Author of the publication

Behind the Mask: Understanding the Structural Forces That Make Social Graphs Vulnerable to Deanonymization.

, , , and . IEEE Trans. Comput. Soc. Syst., 6 (6): 1343-1356 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leveraging Peer Centrality in the Design of Socially-Informed Peer-to-Peer Systems, and . CoRR, (2012)Enabling Social Applications via Decentralized Social Data Management, , , and . CoRR, (2012)Small-World File-Sharing Communities, , and . CoRR, (2003)The Social Hourglass: An Infrastructure for Socially Aware Applications and Services., , and . IEEE Internet Comput., 16 (3): 13-23 (2012)Behind the Mask: Understanding the Structural Forces That Make Social Graphs Vulnerable to Deanonymization., , , and . IEEE Trans. Comput. Soc. Syst., 6 (6): 1343-1356 (2019)Strategic Information Operation in YouTube: The Case of the White Helmets., , and . SBP-BRiMS, volume 12268 of Lecture Notes in Computer Science, page 318-328. Springer, (2020)Twitter Is the Megaphone of Cross-platform Messaging on the White Helmets., , and . SBP-BRiMS, volume 12268 of Lecture Notes in Computer Science, page 235-244. Springer, (2020)The good, the bad and the deviant in community question answering., , and . Online Soc. Networks Media, (2017)Special Issue on Foundations of Social Computing: Enabling Social Applications via Decentralized Social Data Management., , , and . ACM Trans. Internet Techn., 15 (1): 1:1-1:26 (2015)In Search of Simplicity: A Self-Organizing Group Communication Overlay., , , and . SASO, page 371-374. IEEE Computer Society, (2007)