How Search Components Affect Clicks and Attention.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

No Root Store Left Behind.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

Getting Data for CSCW Research.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2023

Understanding Dark Patterns in Home IoT Devices.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

When Fair Classification Meets Noisy Protected Attributes.
Proceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society, 2023

2022
Setting the Bar Low: Are Websites Complying With the Minimum Requirements of the CCPA?
Proc. Priv. Enhancing Technol., 2022

The Effectiveness of Embedded Values Analysis Modules in Computer Science Education: An Empirical Study.
CoRR, 2022

Subscriptions and external links help drive resentful users to alternative and extremist YouTube videos.
CoRR, 2022

Engagement Outweighs Exposure to Partisan and Unreliable News within Google Search.
CoRR, 2022

Subverting Fair Image Search with Generative Adversarial Perturbations.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

FairCanary: Rapid Continuous Explainable Fairness.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

2021
A Comparative Study of Dark Patterns Across Web and Mobile Modalities.
Proc. ACM Hum. Comput. Interact., 2021

Auditing Algorithms: Understanding Algorithmic Systems from the Outside In.
Found. Trends Hum. Comput. Interact., 2021

When Fair Ranking Meets Uncertain Inference.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Building and Auditing Fair Algorithms: A Case Study in Candidate Screening.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

Structurizing Misinformation Stories via Rationalizing Fact-Checks.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Modeling and Measuring Expressed (Dis)belief in (Mis)information.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Reasoning about Political Bias in Content Moderation.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Quantifying the Impact of User Attention on Fair Group Representation in Ranked Lists.
CoRR, 2019

Quantifying the Impact of User Attentionon Fair Group Representation in Ranked Lists.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Auditing the Partisanship of Google Search Snippets.
Proceedings of the World Wide Web Conference, 2019

Auditing Autocomplete: Suggestion Networks and Recursive Algorithm Interrogation.
Proceedings of the 11th ACM Conference on Web Science, 2019

Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.
Proceedings of the Passive and Active Measurement - 20th International Conference, 2019

Quantity vs. Quality: Evaluating User Interest Profiles Using Ad Preference Managers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Understanding and Detecting Overlay-based Android Malware at Market Scales.
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019

Getting Under Alexa's Umbrella: Infiltration Attacks Against Internet Top Domain Lists.
Proceedings of the Information Security - 22nd International Conference, 2019

A Longitudinal Analysis of the ads.txt Standard.
Proceedings of the Internet Measurement Conference, 2019

Bias Misperceived: The Role of Partisanship and Misinformation in YouTube Comment Moderation.
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

Who's the Guinea Pig?: Investigating Online A/B/n Tests in-the-Wild.
Proceedings of the Conference on Fairness, Accountability, and Transparency, 2019

Platform regulation: panel.
Proceedings of the Symposium on Computer Science and Law, 2019

Bringing the kid back into YouTube kids: detecting inappropriate content on video streaming platforms.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

2018
Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications.
Proc. Priv. Enhancing Technol., 2018

Diffusion of User Tracking Data in the Online Advertising Ecosystem.
Proc. Priv. Enhancing Technol., 2018

Auditing Partisan Audience Bias within Google Search.
Proc. ACM Hum. Comput. Interact., 2018

Linguistic Signals under Misinformation and Fact-Checking: Evidence from User Comments on Social Media.
Proc. ACM Hum. Comput. Interact., 2018

Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites.
J. Comput. Mediat. Commun., 2018

Analysis of SSL certificate reissues and revocations in the wake of heartbleed.
Commun. ACM, 2018

Thou shalt not depend on me.
Commun. ACM, 2018

Auditing the Personalization and Composition of Politically-Related Search Engine Results Pages.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

On Ridesharing Competition and Accessibility: Evidence from Uber, Lyft, and Taxi.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Is the Web Ready for OCSP Must-Staple?
Proceedings of the Internet Measurement Conference 2018, 2018

How Tracking Companies Circumvented Ad Blockers Using WebSockets.
Proceedings of the Internet Measurement Conference 2018, 2018

Investigating the Impact of Gender on Rank in Resume Search Engines.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
An End-to-End View of DNSSEC Ecosystem Management.
login Usenix Mag., 2017

