Rishab Nithyanand
Orcid: 0000-0002-1280-1353
According to our database1,
Rishab Nithyanand
authored at least 55 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on rishabn.com
On csauthors.net:
Bibliography
2024
C3PA: An Open Dataset of Expert-Annotated and Regulation-Aware Privacy Policies to Enable Scalable Regulatory Compliance Audits.
CoRR, 2024
Uncovering the Interaction Equation: Quantifying the Effect of User Interactions on Social Media Homepage Recommendations.
CoRR, 2024
Turning the Tide on Dark Pools? Towards Multi-Stakeholder Vulnerability Notifications in the Ad-Tech Supply Chain.
CoRR, 2024
The Inventory is Dark and Full of Misinformation: Understanding Ad Inventory Pooling in the Ad-Tech Supply Chain.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
C3PA: An Open Dataset of Expert-Annotated and Regulation-Aware Privacy Policies to Enable Scalable Regulatory Compliance Audits.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
2023
How Auditing Methodologies Can Impact Our Understanding of YouTube's Recommendation Systems.
CoRR, 2023
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild.
Proceedings of the 32nd USENIX Security Symposium, 2023
The Morbid Realities of Social Media: An Investigation into the Narratives Shared by the Deceased Victims of COVID-19.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023
2022
Making a Radical Misogynist: How Online Social Engagement with the Manosphere Influences Traits of Radicalization.
Proc. ACM Hum. Comput. Interact., 2022
Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube's Demonetization Algorithms.
Proc. ACM Hum. Comput. Interact., 2022
The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain.
CoRR, 2022
The Morbid Realities of Social Media: An Investigation into the Misinformation Shared by the Deceased Victims of COVID-19.
CoRR, 2022
ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem.
CoRR, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting.
Proceedings of the 30th Annual European Symposium on Algorithms, 2022
2021
Reddit and the Fourth Estate: Exploring the magnitude and effects of media influence on community level moderation on Reddit.
CoRR, 2021
2020
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
Proc. Priv. Enhancing Technol., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020
2019
CoRR, 2019
2018
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
2016
Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
CoRR, 2016
CoRR, 2016
Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design.
CoRR, 2016
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
J. Comput. Secur., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
2012
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009