Research
Publications
Nearly Tight Black-Box Auditing of Differentially Private Machine Learning
Thirty-eighth Annual Conference on Neural Information Processing Systems (NeurIPS 2024)
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility
31st ACM Conference on Computer and Communications Security (ACM CCS 2024)
It’s Our Loss: No Privacy Amplification for Hidden State DP-SGD With Non-Convex Loss
17th ACM Workshop on Artificial Intelligence and Security (AISec 2024)
"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation
33rd USENIX Security Symposium (Usenix Security 2024)
A Linear Reconstruction Approach for Attribute Inference Attacks against Synthetic Data
33rd USENIX Security Symposium (USENIX Security 2024)
Here's Your Evidence: False Consensus in Public Twitter Discussions of COVID-19 Science
27th ACM Conference on Computer Supported Cooperative Work and Social Computing (ACM CSCW 2024)
Deliberate Exposure to Opposing Views and its Association with Behavior and Rewards on Political Communities
Proceedings of the ACM Web Conference 2024 (TheWebConf 2024)
BadVFL: Backdoor Attacks in Vertical Federated Learning
45th IEEE Symposium on Security & Privacy (S&P 2024)
Synthetic Data: Methods, Use Cases, and Risks
IEEE Security and Privacy Magazine (Special Issue on Synthetic Realities)
Synthetic Data, Similarity-based Privacy Metrics, and Regulatory (Non-)Compliance
2nd ICML Workshop on Generative AI and Law (GenLaw 2024)
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting
31st Network and Distributed System Security Symposium (NDSS 2024)
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities
18th International AAAI Conference on Web and Social Media (ICWSM 2024)
iDRAMA-Scored-2024: A Dataset of the Scored Social Media Platform from 2020 to 2023
18th International AAAI Conference on Web and Social Media, Dataset Paper (ICWSM 2024)
Lambretta: Learning to Rank for Twitter Soft Moderation
44th IEEE Symposium on Security & Privacy (S&P 2023)
Bayesian estimation of differential privacy
40th International Conference on Machine Learning (ICML 2023)
Synthetic Data Generation of Many-to-Many Datasets via Random Graph Generation
11th International Conference on Learning Representations (ICLR 2023)
Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit
17th International AAAI Conference on Web and Social Media (ICWSM 2023)
Understanding the Use of e-Prints on Reddit and 4chan's Politically Incorrect Board
15th ACM Web Science Conference 2023 (WebSci 2023)
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces
15th ACM Web Science Conference 2023 (WebSci 2023)
When Synthetic Data Met Regulation
1st ICML Workshop on Generative AI and Law (GenLaw 2023)
On the Challenges of Deploying Privacy-Preserving Synthetic Data in the Enterprise
1st ICML Workshop on Deployment Challenges for Generative AI
CERBERUS: Exploring Federated Prediction of Security Events
29th ACM Conference on Computer and Communications Security (ACM CCS 2022)
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots
29th ACM Conference on Computer and Communications Security (ACM CCS 2022)
Adherence to Misinformation on Social Media Through Socio-Cognitive and Group-Based Processes
25th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2022)
Robin Hood and Matthew Effects -- Differential Privacy Has Disparate Impact on Synthetic Data
39th International Conference on Machine Learning (ICML 2022)
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
31st USENIX Security Symposium (Usenix Security 2022)
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
43th IEEE Symposium on Security & Privacy (S&P 2022)
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos
14th ACM Web Science Conference (ACM WebSci 2022)
Toxicity in the Decentralized Web and the Potential for Model Sharing
ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2022)
DP-SGD vs PATE: Which Has Less Disparate Impact on GANs?