Clickstream User Behavior Models.
ACM Trans. Web, 2017

Observing algorithmic marketplaces in-the-wild.
SIGecom Exch., 2017

Suppressing the Search Engine Manipulation Effect (SEME).
Proc. ACM Hum. Comput. Interact., 2017

Measuring Personalization of Web Search.
CoRR, 2017

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.
Proceedings of the 26th USENIX Security Symposium, 2017

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

FBS-Radar: Uncovering Fake Base Stations at Scale in the Wild.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Accessing google scholar under extreme internet censorship: a legal avenue.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference: Industrial Track, Las Vegas, NV, USA, December 11, 2017

Understanding the role of registrars in DNSSEC deployment.
Proceedings of the 2017 Internet Measurement Conference, 2017

Bias in Online Freelance Marketplaces: Evidence from TaskRabbit and Fiverr.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
MapWatch: Detecting and Monitoring International Border Personalization on Online Maps.
Proceedings of the 25th International Conference on World Wide Web, 2016

An Empirical Analysis of Algorithmic Pricing on Amazon Marketplace.
Proceedings of the 25th International Conference on World Wide Web, 2016

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.
Proceedings of the 25th USENIX Security Symposium, 2016

Exploring Cross-Application Cellular Traffic Optimization with Baidu TrafficGuard.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

Should You Use the App for That?: Comparing the Privacy Implications of App- and Web-based Online Services.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measuring and Applying Invalid SSL Certificates: The Silent Majority.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

"Recommended For You": A First Look at Content Recommendation Networks.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
An End-to-End Measurement of Certificate Revocation in the Web's PKI.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Offline Downloading in China: A Comparative Study.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Location, Location, Location: The Impact of Geolocation on Web Search Personalization.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Peeking Beneath the Hood of Uber.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Penny for Your Thoughts: Searching for the 50 Cent Party on Sina Weibo.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

Uncovering User Interaction Dynamics in Online Social Networks.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

Process-driven Analysis of Dynamics in Online Social Interactions.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
Uncovering social network Sybils in the wild.
ACM Trans. Knowl. Discov. Data, 2014

Towards Network-level Efficiency for Cloud Storage Services.
Proceedings of the 2014 Internet Measurement Conference, 2014

Measuring Price Discrimination and Steering on E-commerce Web Sites.
Proceedings of the 2014 Internet Measurement Conference, 2014

Of Pins and Tweets: Investigating How Users Behave Across Image- and Text-Based Social Networks.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

2013
Understanding latent interactions in online social networks.
ACM Trans. Web, 2013

Measuring personalization of web search.
Proceedings of the 22nd International World Wide Web Conference, 2013

You Are How You Click: Clickstream Analysis for Sybil Detection.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Social Turing Tests: Crowdsourcing Sybil Detection.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

T-CloudDisk: a tunable cloud storage service for flexible batched synchronization.
Proceedings of the Proceedings Demo & Poster Track of ACM/IFIP/USENIX International Middleware Conference, 2013

Efficient Batched Synchronization in Dropbox-Like Cloud Storage Services.
Proceedings of the Middleware 2013, 2013

Tweeting under pressure: analyzing trending topics and evolving word choice on sina weibo.
Proceedings of the Conference on Online Social Networks, 2013

2012
Beyond Social Graphs: User Interactions in Online Social Networks and their Implications.
ACM Trans. Web, 2012

Serf and turf: crowdturfing for fun and profit.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Multi-scale dynamics in a massive online social network.
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

2011
Privacy, availability and economics in the Polaris mobile social network.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Better never than late: meeting deadlines in datacenter networks.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Sharing graphs using differentially private graph models.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2010
Measurement-calibrated graph models for social network experiments.
Proceedings of the 19th International Conference on World Wide Web, 2010

Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

Detecting and characterizing social spam campaigns.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
User interactions in social networks and their implications.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

2008
Do social networks improve e-commerce?: a study on social marketplaces.
Proceedings of the first Workshop on Online Social Networks, 2008

Malware in IEEE 802.11 Wireless Networks.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Protecting anonymity in dynamic peer-to-peer networks.
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

2007
Fairness Attacks in the Explicit Control Protocol.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007


  Loading...