Exploiting Unintended Feature Leakage in Collaborative Learning L Melis, C Song, E De Cristofaro, V Shmatikov IEEE Symposium on Security and Privacy, 2019 | 1970 | 2019 |
LOGAN: Membership Inference Attacks Against Generative Models J Hayes, L Melis, G Danezis, E De Cristofaro Proceedings on Privacy Enhancing Technologies 2019 (1), 133-152, 2019 | 726* | 2019 |
Practical private set intersection protocols with linear complexity E De Cristofaro, G Tsudik Financial Cryptography and Data Security, 143-159, 2010 | 601 | 2010 |
Mean birds: Detecting aggression and bullying on twitter D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ... Proceedings of the 2017 ACM on Web Science Conference, 13-22, 2017 | 539 | 2017 |
🏆 MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ... 24th Network and Distributed System Security Symposium (NDSS 2017), 2017 | 394 | 2017 |
🏆 Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ... 11th International AAAI Conference on Web and Social Media (ICWSM 2017), 2017 | 372 | 2017 |
🏆 On the Origins of Memes by Means of Fringe Web Communities S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ... ACM Internet Measurement Conference, 2018 | 371 | 2018 |
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 341 | 2011 |
What is gab: A bastion of free speech or an alt-right echo chamber S Zannettou, B Bradlyn, E De Cristofaro, H Kwak, M Sirivianos, G Stringini, ... Companion Proceedings of the The Web Conference 2018, 1007-1014, 2018 | 340 | 2018 |
MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version) L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ... ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019 | 332 | 2019 |
EphPub: Toward Robust Ephemeral Publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar ICNP 2011, 2011 | 330 | 2011 |
🏆 Knock Knock, Who's There? Membership Inference on Aggregate Location Data A Pyrgelis, C Troncoso, E De Cristofaro Network and Distributed Systems Symposium (NDSS), 2018 | 315 | 2018 |
🏆 Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the Web S Zannettou, T Caulfield, E De Cristofaro, M Sirivianos, G Stringhini, ... Companion Proceedings of The 2019 World Wide Web Conference, 218-226, 2019 | 295 | 2019 |
Linear-complexity private set intersection protocols secure in malicious model E De Cristofaro, J Kim, G Tsudik Advances in Cryptology-ASIACRYPT 2010, 213-231, 2010 | 291 | 2010 |
Fast and Private Computation of Cardinality of Set Intersection and Union E De Cristofaro, P Gasti, G Tsudik CANS 2012, 2012 | 279 | 2012 |
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning M Naseri, J Hayes, E De Cristofaro Network and Distributed System Security Symposium (NDSS 2022), 2022 | 261* | 2022 |
The Evolution of the Manosphere across the Web MH Ribeiro, J Blackburn, B Bradlyn, E De Cristofaro, G Stringhini, S Long, ... Proceedings of the International AAAI Conference on Web and Social Media 15 …, 2021 | 259* | 2021 |
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ... 17th ACM Internet Measurement Conference (IMC 2017), 2017 | 250 | 2017 |
🏆 Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels M Horta Ribeiro, S Jhaver, S Zannettou, J Blackburn, G Stringhini, ... Proceedings of the ACM on Human-Computer Interaction 5 (CSCW2), 1-24, 2021 | 203 | 2021 |
Hummingbird: Privacy at the time of Twitter E De Cristofaro, C Soriente, G Tsudik, A Williams IEEE Security and Privacy 2012, 2012 | 190 | 2012 |