• 2434 Citations
  • 27 h-Index
20032020
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2003 2020

Filter
Conference contribution
2019
1 Citation (Scopus)

Detection and analysis of self-disclosure in online news commentaries

Umar, P., Squicciarini, A. & Rajtmajer, S., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 3272-3278 7 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syntactics
Linguistics
Websites
Semantics
Costs

Flexible inference for cyberbully incident detection

Zhong, H., Miller, D. J. & Squicciarini, A., Jan 1 2019, Machine Learning and Knowledge Discovery in Databases - European Conference, ECML PKDD 2018, Proceedings. Brefeld, U., Marascu, A., Pinelli, F., Curry, E., MacNamee, B., Hurley, N., Daly, E. & Berlingerio, M. (eds.). Springer Verlag, p. 356-371 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11053 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
Sorting
Output
Neural Network Model
Social Networks

FriendGuard: A friend search engine with guaranteed friend exposure degree

Morris, J., Lin, D. & Squicciarini, A., May 28 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 37-48 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines

Hierarchical clustering for discrimination discovery: A top-down approach

Nasiriani, N., Squicciarini, A., Saldanha, Z., Goel, S. & Zannone, N., Jun 1 2019, Proceedings - IEEE 2nd International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2019. Institute of Electrical and Electronics Engineers Inc., p. 187-194 8 p. 8791737. (Proceedings - IEEE 2nd International Conference on Artificial Intelligence and Knowledge Engineering, AIKE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision making
Learning systems
Labels
Top-down approach
Discrimination

Location privacy protection in vehicle-based spatial crowdsourcing via geo-indistinguishability

Squicciarini, A. C. & Qiu, C., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 1061-1071 11 p. 8885076. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quality of service
Linear programming
Computational complexity
Servers

Rating mechanisms for sustainability of crowdsourcing platforms

Qiu, C., Squicciarini, A. & Rajtmajer, S., Nov 3 2019, CIKM 2019 - Proceedings of the 28th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 2003-2012 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Rating
Sustainability
Amazon
Health
Leverage
2018

Combating behavioral deviance via user behavior control

Qiu, C., Squicciarini, A., Griffin, C. & Umar, P., Jan 1 2018, 17th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2018. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 202-210 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Combating crowdsourced review manipulators: A neighborhood-based approach

Kaghazgaran, P., Caverlee, J. & Squicciarini, A., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 306-314 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Manipulators
Seed
1 Citation (Scopus)

CrowdEval: A cost-efficient strategy to evaluate crowdsourced worker's reliability

Qiu, C., Squicciarini, A., Khare, D. R., Carminati, B. & Caverlee, J., Jan 1 2018, 17th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2018. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), Vol. 2. p. 1486-1494 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
Experiments
1 Citation (Scopus)

From tag to protect: A tag-driven policy recommender system for image sharing

Squicciarini, A., Novelli, A., Lin, D., Caragea, C. & Zhong, H., Sep 28 2018, Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017. Institute of Electrical and Electronics Engineers Inc., p. 337-346 10 p. 8476952. (Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Semantics
Tag
Privacy
2 Citations (Scopus)

Multi-party access control: Requirements, state of the art and open challenges

Squicciarini, A., Rajtmajer, S. & Zannone, N., Jun 7 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, 1 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Data privacy
Data mining
1 Citation (Scopus)

Privacy-aware tag recommendation for image sharing

Tonge, A., Caragea, C. & Squicciarini, A., Jul 3 2018, HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, Inc, p. 52-56 5 p. (HT 2018 - Proceedings of the 29th ACM Conference on Hypertext and Social Media).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hard facing
1 Citation (Scopus)

Server-based manipulation attacks against machine learning models

Liao, C., Zhu, S., Zhong, H. & Squicciarini, A., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 2-34 33 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Servers
Image classification
Supervised learning
Electronic mail
2 Citations (Scopus)

