Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024JUST ACCEPTED
Privacy-Preserving and Diversity-Aware Trust-based Team Formation in Online Social Networks
ACM Transactions on Intelligent Systems and Technology (TIST), Just Accepted https://doi.org/10.1145/3670411As online social networks (OSNs) become more prevalent, a new paradigm for problem-solving through crowd-sourcing has emerged. By leveraging the OSN platforms, users can post a problem to be solved and then form a team to collaborate and solve the ...
- short-paperJune 2024
What we can learn from TikTok through its Research API
Websci Companion '24: Companion Publication of the 16th ACM Web Science ConferencePages 110–114https://doi.org/10.1145/3630744.3663611TikTok is a social media platform that has gained immense popularity over the last few years, particularly among younger demographics, due to the viral trends and challenges shared worldwide. The recent release of a free Research API opens the door to ...
- research-articleMarch 2024
AdverSPAM: Adversarial SPam Account Manipulation in Online Social Networks
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 2Article No.: 15, Pages 1–31https://doi.org/10.1145/3643563In recent years, the widespread adoption of Machine Learning (ML) at the core of complex IT systems has driven researchers to investigate the security and reliability of ML techniques. A very specific kind of threats concerns the adversary mechanisms ...
- research-articleDecember 2023
Generating Robust Adversarial Examples against Online Social Networks (OSNs)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 20, Issue 4Article No.: 98, Pages 1–26https://doi.org/10.1145/3632528Online Social Networks (OSNs) have blossomed into prevailing transmission channels for images in the modern era. Adversarial examples (AEs) deliberately designed to mislead deep neural networks (DNNs) are found to be fragile against the inevitable lossy ...
- research-articleMarch 2024
The Impact of Linkability On Privacy Leakage
ASONAM '23: Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 364–370https://doi.org/10.1145/3625007.3627832Online Social Networks are responsible for disclosing a large amount of sensitive information. Often, users unknowingly disclose vast amounts of sensitive and potentially (un)related data, oblivious to the associated privacy risks. Our research provides ...
-
- ArticleOctober 2023
Priv-S: Privacy-Sensitive Data Identification in Online Social Networks
Web Information Systems Engineering – WISE 2023Pages 220–234https://doi.org/10.1007/978-981-99-7254-8_17AbstractPrivacy inference imposes a serious threat to user privacy in Online Social Networks (OSNs) as the vast amount of personal data and relationships in OSNs can be used not only to infer user privacy but also to enrich the training set of inference ...
- extended-abstractJuly 2023
Predicting Stance to Detect Misinformation in Few-shot Learning
TAS '23: Proceedings of the First International Symposium on Trustworthy Autonomous SystemsArticle No.: 53, Pages 1–5https://doi.org/10.1145/3597512.3599717Stance is an important insight to perceive and understand the public’s attitude of opinion towards a topic, e.g., support (stance) of vaccines (target). With a large amount of data available on Twitter to be collected, it provides an opportunity for ...
- research-articleJune 2023
Can Twitter be a Reliable Proxy to Characterize Nation-wide Human Mobility? A Case Study of Spain
Social Science Computer Review (SSCR), Volume 41, Issue 3Pages 886–904https://doi.org/10.1177/08944393211071071In recent years, there has been an increasing interest in the exploitation of geo-tagged documents posted on Online Social Networks (OSN) for human-mobility pattern mining. These patterns can ease the development of effective and intelligent location-...
- research-articleMay 2023
Uncertainty-aware Personal Assistant and Explanation Method for Privacy Decisions
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2991–2992In many of today's software systems, most notably online social networks, users can share personal information. Behind the simple action of sharing is a more complicated thought process regarding privacy: which content to share, with whom to share, and ...
- posterMay 2023
Explain to Me: Towards Understanding Privacy Decisions
AAMAS '23: Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent SystemsPages 2790–2791Privacy assistants help users manage their privacy online. Their tasks could vary from detecting privacy violations to recommending sharing actions for content that the user intends to share. Recent work on these tasks are promising and show that privacy ...