3rd AAAI Workshop on Privacy-Preserving Artificial Intelligence (PPAI 2022)
On Utility and Privacy in Synthetic Genomic Data
29th Network and Distributed System Security Symposium (NDSS 2022)
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
29th Network and Distributed System Security Symposium (NDSS 2022)
The Gospel According to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information
16th International AAAI Conference on Web and Social Media (ICWSM 2022)
"It is just a flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations
16th International AAAI Conference on Web and Social Media (ICWSM 2022)
Exploring Content Moderation in the Decentralised Web: The Pleroma Case
17th International Conference on emerging Networking EXperiments and Technologies (ACM CoNext 2021)
A Multi-Platform Analysis of Political News Discussion and Sharing on Web Communities
2021 IEEE International Conference on Big Data (IEEE BigData 2021)
A Critical Overview of Privacy in Machine Learning
IEEE Security & Privacy Magazine, Volume 19, Issue 4, July-August 2021
"I'm a Professor, which isn't usually a dangerous job": Internet-Facilitated Harassment and its Impact on Researchers
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
"How over is it?" Understanding the Incel Community on YouTube
24th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2021)
Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes
24th ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2021)
Understanding the Effect of Deplatforming on Social Networks
13th ACM Web Science Conference (ACM WebSci 2021)
A Large Open Dataset from the Parler Social Network
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
The Evolution of the Manosphere Across the Web
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
Understanding the Use of Fauxtography on Social Media
15th International AAAI Conference on Web and Social Media (ICWSM 2021)
Analyzing Genetic Testing Discourse on the Web Through the Lens of Twitter, Reddit, and 4chan
ACM Transactions on the Web (TWEB), Volume 13, Issue 4, August 2020
Measuring Membership Privacy on Aggregate Location Time-Series
ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2020)
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices
IEEE Workshop on the Internet of Safe Things (co-located with IEEE S&P 2020)
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
"And We Will Fight For Our Race! A Measurement Study of Genetic Testing Conversations on Reddit and 4chan
14th International AAAI Conference on Web and Social Media (ICWSM 2020)
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks
22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)
How Much Does GenoGuard Really Guard? An Empirical Analysis of Long-Term Security for Genomic Data
18th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2019)
Challenges in the Decentralized Web: The Mastodon Case
19th ACM Internet Measurement Conference (IMC 2019)
Fast Privacy-Preserving Network Function Outsourcing
Computer Networks, Vol. 163, 2019
Detecting Cyberbullying and Cyberaggression in Social Media
ACM Transactions on the Web (TWEB), Vol. 13, No. 3, 2019
Exploiting Unintended Feature Leakage in Collaborative Learning
40th IEEE Symposium on Security & Privacy (S&P 2019)
Privacy-Preserving Crowd-Sourcing of Web Searches with Private Data Donor
28th The Web Conference (WWW 2019)
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter & Their Influence on the Web
4th WebConf Workshop on CyberSafety, Online Harassment, and Misinformation (CyberSafety 2019)
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
ACM Transactions on Privacy and Security (ACM TOPS), Volume 22, Issue 2, April 2019
LOGAN: Membership Inference Attacks Against Generative Models
Proceedings on Privacy Enhancing Technologies, Vol. 2019, Issue 1 (PoPETS 2019)
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective
Proceedings on Privacy Enhancing Technologies, Vol. 2019, Issue 1 (PoPETS 2019)
LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers
34th Annual Computer Security Applications Conference (ACSAC 2018)
On Collaborative Predictive Blacklisting
ACM SIGCOMM's Computer Communication Review (CCR), Vol. 48, No. 5, Oct. 2018
On the Origins of Memes by Means of Fringe Web Communities
18th ACM Internet Measurement Conference (IMC 2018)
Differentially Private Mixture of Generative Neural Networks
IEEE Transactions on Knowledge and Data Engineering (TKDE 2018)
Of Wines and Reviews: Measuring and Modeling the Vivino Wine Social Network
IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2018)
A Family of Droids--Android Malware Detection via Behavioral Modeling: Static vs Dynamic Analysis
16th Annual Conference on Privacy, Security and Trust (PST 2018)
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection
16th International Conference on Applied Cryptography and Network Security (ACNS 2018)
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing
15th Internatial Conference on Security and Cryptography (SECRYPT 2018)
Understanding Web Archiving Services and Their (Mis)Use on Social Media
12th International AAAI Conference on Web and Social Media (ICWSM 2018)
AnoniMME: Bringing Anonymity to the Matchmaker Exchange Platform for Rare Disease Gene Discovery
26th ISCB Conference on Intelligent Systems for Molecular Biology (ISMB 2018)
What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?
