Exploiting Unintended Feature Leakage in Collaborative Learning L Melis, C Song, E De Cristofaro, V Shmatikov IEEE Symposium on Security and Privacy, 2019 | 1196 | 2019 |
Practical private set intersection protocols with linear complexity E De Cristofaro, G Tsudik Financial Cryptography and Data Security, 143-159, 2010 | 506 | 2010 |
LOGAN: Membership Inference Attacks Against Generative Models J Hayes, L Melis, G Danezis, E De Cristofaro Proceedings on Privacy Enhancing Technologies 2019 (1), 133-152, 2019 | 481* | 2019 |
Mean birds: Detecting aggression and bullying on twitter D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ... Proceedings of the 2017 ACM on Web Science Conference, 13-22, 2017 | 416 | 2017 |
MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ... 24th Network and Distributed System Security Symposium (NDSS 2017), 2017 | 317 | 2017 |
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ... 11th International AAAI Conference on Web and Social Media (ICWSM 2017), 2017 | 296 | 2017 |
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 296 | 2011 |
On the Origins of Memes by Means of Fringe Web Communities S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ... ACM Internet Measurement Conference, 2018 | 267 | 2018 |
Linear-complexity private set intersection protocols secure in malicious model E De Cristofaro, J Kim, G Tsudik Advances in Cryptology-ASIACRYPT 2010, 213-231, 2010 | 258 | 2010 |
Fast and Private Computation of Cardinality of Set Intersection and Union E De Cristofaro, P Gasti, G Tsudik CANS 2012, 2012 | 242 | 2012 |
What is gab: A bastion of free speech or an alt-right echo chamber S Zannettou, B Bradlyn, E De Cristofaro, H Kwak, M Sirivianos, G Stringini, ... Companion Proceedings of the The Web Conference 2018, 1007-1014, 2018 | 241 | 2018 |
Knock Knock, Who's There? Membership Inference on Aggregate Location Data A Pyrgelis, C Troncoso, E De Cristofaro Network and Distributed Systems Symposium (NDSS), 2018 | 225 | 2018 |
EphPub: Toward Robust Ephemeral Publishing C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar ICNP 2011, 2011 | 225 | 2011 |
MaMaDroid: Detecting Android malware by building Markov chains of behavioral models (extended version) L Onwuzurike, E Mariconti, P Andriotis, ED Cristofaro, G Ross, ... ACM Transactions on Privacy and Security (TOPS) 22 (2), 1-34, 2019 | 221 | 2019 |
Disinformation warfare: Understanding state-sponsored trolls on Twitter and their influence on the Web S Zannettou, T Caulfield, E De Cristofaro, M Sirivianos, G Stringhini, ... Companion Proceedings of The 2019 World Wide Web Conference, 218-226, 2019 | 217 | 2019 |
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ... 17th ACM Internet Measurement Conference (IMC 2017), 2017 | 209 | 2017 |
Hummingbird: Privacy at the time of Twitter E De Cristofaro, C Soriente, G Tsudik, A Williams IEEE Security and Privacy 2012, 2012 | 184 | 2012 |
Privacy in Content-Oriented Networking: Threats and Countermeasures A Chaabane, E De Cristofaro, MA Kaafar, E Uzun Computer Communication Review 43 (3), 25-33, 2012 | 151 | 2012 |
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq IMC 2014, 2014 | 150 | 2014 |
A comparative usability study of two-factor authentication E De Cristofaro, H Du, J Freudiger, G Norcie USEC 2014, 2014 | 146* | 2014 |