1 code implementation • 30 Jul 2024 • Pujan Paudel, Chen Ling, Jeremy Blackburn, Gianluca Stringhini
Images are a powerful and immediate vehicle to carry misleading or outright false messages, yet identifying image-based misinformation at scale poses unique challenges.
no code implementations • 30 Jul 2024 • Pujan Paudel, Mohammad Hammas Saeed, Rebecca Auger, Chris Wells, Gianluca Stringhini
Automated soft moderation systems are unable to ascertain if a post supports or refutes a false claim, resulting in a large number of contextual false positives.
1 code implementation • 16 May 2024 • Jay Patel, Pujan Paudel, Emiliano De Cristofaro, Gianluca Stringhini, Jeremy Blackburn
Online web communities often face bans for violating platform policies, encouraging their migration to alternative platforms.
no code implementations • 7 Sep 2022 • Mohammad Naseri, Yufei Han, Enrico Mariconti, Yun Shen, Gianluca Stringhini, Emiliano De Cristofaro
Modern defenses against cyberattacks increasingly rely on proactive approaches, e. g., to predict the adversary's next actions based on past events.
no code implementations • 7 Sep 2022 • Wai Man Si, Michael Backes, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Yang Zhang
We show that publicly available chatbots are prone to providing toxic responses when fed toxic queries.
no code implementations • 14 Apr 2022 • Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini
Previous security research efforts orbiting around graphs have been exclusively focusing on either (de-)anonymizing the graphs or understanding the security and privacy issues of graph neural networks.
no code implementations • 17 Feb 2022 • Catherine Jennifer, Fatemeh Tahmasbi, Jeremy Blackburn, Gianluca Stringhini, Savvas Zannettou, Emiliano De Cristofaro
Internet memes have become a dominant method of communication; at the same time, however, they are also increasingly being used to advocate extremism and foster derogatory beliefs.
no code implementations • 3 Nov 2021 • Chen Ling, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini
We do so vis-\`a-vis three research hypotheses; namely, that: 1) the video content, 2) TikTok's recommendation algorithm, and 3) the popularity of the video creator contribute to virality.
no code implementations • 9 Mar 2021 • Yun Shen, Gianluca Stringhini
Unlike commodity anti-malware solutions on desktop systems, their Android counterparts run as sandboxed applications without root privileges and are limited by Android's permission system.
Graph Representation Learning Cryptography and Security
no code implementations • 25 Feb 2021 • Yun Shen, Pierre-Antoine Vervier, Gianluca Stringhini
Mobile phones enable the collection of a wealth of private information, from unique identifiers (e. g., email addresses), to a user's location, to their text messages.
Mobile Security Cryptography and Security
no code implementations • 21 Jan 2021 • Max Aliapoulios, Antonis Papasavva, Cameron Ballard, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou, Jeremy Blackburn
By interpreting cryptic "drops" of information from an anonymous insider calling themself Q, adherents of the conspiracy theory believe that Donald Trump is leading them in an active fight against this cabal.
Computers and Society Social and Information Networks
no code implementations • 11 Jan 2021 • Max Aliapoulios, Emmi Bevensee, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Savvas Zannettou
Parler is as an "alternative" social network promoting itself as a service that allows to "speak freely and express yourself openly, without fear of being deplatformed for your views."
Social and Information Networks Computers and Society Physics and Society
no code implementations • 8 Apr 2020 • Fatemeh Tahmasbi, Leonard Schild, Chen Ling, Jeremy Blackburn, Gianluca Stringhini, Yang Zhang, Savvas Zannettou
Finally, we find interesting differences in the context in which words related to Chinese people are used on the Web before and after the COVID-19 outbreak: on Twitter we observe a shift towards blaming China for the situation, while on /pol/ we find a shift towards using more (and new) Sinophobic slurs.
Word Embeddings Social and Information Networks Computers and Society
no code implementations • 22 Jan 2020 • Kostantinos Papadamou, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Michael Sirivianos
YouTube is by far the largest host of user-generated video content worldwide.
