Gianluca Stringhini
Orcid: 0000-0002-6162-578XAffiliations:
- Boston University, MA, USA
According to our database1,
Gianluca Stringhini
authored at least 180 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on bu.edu
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
Profiling the Offline and Online Risk Experiences of Youth to Develop Targeted Interventions for Online Safety.
Proc. ACM Hum. Comput. Interact., 2024
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media.
CoRR, 2024
Enabling Contextual Soft Moderation on Social Media through Contrastive Textual Deviation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Unraveling the Web of Disinformation: Exploring the Larger Context of State-Sponsored Influence Campaigns on Twitter.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to Their Source Communities.
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
PraxiPaaS: A Decomposable Machine Learning System for Efficient Container Package Discovery.
Proceedings of the IEEE International Conference on Cloud Engineering, 2024
Proceedings of the IEEE International Conference on Cloud Engineering, 2024
"It was jerks on the Internet being jerks on the Internet": Understanding Zoombombing Through the Eyes of Its Victims.
Proceedings of the 2024 European Symposium on Usable Security, 2024
Systemization of Knowledge (SoK): Creating a Research Agenda for Human-Centered Real-Time Risk Detection on Social Media Platforms.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proc. ACM Hum. Comput. Interact., April, 2023
Sliding into My DMs: Detecting Uncomfortable or Unsafe Sexual Risk Experiences within Instagram Direct Messages Grounded in the Perspective of Youth.
Proc. ACM Hum. Comput. Interact., April, 2023
Getting Meta: A Multimodal Approach for Detecting Unsafe Conversations within Instagram Direct Messages of Youth.
Proc. ACM Hum. Comput. Interact., April, 2023
Dataset, January, 2023
Dataset, January, 2023
Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet.
CoRR, 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces.
Proceedings of the 15th ACM Web Science Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Non-polar Opposites: Analyzing the Relationship between Echo Chambers and Hostile Intergroup Interactions on Reddit.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
Proceedings of the IEEE International Conference on Cloud Engineering, 2023
Proceedings of the IEEE International Conference on Cloud Engineering, 2023
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
CoRR, 2022
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
There are N Impostors Among Us: Understanding the Effect of State-Sponsored Troll Accounts on Reddit Discussions.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge.
Proceedings of the Workshop Proceedings of the 16th International AAAI Conference on Web and Social Media, 2022
Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Understanding the Digital Lives of Youth: Analyzing Media Shared within Safe Versus Unsafe Private Conversations on Instagram.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022
2021
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
Proc. ACM Hum. Comput. Interact., 2021
A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection.
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
Proc. ACM Hum. Comput. Interact., 2021
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.
Proc. ACM Hum. Comput. Interact., 2021
Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities.
CoRR, 2021
"Go eat a bat, Chang!": On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 Truth and Trust Online Conference (TTO 2021), 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Marked for Disruption: Tracing the Evolution of Malware Delivery Operations Targeted for Takedown.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
You Don't Know How I Feel: Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
The shady economy: Understanding the difference in trading activity from underground forums in different layers of the Web.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
MOSafely: Building an Open-Source HCAI Community to Make the Internet a Safer Place for Youth.
Proceedings of the Companion Publication of the 2021 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2021
A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm.
CoRR, 2020
Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels.
CoRR, 2020
"Is it a Qoincidence?": A First Step Towards Understanding and Characterizing the QAnon Movement on Voat.co.
CoRR, 2020
"Go eat a bat, Chang!": An Early Look on the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-19.
CoRR, 2020
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020
Examining the Impact of Social Distance on the Reaction to a Tragedy. A Case Study on Sulli's Death.
Proceedings of the Workshop Proceedings of the 14th International AAAI Conference on Web and Social Media, 2020
A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Libspector : Context-Aware Large-Scale Network Traffic Analysis of Android Applications.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).
ACM Trans. Priv. Secur., 2019
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019
Dagstuhl Reports, 2019
Bridging Information Security and Environmental Criminology Research to Better Mitigate Cybercrime.
CoRR, 2019
Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube.
CoRR, 2019
CoRR, 2019
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 11th ACM Conference on Web Science, 2019
ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Waves of Malice: A Longitudinal Measurement of the Malicious File Delivery Ecosystem on the Web.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
J. Inf. Secur. Appl., 2018
A Family of Droids: Analyzing Behavioral Model based Android Malware Detection via Static and Dynamic Analysis.
CoRR, 2018
Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned.
CoRR, 2018
From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behav. Inf. Technol., 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
You Are Your Metadata: Identification and Obfuscation of Social Media Users Using Metadata Information.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Proceedings of the Twelfth International Conference on Web and Social Media, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
International comparison of bank fraud reimbursement: customer perceptions and contractual terms.
J. Cybersecur., 2017
CoRR, 2017
Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF).
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 26th International Conference on World Wide Web Companion, 2017
Proceedings of the 2017 ACM on Web Science Conference, 2017
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model.
Proceedings of the Human Aspects of Information Security, Privacy and Trust, 2017
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the First Workshop on Abusive Language Online, 2017
2016
A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.
CoRR, 2016
Permissions snapshots: Assessing users' adaptation to the Android runtime permission model.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016
What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the 9th European Workshop on System Security, 2016
What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity.
PhD thesis, 2014
Proceedings of the 23rd International World Wide Web Conference, 2014
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
The harvester, the botmaster, and the spammer: on the relations between the different actors in the spam landscape.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2nd Workshop on Smart Energy Grid Security, 2014
2013
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2013 Internet Measurement Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Comput. Commun. Rev., 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
Travelling Information For Intrusion Prevention Systems.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010