Personensuche
X
?
Proceedings of the 16th ACM Web Science Conference ,
1
Corrective or Backfire: Characterizing and Predicting User ..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
2
Reinforcement Learning-based Counter-Misinformation Respons..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
3
An Inside Look into the Practice of Malware Analysis:
, In:
?
Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining ,
4
PETGEN : Personalized Text Generation Attack on Deep Seq..:
, In:
?
Annual Computer Security Applications Conference ,
5
Towards a Practical Differentially Private Collaborative Ph..:
, In:
?
Proceedings of the 2018 World Wide Web Conference ,
6
Exposing Search and Advertisement Abuse Tactics and Infrast..:
, In:
?
Proceedings of the 2018 on Asia Conference on Computer and Communications Security ,
7
Towards Measuring the Role of Phone Numbers in Twitter-Adve..:
, In:
?
Proceedings of the 10th ACM Conference on Web Science ,
8
Under the Shadow of Sunshine : Characterizing Spam Campa..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
9
SoK: Fraud in Telephony Networks:
, In:
?
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security ,
10
MobiPot : Understanding Mobile Telephony Threats with Ho..:
, In:
?
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices ,
11
Exploiting Phone Numbers and Cross-Application Features in ..:
, In:
?
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium ,
13
Enhancing accountability of electronic health record usage ..:
, In:
?
Proceedings of the second ACM conference on Data and Application Security and Privacy ,
15