no code implementations • 8 Dec 2023 • Georgi Ganev, Emiliano De Cristofaro
Alas, this is not the standard in industry as many companies use ad-hoc strategies to empirically evaluate privacy based on the statistical similarity between synthetic and real data.
no code implementations • 18 May 2023 • Georgi Ganev, Kai Xu, Emiliano De Cristofaro
Generative models trained with Differential Privacy (DP) are increasingly used to produce synthetic data while reducing privacy risks.
no code implementations • 18 Apr 2023 • Mohammad Naseri, Yufei Han, Emiliano De Cristofaro
In VFL, the participants share the same set of training instances but only host a different and non-overlapping subset of the whole feature space.
no code implementations • 1 Mar 2023 • Emiliano De Cristofaro
Sharing data can often enable compelling applications and analytics.
no code implementations • 7 Sep 2022 • Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang
We show that publicly available chatbots are prone to providing toxic responses when fed toxic queries.
no code implementations • 7 Sep 2022 • Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro
Modern defenses against cyberattacks increasingly rely on proactive approaches, e. g., to predict the adversary's next actions based on past events.
no code implementations • 17 Feb 2022 • Catherine Jennifer, Fatemeh Tahmasbi, Jeremy Blackburn, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro
Internet memes have become a dominant method of communication; at the same time, however, they are also increasingly being used to advocate extremism and foster derogatory beliefs.
no code implementations • 3 Nov 2021 • Chen Ling, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini
We do so vis-\`a-vis three research hypotheses; namely, that: 1) the video content, 2) TikTok's recommendation algorithm, and 3) the popularity of the video creator contribute to virality.
no code implementations • 23 Sep 2021 • Georgi Ganev, Bristena Oprisanu, Emiliano De Cristofaro
We analyze the impact of DP on these models vis-a-vis underrepresented classes/subgroups of data, specifically, studying: 1) the size of classes/subgroups in the synthetic data, and 2) the accuracy of classification tasks run on them.
no code implementations • 5 Feb 2021 • Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro
The availability of genomic data is essential to progress in biomedical research, personalized medicine, etc.
1 code implementation • 4 Feb 2021 • Yugeng Liu, Rui Wen, Xinlei He, Ahmed Salem, Zhikun Zhang, Michael Backes, Emiliano De Cristofaro, Mario Fritz, Yang Zhang
As a result, we lack a comprehensive picture of the risks caused by the attacks, e. g., the different scenarios they can be applied to, the common factors that influence their performance, the relationship among them, or the effectiveness of possible defenses.
no code implementations • 21 Jan 2021 • Max Aliapoulios, Antonis Papasavva, Cameron Ballard, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Jeremy Blackburn
By interpreting cryptic "drops" of information from an anonymous insider calling themself Q, adherents of the conspiracy theory believe that Donald Trump is leading them in an active fight against this cabal.
Computers and Society Social and Information Networks
no code implementations • 11 Jan 2021 • Max Aliapoulios, Emmi Bevensee, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou
Parler is as an "alternative" social network promoting itself as a service that allows to "speak freely and express yourself openly, without fear of being deplatformed for your views."
Social and Information Networks Computers and Society Physics and Society
no code implementations • 8 Sep 2020 • Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro
This paper investigates whether and to what extent one can use differential Privacy (DP) to protect both privacy and robustness in FL.
no code implementations • 18 May 2020 • Emiliano De Cristofaro
In this document, we set to review privacy challenges in this space, providing a systematic review of the relevant research literature, also exploring possible countermeasures.
no code implementations • 22 Jan 2020 • Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
YouTube is by far the largest host of user-generated video content worldwide.
Computers and Society
no code implementations • 21 Jan 2020 • Manoel Horta Ribeiro, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Summer Long, Stephanie Greenberg, Savvas Zannettou
In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years.
Computers and Society
1 code implementation • 12 Sep 2019 • Aravindh Raman, Sagar Joglekar, Emiliano De Cristofaro, Nishanth Sastry, Gareth Tyson
The Decentralised Web (DW) has recently seen a renewed momentum, with a number of DW platforms like Mastodon, Peer-Tube, and Hubzilla gaining increasing traction.
Networking and Internet Architecture Cryptography and Security Computers and Society
no code implementations • 20 Jul 2019 • Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis
We also explore specific manifestations of abusive behavior, i. e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate).
1 code implementation • 5 Oct 2018 • Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro
Unfortunately, however, research on CPB has only focused on increasing the number of predicted attacks but has not considered the impact on false positives and false negatives.
Cryptography and Security
2 code implementations • 31 May 2018 • Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil
In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2. 6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months.
Social and Information Networks Computers and Society
1 code implementation • 10 May 2018 • Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov
First, we show that an adversarial participant can infer the presence of exact data points -- for example, specific locations -- in others' training data (i. e., membership inference).
no code implementations • 9 Mar 2018 • Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro
Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed.
Cryptography and Security
no code implementations • 31 Jan 2018 • Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini
Web archiving services play an increasingly important role in today's information ecosystem, by ensuring the continuing availability of information, or by deliberately caching content that might get deleted or removed.
Computers and Society Digital Libraries Social and Information Networks
no code implementations • 20 Nov 2017 • Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Aiming to assess whether MaMaDroid's effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls.
no code implementations • 13 Sep 2017 • Gergely Acs, Luca Melis, Claude Castelluccia, Emiliano De Cristofaro
We model the generator distribution of the training data with a mixture of $k$ generative neural networks.
1 code implementation • 22 May 2017 • Jamie Hayes, Luca Melis, George Danezis, Emiliano De Cristofaro
Generative models estimate the underlying distribution of a dataset to generate realistic samples according to that distribution.
no code implementations • 24 Feb 2017 • Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms.
1 code implementation • 22 Feb 2017 • Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics.
Computers and Society Social and Information Networks
no code implementations • 13 Dec 2016 • Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Finally, we compare against DroidAPIMiner, a state-of-the-art system that relies on the frequency of API calls performed by apps, showing that MaMaDroid significantly outperforms it.
Cryptography and Security
no code implementations • 26 Oct 2016 • Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini
In this paper, we present a large-scale study of recipes published on the web and their content, aiming to understand cuisines and culinary habits around the world.
no code implementations • 21 Sep 2016 • Apostolos Pyrgelis, Emiliano De Cristofaro, Gordon Ross
Location data can be extremely useful to study commuting patterns and disruptions, as well as to predict real-time traffic volumes.
no code implementations • 13 Dec 2015 • Luca Melis, Apostolos Pyrgelis, Emiliano De Cristofaro
(Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat mitigation.
no code implementations • 4 May 2015 • Lucky Onwuzurike, Emiliano De Cristofaro
This paper presents a measurement study of information leakage and SSL vulnerabilities in popular Android apps.
Cryptography and Security Software Engineering
no code implementations • 7 Sep 2014 • Emiliano De Cristofaro, Arik Friedman, Guillaume Jourjon, Mohamed Ali Kaafar, M. Zubair Shafiq
Facebook pages offer an easy way to reach out to a very large audience as they can easily be promoted using Facebook's advertising platform.
Social and Information Networks Cryptography and Security Physics and Society
no code implementations • 8 Jan 2009 • Emiliano De Cristofaro, Jens-Matthias Bohli, Dirk Westhoff
This work introduces FAIR, a novel framework for Fuzzy-based Aggregation providing In-network Resilience for Wireless Sensor Networks.
Cryptography and Security