3rd WWW Workshop on Computational Methods for CyberSafety (CyberSafety 2018)
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
25th Network and Distributed System Security Symposium (NDSS 2018)
Differentially Private Mixture of Generative Neural Networks
17th IEEE International Conference on Data Mining (ICDM 2017)
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
17th ACM Internet Measurement Conference (IMC 2017)
Measuring, Characterizing, and Detecting Facebook Like Farms
ACM Transactions on Privacy and Security, Vol. 20, No. 4 (ACM TOPS 2017)
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy
Proceedings on Privacy Enhancing Technologies, Vol. 2017, Issue 4 (PoPETS 2017)
Mean Birds: Detecting Aggression and Bullying on Twitter
9th International ACM Web Science Conference (ACM WebSci 2017), also appeared as a poster at WWW 2017
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
11th International AAAI Conference on Web and Social Media (ICWSM 2017)
Hate is not binary: Studying abusive behavior of #GamerGate on Twitter
28th ACM Conference on Hypertext and Social Media (ACM HyperText 2017)
Characterizing Key Stakeholders in an Online Black-Hat Marketplace
12th IEEE/APWG Symposium on Electronic Crime Research (eCrime 2017)
Measuring #GamerGate: A Tale of Hate, Sexism, and Bullying
2nd WWW Workshop on Computational Methods for CyberSafety (CyberSafety 2017)
Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web
26th International World Wide Web Conference Web Science Track (WWW 2017)
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
24th Network and Distributed System Security Symposium (NDSS 2017)
The Adblocking Tug-of-War
USENIX ;login: Magazine, Winter 2016, Vol. 41, No. 4 (;login: 2016)
Privacy-Friendly Mobility Analytics using Aggregate Location Data
24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL 2016)
Privacy-Preserving Genetic Relatedness Test
3rd International Workshop on Genome Privacy and Security (GenoPri 2016)
Ad-Blocking and Counter Blocking: A Slice of the Arms Races
6th USENIX Workshop on Free and Open Communications on the Internet (FOCI 2016)
SplitBox: Toward Efficient Private Network Function Virtualization
3rd ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (HotMiddleBox 2016)
Efficient Private Statistics with Succinct Sketches
23rd Network and Distributed System Security Symposium (NDSS 2016)
Experimental Analysis of Popular Smartphone Apps Offering Anonymity, Ephemerality, and End-to-End Encryption
1st NDSS Workshop on Understanding and Enhancing Online Privacy (UEOP 2016)
An Exploratory Study of User Perceptions of Payment Methods in the UK and the US
10th NDSS Workshop on Usable Security (USEC 2016)
Private Processing of Outsourced Network Functions: Feasibility and Constructions
1st ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDNNFVSEC 2016)
Controlled Data Sharing for Collaborative Predictive Blacklisting
12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2015)
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015)
Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps
8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015)
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare
IEEE Computer Magazine, Vol. 48, No. 2, February 2015
Editor version
Author version
"They brought in the horrible key ring thing" -- Analysing the Usability of Two-Factor Authentication in UK Online Banking
9th NDSS Workshop on Usable Security (USEC 2015)
Censorship in the Wild: Analyzing Web Filtering in Syria
14th ACM Internet Measurement Conference (IMC 2014)
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
14th ACM Internet Measurement Conference (IMC 2014)
Fast and Private Genomic Testing for Disease Susceptibility
13th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2014)
What's the Gist? Privacy-Preserving Aggregation of User Profiles
19th European Symposium on Research in Computer Security (ESORICS 2014)
Undetectable Communication: The Online Social Networks Case
12th IEEE Annual Conference on Privacy, Security and Trust (PST 2014)
Genomic Privacy and the Rise of a New Research Community
IEEE Security & Privacy Magazine, Vol. 12, No. 2, March-April 2014
An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing
8th NDSS Workshop on Usable Security (USEC 2014)
Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication
8th NDSS Workshop on Usable Security (USEC 2014)
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity (Extended Version)
Journal of Computer Security, Vol. 22, No. 3, 2014
Do I Know You? - Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications
29th Annual Computer Security Applications Conference (ACSAC 2013)
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI)
IEEE Transactions on Information Forensics and Security (TIFS), Vol. 8, No. 12, 2013
Secure Genomic Testing with Size- and Position-Hiding Private Substring Matching
12th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2013)
Privacy in Content-Oriented Networking: Threats and Countermeasures
ACM SIGCOMM Computer Communication Review (CCR), Vol. 43, Issue 3, July 2013
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles
7th Financial Cryptography and Data Security Workshop on Usable Security (USEC 2013)
Participatory Privacy: Enabling Privacy in Participatory Sensing
IEEE Network, Vol. 27, No. 1, Jan 2013
Data Handling in the Smart Grid: Do We Know Enough?
Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection (CIP 2013)
Private Discovery of Common Social Contacts (Extended Version)
International Journal of Information Security (IJIS), Vol. 12, No. 1, 2013
Fast and Private Computation of Cardinality of Set Intersection and Union
11th International Conference on Cryptology and Network Security (CANS 2012)
GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?
11th ACM CCS Workshop on Privacy in the Electronic Society (WPES 2012)
Code
Hummingbird: Privacy at the time of Twitter
33rd IEEE Symposium on Security and Privacy (S&P 2012)
Adversaries and Countermeasures in Privacy-Enhanced Urban Sensing Systems
IEEE Systems Journal, Special Issue on Security and Privacy in Complex Systems, 2012
Preserving Query Privacy in Urban Sensing Systems
13th International Conference on Distributed Computing and Networking (ICDCN 2012)
Harvesting SSL Certificate Data to Identify Web-Fraud
International Journal of Network Security (IJSN), Vol. 14, No. 6, 2012
Sharing Sensitive Information with Privacy
PhD Dissertation, University of California, Irvine, 2011
Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes
18th ACM Conference on Computer and Communications Security (CCS 2011)
EphPub: Toward Robust Ephemeral Publishing
19th IEEE Conference on Network Protocols (ICNP 2011)
Efficient Techniques for Privacy-preserving Sharing of Sensitive Information
4th International Conference on Trust and Trustworthy Computing (TRUST 2011)
Private Discovery of Common Social Contacts
9th International Conference on Applied Cryptography and Network Security (ACNS 2011)
Reclaiming Privacy for Smartphone Applications
9th IEEE Conference on Pervasive Computing and Communications (PerCom 2011)
PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure
4th ACM Conference on Wireless Security (WiSec 2011)
(If) Size Matters: Size-Hiding Private Set Intersection
14th IACR Conference on Practice and Theory of Public Key Cryptography (PKC 2011)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
16th IACR Conference on the Theory and Application of Cryptology (Asiacrypt 2010)
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization
IEEE Magazine on Security and Privacy, Vol. 8, No. 4, 2010
Private Information Disclosure from Web Searches
10th Privacy Enhancing Technology Symposium (PETS 2010)
Practical Private Set Intersection Protocols with Linear Complexity
Financial Cryptography and Data Security, 14th International Conference (FC 2010)
Increasing Privacy Threats in the Cyberspace: the Case of Italian E-Passports
1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC 2010)
Privacy-preserving Policy-based Information Transfer
9th Privacy Enhancing Technologies Symposium (PETS 2009)
FAIR: Fuzzy-based Aggregation providing In-network Resilience for real-time Sensor Networks
2nd ACM Symposium on Wireless Network Security (WiSec 2009)
Privacy-Preserving Querying in Sensor Networks
18th IEEE Conference on Computer Communications and Networks (ICCCN 2009)
A Distributed Implementation of the Certified Information Access Service
13th European Symposium on Research in Computer Security (ESORICS 2008)
Validating Orchestration of Web Services with BPEL and Aggregate Signatures
6th IEEE Conference on Web Services (ECOWS 2008)
A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks
8th IEEE Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM 2007)
A Bluetooth-based JXME infrastructure
International Symposium on Distributed Objects, Middleware, and Applications (DOA 2007)
A J2ME transparent middleware to support HTTP connections over Bluetooth
2nd IEEE Conference on Systems and Networks Communications (ICSNC 2007)
A Lightweight Framework for Web Services Invocation over Bluetooth
14th IEEE International Conference on Web Services (ICWS 2006)
Performance Evaluation of Web Services Invocation over Bluetooth
9th ACM Conference on Modeling, Analysis, Simulation of Wireless and Mobile Systems (MSWiM 2006)