- research-articleApril 2023
Cultural Differences in Signed Ego Networks on Twitter: An Investigatory Analysis
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 1039–1049https://doi.org/10.1145/3543873.3587641Human social behaviour has been observed to adhere to certain structures. One such structure, the Ego Network Model (ENM), has been found almost ubiquitously in human society. Recently, this model has been extended to include signed connections. While ...
- research-articleApril 2023
On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz Study
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue CSCW1Article No.: 142, Pages 1–33https://doi.org/10.1145/3579618Sharing multimedia content, without obtaining consent from the people involved causes multiparty privacy conflicts (MPCs). However, social-media platforms do not proactively protect users from the occurrence of MPCs. Hence, users resort to out-of-band, ...
- research-articleApril 2023
Twitter has a Binary Privacy Setting, are Users Aware of How It Works?
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 7, Issue CSCW1Article No.: 104, Pages 1–18https://doi.org/10.1145/3579537Twitter accounts are public by default, but Twitter gives the option to create protected accounts, where only approved followers can see their tweets. The publicly visible information changes based on the account type and the visibility of tweets also ...
- research-articleMarch 2023
Detection and Cross-domain Evaluation of Cyberbullying in Facebook Activity Contents for Turkish
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 22, Issue 4Article No.: 114, Pages 1–32https://doi.org/10.1145/3580393Cyberbullying refers to bullying and harassment of defenseless or vulnerable people such as children, teenagers, and women through any means of communication (e.g., e-mail, text messages, wall posts, tweets) over any online medium (e.g., social media, ...
- research-articleMarch 2023
Uncertainty-Aware Personal Assistant for Making Personalized Privacy Decisions
ACM Transactions on Internet Technology (TOIT), Volume 23, Issue 1Article No.: 13, Pages 1–24https://doi.org/10.1145/3561820Many software systems, such as online social networks, enable users to share information about themselves. Although the action of sharing is simple, it requires an elaborate thought process on privacy: what to share, with whom to share, and for what ...
- research-articleFebruary 2023
From False-Free to Privacy-Oriented Communitarian Microblogging Social Networks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 19, Issue 2sArticle No.: 83, Pages 1–23https://doi.org/10.1145/3555354Online Social Networks (OSNs) have gained enormous popularity in recent years. They provide a dynamic platform for sharing content (text messages or multimedia) and for facilitating communication between friends and acquaintances. Microblogging services ...
- research-articleJune 2023
WayPop Machine: A Wayback Machine to Investigate Popularity and Root Out Trolls
ASONAM '22: Proceedings of the 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningPages 391–395https://doi.org/10.1109/ASONAM55673.2022.10068665Contrary to celebrities who owe their popularity online to their activity offline, malicious users such as trolls have to gain fame on social media through the social media itself. The exact reasons that a certain user has become popular are often ...
- research-articleOctober 2022
An online multi-dimensional opinion dynamic model with misinformation diffusion in emergency events
Journal of Information Science (JIPP), Volume 48, Issue 5Pages 640–659https://doi.org/10.1177/0165551520977430Multiple opinions, including many that are negative, are produced in emergency events. These opinions are commonly formed asynchronously based on misinformation. However, most researches on opinion dynamics involving information neglect the asynchronous ...
- research-articleSeptember 2022
ENAGRAM: An App to Evaluate Preventative Nudges for Instagram
EuroUSEC '22: Proceedings of the 2022 European Symposium on Usable SecurityPages 53–63https://doi.org/10.1145/3549015.3555674Online self-disclosure is perhaps one of the last decade’s most studied communication processes, thanks to the introduction of Online Social Networks (OSNs) like Facebook. Self-disclosure research has contributed significantly to the design of ...
- research-articleMay 2022
Machine Learning-based Online Social Network Privacy Preservation
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 467–478https://doi.org/10.1145/3488932.3517405Online data privacy draws more and more concerns. Online Social Network (OSN) service providers employ anonymization mechanisms to preserve private information and data utility. However, these mechanisms mostly focus on the traditional definitions about ...