Toward automated multiparty privacy conflict detection

Zhong, H., Squicciarini, A. & Miller, D. J., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1811-1814 4 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy
Neural networks
Multiple stakeholders
Decision-making process
Access control
5 Citations (Scopus)

Uncovering scene context for predicting privacy of online shared images

Tonge, A., Caragea, C. & Squicciarini, A., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI press, p. 8167-8168 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neural networks
2017
6 Citations (Scopus)

A Group-Based personalized model for image privacy classification and labeling

Zhong, H., Squicciarini, A., Miller, D. & Caragea, C., Jan 1 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 3952-3958 7 p. (IJCAI International Joint Conference on Artificial Intelligence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labeling
Labels
Classifiers
3 Citations (Scopus)

An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content

Rajtmajer, S., Squicciarini, A., Such, J. M., Semonsen, J. & Belmonte, A., Jan 1 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings. Kiekintveld, C., Schauer, S., An, B., Rass, S. & Fang, F. (eds.). Springer Verlag, p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10575 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Privacy
Internet
Game
Sharing

Consensus on social graphs under increasing peer pressure

Semonsen, J., Griffin, C., Squicciarini, A. & Rajtmajer, S., Jan 1 2017, 16th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2017. Durfee, E., Winikoff, M., Larson, K. & Das, S. (eds.). International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 1731-1732 2 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
4 Citations (Scopus)

Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control

Qiu, C., Squicciarini, A., Rajtmajer, S. & Caverlee, J., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1168-1177 10 p. 7980057. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quality control
Costs
2 Citations (Scopus)

Invited Paper: A model of paradoxical privacy behavior in users and online sites

Griffin, C., Rajtmajer, S. & Squicciarini, A., Jan 6 2017, Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016. Institute of Electrical and Electronics Engineers Inc., p. 206-211 6 p. 7809708. (Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

privacy
social network
costs
interaction
resources
2 Citations (Scopus)

LAST-HDFS: Location-aware storage technique for hadoop distributed file system

Liao, C., Squicciarini, A. & Lin, D., Jan 17 2017, Proceedings - 2016 IEEE 9th International Conference on Cloud Computing, CLOUD 2016. Foster, I., Radia, N. & Foster, I. (eds.). IEEE Computer Society, p. 662-669 8 p. 7820330. (IEEE International Conference on Cloud Computing, CLOUD).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Monitoring

Real-Time Detection of Illegal File Transfers in the Cloud

Bowers, A., Lin, D., Squicciarini, A. & Hurson, A., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2597-2600 4 p. 7980248. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Data storage equipment
Monitoring

Toward group-based user-attribute policies in azure-like access control systems

Ferrara, A. L., Squicciarini, A., Liao, C. & Nguyen, T. L., Jan 1 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Attribute
Control System
Availability
2016
1 Citation (Scopus)

An emotional step towards automated trust detection in crisis social media

Halse, S. E., Tapia, A. H., Squicciarini, A. & Caragea, C., Jan 1 2016, ISCRAM 2016 Conference Proceedings - 13th International Conference on Information Systems for Crisis Response and Management. Banuls Silvera, V. A., Tapia, A. H., Antunes, P., Porto de Albuquerque, J. & Moore, K. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (Proceedings of the International ISCRAM Conference; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bombing
Hurricanes
Social media
Emotion
Crisis response

An in-depth study of peer influence on collective decision making for multi-party access control

Tyagi, A., Squicciarini, A., Rajtmajer, S. & Griffin, C., Jan 1 2016, Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016. Institute of Electrical and Electronics Engineers Inc., p. 305-314 10 p. (Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Decision making
Peer influence
Social networks
User studies
12 Citations (Scopus)

Constrained social-energy minimization for multi-party sharing in online social networks

Rajtmajer, S., Squicciarini, A., Griffin, C., Karumanchi, S. & Tyagi, A., Jan 1 2016, AAMAS 2016 - Proceedings of the 2016 International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), p. 680-688 9 p. (Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
8 Citations (Scopus)

CrowdSelect: Increasing accuracy of crowdsourcing tasks through behavior prediction and user selection