Computers and Society
no code implementations • 21 Jan 2020 • Manoel Horta Ribeiro, Jeremy Blackburn, Barry Bradlyn, Emiliano De Cristofaro, Gianluca Stringhini, Summer Long, Stephanie Greenberg, Savvas Zannettou
In this paper, we present a large-scale characterization of the Manosphere, a conglomerate of Web-based misogynist movements roughly focused on "men's issues," which has seen significant growth over the past years.
Computers and Society
no code implementations • 20 Jul 2019 • Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis
We also explore specific manifestations of abusive behavior, i. e., cyberbullying and cyberaggression, in one of the hate-related communities (Gamergate).
no code implementations • 29 May 2019 • Yun Shen, Gianluca Stringhini
Despite the fact that cyberattacks are constantly growing in complexity, the research community still lacks effective tools to easily monitor and understand them.
no code implementations • 24 May 2019 • Yun Shen, Enrico Mariconti, Pierre-Antoine Vervier, Gianluca Stringhini
With the increased complexity of modern computer attacks, there is a need for defenders not only to detect malicious activity as it happens, but also to predict the specific steps that will be taken by an adversary when performing an attack.
2 code implementations • 31 May 2018 • Savvas Zannettou, Tristan Caulfield, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini, Guillermo Suarez-Tangil
In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2. 6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months.
Social and Information Networks Computers and Society
no code implementations • 27 Mar 2018 • Beatrice Perez, Mirco Musolesi, Gianluca Stringhini
Metadata are associated to most of the information we produce in our daily interactions and communication in the digital world.
no code implementations • 9 Mar 2018 • Lucky Onwuzurike, Mario Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro
Aiming to counter them, detection techniques based on either static or dynamic analysis that model Android malware, have been proposed.
Cryptography and Security
7 code implementations • 1 Feb 2018 • Antigoni-Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, Nicolas Kourtellis
In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms.
Social and Information Networks 68T06 K.4.2
no code implementations • 31 Jan 2018 • Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Michael Sirivianos, Gianluca Stringhini
Web archiving services play an increasingly important role in today's information ecosystem, by ensuring the continuing availability of information, or by deliberately caching content that might get deleted or removed.
Computers and Society Digital Libraries Social and Information Networks
1 code implementation • 24 Jan 2018 • Guillermo Suarez-Tangil, Gianluca Stringhini
In this paper, we conduct the largest measurement of Android malware behavior to date, analyzing over 1. 2 million malware samples that belong to 1. 2K families over a period of eight years (from 2010 to 2017).
Cryptography and Security
no code implementations • 20 Nov 2017 • Lucky Onwuzurike, Enrico Mariconti, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Aiming to assess whether MaMaDroid's effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls.
no code implementations • WS 2017 • Joan Serr{\`a}, Ilias Leontiadis, Dimitris Spathis, Gianluca Stringhini, Jeremy Blackburn, Athena Vakali
Common approaches to text categorization essentially rely either on n-gram counts or on word embeddings.
no code implementations • 25 Apr 2017 • Emeric Bernard-Jones, Jeremiah Onaolapo, Gianluca Stringhini
In summary, we show that language plays a significant role in the ability of cybercriminals to access sensitive information hidden in compromised webmail accounts.
no code implementations • 24 Feb 2017 • Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
Over the past few years, online aggression and abusive behaviors have occurred in many different forms and on a variety of platforms.
1 code implementation • 22 Feb 2017 • Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali
In recent years, bullying and aggression against users on social media have grown significantly, causing serious consequences to victims of all demographics.
Computers and Society Social and Information Networks
no code implementations • 13 Dec 2016 • Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini
Finally, we compare against DroidAPIMiner, a state-of-the-art system that relies on the frequency of API calls performed by apps, showing that MaMaDroid significantly outperforms it.
Cryptography and Security
no code implementations • 26 Oct 2016 • Sina Sajadmanesh, Sina Jafarzadeh, Seyed Ali Osia, Hamid R. Rabiee, Hamed Haddadi, Yelena Mejova, Mirco Musolesi, Emiliano De Cristofaro, Gianluca Stringhini
In this paper, we present a large-scale study of recipes published on the web and their content, aiming to understand cuisines and culinary habits around the world.