Emiliano De Cristofaro
Emiliano De Cristofaro
Verified email at ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
Financial Cryptography and Data Security, 143-159, 2010
3752010
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2252011
Linear-complexity private set intersection protocols secure in malicious model
E De Cristofaro, J Kim, G Tsudik
Advances in Cryptology-ASIACRYPT 2010, 213-231, 2010
2022010
Exploiting Unintended Feature Leakage in Collaborative Learning
L Melis, C Song, E De Cristofaro, V Shmatikov
IEEE Symposium on Security and Privacy, 2019
199*2019
Mean birds: Detecting aggression and bullying on twitter
D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ...
Proceedings of the 2017 ACM on Web Science Conference, 13-22, 2017
1872017
Fast and Private Computation of Cardinality of Set Intersection and Union
E De Cristofaro, P Gasti, G Tsudik
CANS 2012, 2012
170*2012
MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
1532017
Hummingbird: Privacy at the time of Twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
IEEE Security and Privacy 2012, 2012
1532012
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
11th International AAAI Conference on Web and Social Media (ICWSM 2017), 2017
1432017
LOGAN: Membership Inference Attacks Against Generative Models
J Hayes, L Melis, G Danezis, E De Cristofaro
Proceedings on Privacy Enhancing Technologies 2019 (1), 133-152, 2019
138*2019
Privacy in Content-Oriented Networking: Threats and Countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
Computer Communication Review 43 (3), 25-33, 2012
1182012
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
IMC 2014, 2014
1122014
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
ICNP 2011, 2011
1122011
PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
109*2011
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
A Pyrgelis, C Troncoso, E De Cristofaro
Network and Distributed Systems Symposium (NDSS), 2018
932018
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
Network, IEEE 27 (1), 32-36, 2013
922013
(If) size matters: size-hiding private set intersection
G Ateniese, E De Cristofaro, G Tsudik
International Workshop on Public Key Cryptography, 156-173, 2011
892011
On the Origins of Memes by Means of Fringe Web Communities
S Zannettou, T Caulfield, J Blackburn, E De Cristofaro, M Sirivianos, ...
ACM Internet Measurement Conference, 2018
872018
The Web Centipede: Understanding How Web Communities Influence Each Other Through the Lens of Mainstream and Alternative News Sources
S Zannettou, T Caulfield, E De Cristofaro, N Kourtellis, I Leontiadis, ...
17th ACM Internet Measurement Conference (IMC 2017), 2017
862017
What is gab: A bastion of free speech or an alt-right echo chamber
S Zannettou, B Bradlyn, E De Cristofaro, H Kwak, M Sirivianos, G Stringini, ...
Companion Proceedings of the The Web Conference 2018, 1007-1014, 2018
822018
The system can't perform the operation now. Try again later.
Articles 1–20