Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Bibliometric Analysis of Publications in Computer Networking Research., , , , , and . CoRR, (2019)Your Privilege Gives Your Privacy Away: An Analysis of a Home Security Camera Service., , , and . INFOCOM, page 387-396. IEEE, (2020)Measurements and Analysis of a Major Adult Video Portal., , , and . ACM Trans. Multim. Comput. Commun. Appl., 12 (2): 35:1-35:25 (2016)Jettisoning Junk Messaging in the Era of End-to-End Encryption: A Case Study of WhatsApp., , , , , and . WWW, page 2582-2591. ACM, (2022)A First Look at User-Controlled Moderation on Web3 Social Media: The Case of Memo.cash., , , and . OASIS@HT, page 29-37. ACM, (2023)Urban Dictionary Embeddings for Slang NLP Applications., , , , and . LREC, page 4764-4773. European Language Resources Association, (2020)Human-Avatar Interaction in Metaverse: Framework for Full-Body Interaction., , , , , and . MMAsia, page 10:1-10:7. ACM, (2022)Characterising and Detecting Sponsored Influencer Posts on Instagram., , , , , , and . ASONAM, page 327-331. IEEE, (2020)Flocking to Mastodon: Tracking the Great Twitter Migration., , , , , and . IMC, page 111-123. ACM, (2023)Exploring online manifestations of real-world inequalities., , , , and . IMC, page 762-763. ACM, (2022)