Emiliano De Cristofaro

Orcid: 0000-0002-7097-6346

Affiliations:
  • University of California, Riverside, CA, USA
  • University College London (UCL), Computer Science Department, London, UK (former)
  • Xerox PARC, Palo Alto, CA, USA (former)
  • University of California, Irvine, Computer Science Department, CA, USA (PhD 2011)


According to our database1, Emiliano De Cristofaro authored at least 177 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
"Here's Your Evidence": False Consensus in Public Twitter Discussions of COVID-19 Science.
Proc. ACM Hum. Comput. Interact., 2024

Synthetic Data: Methods, Use Cases, and Risks.
IEEE Secur. Priv., 2024

The Elusive Pursuit of Replicating PATE-GAN: Benchmarking, Auditing, Debugging.
CoRR, 2024

A Systematic Review of Federated Generative Models.
CoRR, 2024

Nearly Tight Black-Box Auditing of Differentially Private Machine Learning.
CoRR, 2024

"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation.
Proceedings of the 33rd USENIX Security Symposium, 2024

BadVFL: Backdoor Attacks in Vertical Federated Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to Their Source Communities.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

iDRAMA-Scored-2024: A Dataset of the Scored Social Media Platform from 2020 to 2023.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024

2023
From HODL to MOON: Understanding Community Evolution, Emotional Dynamics, and Price Interplay in the Cryptocurrency Ecosystem.
CoRR, 2023

On the Inadequacy of Similarity-based Privacy Metrics: Reconstruction Attacks against "Truly Anonymous Synthetic Data".
CoRR, 2023

Understanding how Differentially Private Generative Models Spend their Privacy Budget.
CoRR, 2023

What Is Synthetic Data? The Good, The Bad, and The Ugly.
CoRR, 2023

Understanding the Use of e-Prints on Reddit and 4chan's Politically Incorrect Board.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces.
Proceedings of the 15th ACM Web Science Conference 2023, 2023

Lambretta: Learning to Rank for Twitter Soft Moderation.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

2022
Toxicity in the Decentralized Web and the Potential for Model Sharing.
Proc. ACM Meas. Anal. Comput. Syst., 2022

Adherence to Misinformation on Social Media Through Socio-Cognitive and Group-Based Processes.
Proc. ACM Hum. Comput. Interact., 2022

Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Proceedings of the 31st USENIX Security Symposium, 2022

TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

On Utility and Privacy in Synthetic Genomic Data.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Local and Central Differential Privacy for Robustness and Privacy in Federated Learning.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

A Longitudinal Study of the Gettr Social Network.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022

Robin Hood and Matthew Effects: Differential Privacy Has Disparate Impact on Synthetic Data.
Proceedings of the International Conference on Machine Learning, 2022

Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

CERBERUS: Exploring Federated Prediction of Security Events.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
Proc. ACM Hum. Comput. Interact., 2021

"How over is it?" Understanding the Incel Community on YouTube.
Proc. ACM Hum. Comput. Interact., 2021

Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes.
Proc. ACM Hum. Comput. Interact., 2021

"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021

A Critical Overview of Privacy in Machine Learning.
IEEE Secur. Priv., 2021

"We won't even challenge their lefty academic definition of racist: " Understanding the Use of e-Prints on Reddit and 4chan.
CoRR, 2021

Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities.
CoRR, 2021

An Early Look at the Gettr Social Network.
CoRR, 2021

Measuring Utility and Privacy of Synthetic Genomic Data.
CoRR, 2021

An Early Look at the Parler Online Social Network.
CoRR, 2021

"Is it a Qoincidence?": An Exploratory Study of QAnon on Voat.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Understanding the Effect of Deplatforming on Social Networks.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

Understanding the Use of Fauxtography on Social Media.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

The Evolution of the Manosphere across the Web.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

A Large Open Dataset from the Parler Social Network.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

Exploring content moderation in the decentralised web: the pleroma case.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021

A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan.
ACM Trans. Web, 2020

Measuring Membership Privacy on Aggregate Location Time-Series.
Proc. ACM Meas. Anal. Comput. Syst., 2020

Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm.
CoRR, 2020

Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
CoRR, 2020

"Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co.
CoRR, 2020

Toward Robustness and Privacy in Federated Learning: Experimenting with Local and Central Differential Privacy.
CoRR, 2020

An Overview of Privacy in Machine Learning.
CoRR, 2020

Understanding the Incel Community on YouTube.
CoRR, 2020

From Pick-Up Artists to Incels: A Data-Driven Sketch of the Manosphere.
CoRR, 2020

On the Feasibility of Acoustic Attacks Using Commodity Smart Devices.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

"And We Will Fight for Our Race!" A Measurement Study of Genetic Testing Conversations on Reddit and 4chan.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

2019
Detecting Cyberbullying and Cyberaggression in Social Media.
ACM Trans. Web, 2019

Differentially Private Mixture of Generative Neural Networks.
IEEE Trans. Knowl. Data Eng., 2019

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019

Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective.
Proc. Priv. Enhancing Technol., 2019

LOGAN: Membership Inference Attacks Against Generative Models.
Proc. Priv. Enhancing Technol., 2019

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019

Under the Hood of Membership Inference Attacks on Aggregate Location Time-Series.
CoRR, 2019

Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter.
CoRR, 2019

Fast privacy-preserving network function outsourcing.
Comput. Networks, 2019

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor.
Proceedings of the World Wide Web Conference, 2019

How Much Does GenoGuard Really "Guard"?: An Empirical Analysis of Long-Term Security for Genomic Data.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Exploiting Unintended Feature Leakage in Collaborative Learning.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Challenges in the Decentralised Web: The Mastodon Case.
Proceedings of the Internet Measurement Conference, 2019

