Name
Affiliation
Papers
GIANLUCA STRINGHINI
University of California, Santa Barbara, Santa Barbara, CA, USA
123
Collaborators
Citations 
PageRank 
230
701
61.87
Referers 
Referees 
References 
1703
1980
1238
Search Limit
1001000
Title
Citations
PageRank
Year
The Gospel according to Q: Understanding the QAnon Conspiracy from the Perspective of Canonical Information00.342022
"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations00.342022
Finding MNEMON: Reviving Memories of Node Embeddings00.342022
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.00.342022
A Large-scale Temporal Measurement of Android Malicious Apps: Persistence, Migration, and Lessons Learned00.342022
Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.00.342022
Slapping Cats, Bopping Heads, and Oreo Shakes: Understanding Indicators of Virality in TikTok Short Videos00.342022
A First Look at Zoombombing00.342022
TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit00.342022
Cerberus: Exploring Federated Prediction of Security Events00.342022
Understanding Worldwide Private Information Collection On Android00.342021
Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels00.342021
“Is it a Qoincidence?”: An Exploratory Study of QAnon on Voat00.342021
Understanding the Use of Fauxtography on Social Media00.342021
"How over is it?" Understanding the Incel Community on YouTube.00.342021
A First Look at Zoombombing00.342021
"I'm a Professor, which isn't usually a dangerous job": Internet-facilitated Harassment and Its Impact on Researchers.00.342021
To Err.Is Human: Characterizing The Threat Of Unintended Urls In Social Media00.342021
Understanding the Effect of Deplatforming on Social Networks00.342021
JABBIC Lookups: A Backend Telemetry-Based System for Malware Triage00.342021
ANDRuspex: Leveraging Graph Representation Learning to Predict Harmful App Installations on Mobile Devices00.342021
A Large Open Dataset from the Parler Social Network.00.342021
Dissecting the Meme Magic: Understanding Indicators of Virality in Image Memes.00.342021
A Human-Centered Systematic Literature Review of Cyberbullying Detection Algorithms.00.342021
SocialHEISTing: Understanding Stolen Facebook Accounts00.342021
MOSafely: Building an Open-Source HCAI Community to Make the Internet a Safer Place for Youth00.342021
A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection.00.342021
“Go eat a bat, Chang!”: On the Emergence of Sinophobic Behavior on Web Communities in the Face of COVID-1900.342021
You Don't Know How I Feel - Insider-Outsider Perspective Gaps in Cyberbullying Risk Detection.00.342021
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse20.392021
AppJitsu: Investigating the Resiliency of Android Applications00.342021
Raiders of the Lost Kek: 3.5 Years of Augmented 4chan Posts from the Politically Incorrect Board00.342020
A Measurement Study on the Advertisements Displayed to Web Users Coming from the Regular Web and from Tor10.342020
BOTection: Bot Detection by Building Markov Chain Models of Bots Network Behavior10.362020
Automatically Dismantling Online Dating Fraud.10.362020
Measuring and Characterizing Hate Speech on News Websites00.342020
Characterizing the Use of Images in State-Sponsored Information Warfare Operations by Russian Trolls on Twitter.00.342020
Characterizing the Use of Images by State-Sponsored Troll Accounts on Twitter.00.342019
Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube.00.342019
Attack2vec: Leveraging Temporal Word Embeddings To Understand The Evolution Of Cyberattacks00.342019
Automatically Dismantling Online Dating Fraud.00.342019
Master of Sheets: A Tale of Compromised Cloud Documents00.342019
PYTHIA: a Framework for the Automated Analysis of Web Hosting Environments00.342019
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version).100.492019
BorderPatrol: Securing BYOD using Fine-Grained Contextual Information10.352019
Cybersafety Threats - from Deception to Aggression (Dagstuhl Seminar 19302).00.342019
A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net Markets00.342019
Who Watches the Watchmen: Exploring Complaints on the Web10.362019
Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers.20.382018
Session details: Session 9B: Mobile Security 200.342018
  • 1
  • 2