Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , and . Internet Measurement Conference, page 142-156. ACM, (2017)The Minimum Wiener Connector., , , , and . CoRR, (2015)Stock trade volume prediction with Yahoo Finance user browsing behavior., , , and . ICDE, page 1168-1173. IEEE Computer Society, (2014)A longitudinal study of the top 1% toxic Twitter profiles., , , , , and . WebSci, page 292-303. ACM, (2023)YouTubing at Home: Media Sharing Behavior Change as Proxy for Mobility Around COVID-19 Lockdowns., and . WebSci, page 272-281. ACM, (2021)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , and . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)A survey on privacy for B5G/6G: New privacy challenges, and research directions., , , , and . J. Ind. Inf. Integr., (2022)Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children., , , , , , , and . ICWSM, page 522-533. AAAI Press, (2020)Detecting Aggressors and Bullies on Twitter., , , , , and . WWW (Companion Volume), page 767-768. ACM, (2017)Inferring peer centrality in socially-informed peer-to-peer systems., and . Peer-to-Peer Computing, page 318-327. IEEE, (2011)