Synthical
Your space
Profile
Activity
Favorites
Folders
Feeds
All articles
Claim page
Emiliano De Cristofaro
Follow
Activity
Upvotes
Folders
Articles
121
To Shuffle or not to Shuffle: Auditing DP-SGD with Shuffling
15 November 2024 by
Meenatchi Sundaram Muthu Selva Annamalai
and
others
Cryptography and Security
,
Machine Learning
The Inadequacy of Similarity-based Privacy Metrics: Privacy Attacks against "Truly Anonymous" Synthetic Datasets
12 November 2024 by
Georgi Ganev
and
Emiliano Cristofaro
at
University College London
Cryptography and Security
,
Artificial Intelligence
Nearly Tight Black-Box Auditing of Differentially Private Machine Learning
2 November 2024 by
Meenatchi Sundaram Muthu Selva Annamalai
and
Emiliano Cristofaro
at
University College London
Cryptography and Security
,
Machine Learning
Revealing The Secret Power: How Algorithms Can Influence Content Visibility on Social Media
22 October 2024 by
Mauro Conti
and
others
Social and Information Networks
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility
28 August 2024 by
Georgi Ganev
and
others
Machine Learning
,
Cryptography and Security
TUBERAIDER: Attributing Coordinated Hate Attacks on YouTube Videos to their Source Communities
23 June 2024 by
Mohammad Hammas Saeed
and
others
at
Binghamton University
Social and Information Networks
,
Cryptography and Security
The Elusive Pursuit of Replicating PATE-GAN: Benchmarking, Auditing, Debugging
20 June 2024 by
Georgi Ganev
and
others
Machine Learning
,
Cryptography and Security
"Here's Your Evidence": False Consensus in Public Twitter Discussions of COVID-19 Science
7 June 2024 by
Alexandros Efstratiou
and
others
Computers and Society
,
Social and Information Networks
A Systematic Review of Federated Generative Models
26 May 2024 by
Ashkan Vedadi Gargary
and
Emiliano Cristofaro
Machine Learning
,
Computation and Language
iDRAMA-Scored-2024: A Dataset of the Scored Social Media Platform from 2020 to 2023
16 May 2024 by
Jay Patel
and
others
at
Binghamton University
Social and Information Networks
,
Computers and Society
"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation
16 May 2024 by
Meenatchi Sundaram Muthu Selva Annamalai
and
others
Cryptography and Security
Synthetic Data: Methods, Use Cases, and Risks
27 February 2024 by
Emiliano Cristofaro
at
UC Riverside
Cryptography and Security
,
Artificial Intelligence
From HODL to MOON: Understanding Community Evolution, Emotional Dynamics, and Price Interplay in the Cryptocurrency Ecosystem
12 December 2023 by
Kostantinos Papadamou
and
others
at
Binghamton University
Cryptography and Security
,
Computers and Society
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting
28 November 2023 by
Meenatchi Sundaram Muthu Selva Annamalai
and
others
at
University College London
Cryptography and Security
,
Computers and Society
BadVFL: Backdoor Attacks in Vertical Federated Learning
23 August 2023 by
Mohammad Naseri
and
others
at
University College London
Machine Learning
,
Cryptography and Security
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces
13 March 2023 by
Utkucan Balci
and
others
Computers and Society
,
Social and Information Networks
Understanding the Use of e-Prints on Reddit and 4chan's Politically Incorrect Board
6 March 2023 by
Satrio Baskoro Yudhoatmojo
and
others
Digital Libraries
,
Social and Information Networks
LAMBRETTA: Learning to Rank for Twitter Soft Moderation
12 December 2022 by
Pujan Paudel
and
others
Cryptography and Security
,
Computers and Society
Non-Polar Opposites: Analyzing the Relationship Between Echo Chambers and Hostile Intergroup Interactions on Reddit
25 November 2022 by
Alexandros Efstratiou
and
others
Computers and Society
,
Social and Information Networks
Fast and Private Computation of Cardinality of Set Intersection and Union
7 November 2022 by
Emiliano Cristofaro
and
others
Cryptography and Security
,
Cryptology
Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots
9 September 2022 by
Wai Man Si
and
others
Computers and Society
,
Artificial Intelligence
Cerberus: Exploring Federated Prediction of Security Events
7 September 2022 by
Mohammad Naseri
and
others
Cryptography and Security
,
Artificial Intelligence
Adherence to Misinformation on Social Media Through Socio-Cognitive and Group-Based Processes
30 June 2022 by
Alexandros Efstratiou
and
Emiliano Cristofaro
at
University College London
Computers and Society
,
Social and Information Networks
Toxicity in the Decentralized Web and the Potential for Model Sharing
27 April 2022 by
Haris Bin Zia
and
others
Computers and Society
,
Networking and Internet Architecture
Feels Bad Man: Dissecting Automated Hateful Meme Detection Through the Lens of Facebook's Challenge
17 February 2022 by
Catherine Jennifer
and
others
Computers and Society
,
Computer Vision and Pattern Recognition
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
1 December 2021 by
Mohammad Hammas Saeed
and
others
Cryptography and Security
,
Computers and Society
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos
3 November 2021 by
Chen Ling
and
others
at
Binghamton University
Computers and Society
,
Computer Vision and Pattern Recognition
Soros, Child Sacrifices, and 5G: Understanding the Spread of Conspiracy Theories on Web Communities
3 November 2021 by
Pujan Paudel
and
others
Social and Information Networks
,
Computers and Society
Exploring Content Moderation in the Decentralised Web: The Pleroma Case
30 October 2021 by
Anaobi Ishaku Hassan
and
others
Computers and Society
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
6 October 2021 by
Yugeng Liu
and
others
Cryptography and Security
,
Artificial Intelligence
Load more
This is an AI-generated summary
Key points
Topics
Cryptography and Security
Computers and Society
Social and Information Networks
Artificial Intelligence
Cryptology
Machine Learning
Networking and Internet Architecture
Human-Computer Interaction
Genomics
Physics and Society
Cryptology Applications
Cryptographic Protocols
Information Retrieval
Digital Libraries
Computer Vision and Pattern Recognition