Qiu, C., Squicciarini, A. C., Carminati, B., Caverlee, J. & Khare, D. R., Oct 24 2016, CIKM 2016 - Proceedings of the 2016 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 539-548 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Prediction
Workers
Costs
Amazon
Accountability
1 Citation (Scopus)

Efficient network path verification for policy-routed queries

Karumanchi, S., Li, J. & Squicciarini, A., Mar 9 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 319-328 10 p. (CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Peer to peer networks
3 Citations (Scopus)

Tweet factors influencing trust and usefulness during both man-made and natural disasters

Halse, S. E., Tapia, A. H., Squicciarini, A. & Caragea, C., Jan 1 2016, ISCRAM 2016 Conference Proceedings - 13th International Conference on Information Systems for Crisis Response and Management. Porto de Albuquerque, J., Moore, K. A., Antunes, P., Tapia, A. H. & Banuls Silvera, V. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (Proceedings of the International ISCRAM Conference; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Bombing
Hurricanes
Man-made disasters
Usefulness
10 Citations (Scopus)

Uncovering the spatio-temporal dynamics of memes in the presence of incomplete information

Ge, H., Caverlee, J., Zhang, N. & Squicciarini, A., Oct 24 2016, CIKM 2016 - Proceedings of the 2016 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1493-1502 10 p. (International Conference on Information and Knowledge Management, Proceedings; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Incomplete information
Search advertising
Sampling
Location-based services
Modeling
2015

A hybrid epidemic model for antinormative behavior in online social networks

Liao, C., Squicciarini, A., Griffin, C. & Rajtmajer, S., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 1563-1564 2 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Finite automata
Experiments
2 Citations (Scopus)

An evolutionary game model for the spread of non-cooperative behavior in online social networks

Rajtmajer, S., Griffin, C., Mikesell, D. & Squicciarini, A., Apr 13 2015, 2015 Symposium on Applied Computing, SAC 2015. Shin, D. (ed.). Association for Computing Machinery, p. 1154-1159 6 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 13-17-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
1 Citation (Scopus)

Determining a discrete set of site-constrained privacy options for users in social networks through stackelberg games

Rajtmajer, S., Griffin, C. & Squicciarini, A., Jan 1 2015, Decision and Game Theory for Security - 6th International Conference, GameSec 2015, Proceedings. Khouzani, M. H. R., Panaousis, E. & Theodorakopoulos, G. (eds.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9406).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stackelberg Game
Social Networks
Privacy
Game
Approximation algorithms
1 Citation (Scopus)

Epidemic behavior of negative users in online social sites

Liao, C., Squicciarini, A. & Griffin, C., Jan 1 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 143-145 3 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pollution
Experiments
22 Citations (Scopus)

Identification and characterization of cyberbullying dynamics in an online social network

Squicciarini, A., Rajtmajer, S., Liu, Y. & Griffin, C., Aug 25 2015, Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015. Pei, J., Tang, J. & Silvestri, F. (eds.). Association for Computing Machinery, Inc, p. 280-285 6 p. (Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Analytical models

Privacy and access control; How are these twoconcepts related?

Squicciarini, A. & Yu, T., Jun 1 2015, SACMAT 2015 - Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 197-198 2 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 2015-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
8 Citations (Scopus)

SecLoc: Securing location-sensitive storage in the cloud

Li, J., Squicciarini, A., Lin, D., Liang, S. & Jia, C., Jun 1 2015, SACMAT 2015 - Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 51-61 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 2015-June).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Scalability
Health
12 Citations (Scopus)

Toward de-anonymizing bitcoin by mapping users location

Dupont, J. & Squicciarini, A., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 139-141 3 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
Electronic money
8 Citations (Scopus)

Towards provenance-based anomaly detection in MapReduce

Liao, C. & Squicciarini, A., Jul 7 2015, Proceedings - 2015 IEEE/ACM 15th International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2015. Institute of Electrical and Electronics Engineers Inc., p. 647-656 10 p. 7152530. (Proceedings - 2015 IEEE/ACM 15th International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data acquisition
Processing
Experiments
19 Citations (Scopus)