2018
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
IACR Cryptol. ePrint Arch., 2018

Inference Attacks Against Collaborative Learning.
CoRR, 2018

A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018

"23andMe confirms: I'm super white" - Analyzing Twitter Discourse On Genetic Testing.
CoRR, 2018

On collaborative predictive blacklisting.
Comput. Commun. Rev., 2018

AnoniMME: bringing anonymity to the Matchmaker Exchange platform for rare disease gene discovery.
Bioinform., 2018

From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behav. Inf. Technol., 2018

What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

Understanding Web Archiving Services and Their (Mis)Use on Social Media.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Proc. Priv. Enhancing Technol., 2017

PAPEETE: Private, Authorized, and Fast Personal Genomic Testing.
IACR Cryptol. ePrint Arch., 2017

Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372).
Dagstuhl Reports, 2017

Systematizing Genomic Privacy Research - A Critical Analysis.
CoRR, 2017

LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks.
CoRR, 2017

Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Detecting Aggressors and Bullies on Twitter.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Mean Birds: Detecting Aggression and Bullying on Twitter.
Proceedings of the 2017 ACM on Web Science Conference, 2017

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017

Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
The Adblocking Tug-of-War.
login Usenix Mag., 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race.
CoRR, 2016

A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.
CoRR, 2016

Privacy-Preserving Genetic Relatedness Test.
CoRR, 2016

POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Adblocking and Counter Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

SplitBox: Toward Efficient Private Network Function Virtualization.
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016

Efficient Private Statistics with Succinct Sketches.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Privacy-friendly mobility analytics using aggregate location data.
Proceedings of the 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2016, Burlingame, California, USA, October 31, 2016

2015
Private Processing of Outsourced Network Functions: Feasibility and Constructions.
IACR Cryptol. ePrint Arch., 2015

Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption.
CoRR, 2015

"They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking.
CoRR, 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
Computer, 2015

Danger is my middle name: experimenting with SSL vulnerabilities in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Controlled Data Sharing for Collaborative Predictive Blacklisting.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity.
J. Comput. Secur., 2014

Genomic Privacy and the Rise of a New Research Community.
IEEE Secur. Priv., 2014

What's the Gist? Privacy-Preserving Aggregation of User Profiles.
IACR Cryptol. ePrint Arch., 2014

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Fast and Private Genomic Testing for Disease Susceptibility.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Undetectable communication: The Online Social Networks case.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
IEEE Trans. Inf. Forensics Secur., 2013

Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems.
IEEE Syst. J., 2013

Participatory privacy: Enabling privacy in participatory sensing.
IEEE Netw., 2013

Do I know you? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
IACR Cryptol. ePrint Arch., 2013

Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication.
CoRR, 2013

Users' Attitudes, Perception, and Concerns in the Era of Whole Genome Sequencing.
CoRR, 2013

The Chills and Thrills of Whole Genome Sequencing.
CoRR, 2013

Privacy in content-oriented networking: threats and countermeasures.
Comput. Commun. Rev., 2013

Secure genomic testing with size- and position-hiding private substring matching.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Data Handling in the Smart Grid: Do We Know Enough?
Proceedings of the Critical Infrastructure Protection VII, 2013

Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Harvesting SSL Certificate Data to Identify Web-Fraud.
Int. J. Netw. Secur., 2012

On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12).
IACR Cryptol. ePrint Arch., 2012

Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.
IEEE Data Eng. Bull., 2012

Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Experimenting with Fast Private Set Intersection.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

Preserving Query Privacy in Urban Sensing Systems.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Fast and Private Computation of Cardinality of Set Intersection and Union.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Hummingbird: Privacy at the time of Twitter.
IACR Cryptol. ePrint Arch., 2011

Private Discovery of Common Social Contacts.
IACR Cryptol. ePrint Arch., 2011

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.
IACR Cryptol. ePrint Arch., 2011

Fast and Private Computation of Set Intersection Cardinality.
IACR Cryptol. ePrint Arch., 2011

Reclaiming Privacy for Smartphone Applications.
IACR Cryptol. ePrint Arch., 2011

Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

EphPub: Toward robust Ephemeral Publishing.
Proceedings of the 19th annual IEEE International Conference on Network Protocols, 2011

Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Web Services Invocation over Bluetooth.
Wirel. Sens. Netw., 2010

Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization.
IEEE Secur. Priv., 2010

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
IACR Cryptol. ePrint Arch., 2010

(If) Size Matters: Size-Hiding Private Set Intersection.
IACR Cryptol. ePrint Arch., 2010

Private Information Disclosure from Web Searches. (The case of Google Web History)
CoRR, 2010

Private Information Disclosure from Web Searches.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Practical Private Set Intersection Protocols with Linear Complexity.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity.
IACR Cryptol. ePrint Arch., 2009

Harvesting SSL Certificate Data to Mitigate Web-Fraud
CoRR, 2009

FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Privacy-Preserving Querying in Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
A Distributed Implementation of the Certified Information Access Service.
Proceedings of the Computer Security, 2008

Validating Orchestration of Web Services with BPEL and Aggregate Signatures.
Proceedings of the ECOWS 2008, 2008

2007
A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

A Bluetooth-Based JXME Infrastructure.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

A J2ME transparent middleware to support HTTP connections over Bluetooth.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

2006
Performance evaluation of web services invocation over Bluetooth.
Proceedings of the 1st ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, 2006

A Lightweight Framework forWeb Services Invocation over Bluetooth.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006


  Loading...