Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , and . Internet Measurement Conference, page 142-156. ACM, (2017)A survey on privacy for B5G/6G: New privacy challenges, and research directions., , , , and . J. Ind. Inf. Integr., (2022)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , and . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)Stock trade volume prediction with Yahoo Finance user browsing behavior., , , and . ICDE, page 1168-1173. IEEE Computer Society, (2014)The Minimum Wiener Connector., , , , and . CoRR, (2015)A longitudinal study of the top 1% toxic Twitter profiles., , , , , and . WebSci, page 292-303. ACM, (2023)YouTubing at Home: Media Sharing Behavior Change as Proxy for Mobility Around COVID-19 Lockdowns., and . WebSci, page 272-281. ACM, (2021)Privacy-Preserving Online Content Moderation: A Federated Learning Use Case., , , and . CoRR, (2022)Cultures in Community Question Answering., , , , and . HT, page 175-184. ACM, (2015)Inferring peer centrality in socially-informed peer-to-peer systems., and . Peer-to-Peer Computing, page 318-327. IEEE, (2011)