Twitter mining for disaster response: A domain adaptation approach

Li, H., Guevara, N., Herndon, N., Caragea, D., Neppalli, K., Caragea, C., Squicciarini, A. & Tapia, A. H., Jan 1 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. A., Comes, T., Buscher, M., Hughes, A. L. & Palen, L. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management; vol. 2015-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Classifiers
Supervised learning
Disaster
Twitter
35 Citations (Scopus)

Uncovering crowdsourced manipulation of online reviews

Fayazi, A., Lee, K., Caverlee, J. & Squicciarini, A., Aug 9 2015, SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval. Association for Computing Machinery, Inc, p. 233-242 10 p. (SIGIR 2015 - Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seed
Decision making
Sampling
Statistical Models
2014
17 Citations (Scopus)

Analyzing images' privacy for the modern web

Squicciarini, A., Caragea, C. & Balakavi, R., Jan 1 2014, HT 2014 - Proceedings of the 25th ACM Conference on Hypertext and Social Media. Association for Computing Machinery, p. 136-147 12 p. (HT 2014 - Proceedings of the 25th ACM Conference on Hypertext and Social Media).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

30 Citations (Scopus)

Enabling privacy-preserving image-centric social discovery

Yuan, X., Wang, X., Wang, C., Squicciarini, A. & Ren, K., Aug 29 2014, Proceedings - International Conference on Distributed Computing Systems. Institute of Electrical and Electronics Engineers Inc., p. 198-207 10 p. 6888896. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
1 Citation (Scopus)

Identifying multi-regime behaviors of memes in Twitter data

Griffin, C., Squicciarini, A. & Styer, S., Oct 7 2014, Proceedings of 2014 Science and Information Conference, SAI 2014. Institute of Electrical and Electronics Engineers Inc., p. 827-837 11 p. 6918281. (Proceedings of 2014 Science and Information Conference, SAI 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Autocorrelation
Linguistics
Markov processes
Statistical Models
3 Citations (Scopus)

In the wild: A large scale study of web services vulnerabilities

Karumanchi, S. & Squicciarini, A., Jan 1 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. Association for Computing Machinery, p. 1239-1246 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Web services
Taxonomies
Interoperability
Internet
56 Citations (Scopus)

Mapping moods: Geo-mapped sentiment analysis during hurricane sandy

Caragea, C., Squicciarini, A., Stehle, S., Neppalli, K. & Tapia, A. H., Jan 1 2014, ISCRAM 2014 Conference Proceedings - 11th International Conference on Information Systems for Crisis Response and Management. The Pennsylvania State University, p. 642-651 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hurricanes
Disasters
2 Citations (Scopus)

Online abusive users analytics through visualization

Squicciarini, A. C., Dupont, J. & Chen, R., Apr 7 2014, WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 155-158 4 p. (WWW 2014 Companion - Proceedings of the 23rd International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Visualization
10 Citations (Scopus)

Toward detecting compromised mapreduce workers through log analysis

Yoon, E. & Sqcuicciarini, A., Jan 1 2014, Proceedings - 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2014. IEEE Computer Society, p. 41-50 10 p. 6846439. (Proceedings - 14th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, CCGrid 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013
14 Citations (Scopus)

Adaptive data protection in distributed sysems

Squicciarini, A. C., Petracca, G. & Bertino, E., Mar 18 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 365-376 12 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Object oriented programming
Synchronization
Network protocols
Data storage equipment
27 Citations (Scopus)

Information-oriented trustworthiness evaluation in vehicular ad-hoc networks

Gurung, S., Lin, D., Squicciarini, A. & Bertino, E., Sep 9 2013, Network and System Security - 7th International Conference, NSS 2013, Proceedings. p. 94-108 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7873 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Vehicular Ad Hoc Networks
Trustworthiness
Authentication
Evaluation