Emiliano De Cristofaro
Orcid: 0000-0002-7097-6346Affiliations:
- University of California, Riverside, CA, USA
- University College London (UCL), Computer Science Department, London, UK (former)
- Xerox PARC, Palo Alto, CA, USA (former)
- University of California, Irvine, Computer Science Department, CA, USA (PhD 2011)
According to our database1,
Emiliano De Cristofaro
authored at least 177 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
"Here's Your Evidence": False Consensus in Public Twitter Discussions of COVID-19 Science.
Proc. ACM Hum. Comput. Interact., 2024
CoRR, 2024
CoRR, 2024
"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to Their Source Communities.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
2023
From HODL to MOON: Understanding Community Evolution, Emotional Dynamics, and Price Interplay in the Cryptocurrency Ecosystem.
CoRR, 2023
On the Inadequacy of Similarity-based Privacy Metrics: Reconstruction Attacks against "Truly Anonymous Synthetic Data".
CoRR, 2023
Understanding how Differentially Private Generative Models Spend their Privacy Budget.
CoRR, 2023
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces.
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
2022
Proc. ACM Meas. Anal. Comput. Syst., 2022
Adherence to Misinformation on Social Media Through Socio-Cognitive and Group-Based Processes.
Proc. ACM Hum. Comput. Interact., 2022
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
Robin Hood and Matthew Effects: Differential Privacy Has Disparate Impact on Synthetic Data.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021
"We won't even challenge their lefty academic definition of racist: " Understanding the Use of e-Prints on Reddit and 4chan.
CoRR, 2021
Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities.
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan.
ACM Trans. Web, 2020
Proc. ACM Meas. Anal. Comput. Syst., 2020
Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm.
CoRR, 2020
Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
CoRR, 2020
"Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co.
CoRR, 2020
Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy.
CoRR, 2020
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
"And We Will Fight for Our Race!" A Measurement Study of Genetic Testing Conversations on Reddit and 4chan.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
2019
IEEE Trans. Knowl. Data Eng., 2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019
Proc. Priv. Enhancing Technol., 2019
Proc. Priv. Enhancing Technol., 2019
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019
CoRR, 2019
CoRR, 2019
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic Data.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Internet Measurement Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018
"23andMe confirms: I'm super white" - Analyzing Twitter Discourse On Genetic Testing.
CoRR, 2018
AnoniMME: bringing anonymity to the Matchmaker Exchange platform for rare disease gene discovery.
Bioinform., 2018
From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behav. Inf. Technol., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
ACM Trans. Priv. Secur., 2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
Dagstuhl Reports, 2017
LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks.
CoRR, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 2017 ACM on Web Science Conference, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
2016
A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.
CoRR, 2016
POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption.
CoRR, 2015
"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
CoRR, 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
2014
J. Comput. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
2013
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
IEEE Trans. Inf. Forensics Secur., 2013
IEEE Syst. J., 2013
Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013
Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication.
CoRR, 2013
CoRR, 2013
Comput. Commun. Rev., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Critical Infrastructure Protection VII, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12).
IACR Cryptol. ePrint Arch., 2012
IEEE Data Eng. Bull., 2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization.
IEEE Secur. Priv., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
CoRR, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 2010
2009
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity.
IACR Cryptol. ePrint Arch., 2009
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
2008
Proceedings of the Computer Security, 2008
Proceedings of the ECOWS 2008, 2008
2007
Proceedings of the 2007 International Symposium on a World of Wireless, 2007
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007
2006
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006