Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- posterNovember 2019
Poster: Adversarial Examples for Hate Speech Classifiers
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2621–2623https://doi.org/10.1145/3319535.3363271With the advent of the Internet, social media platforms have become an increasingly popular medium of communication for people. Platforms like Twitter and Quora allow people to express their opinions on a large scale. These platforms are, however, ...
- posterNovember 2019
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2617–2619https://doi.org/10.1145/3319535.3363270Facebook remains the largest social media platform on the Internet with over one billion active monthly users. A variety of personal and sensitive data is shared on the platform, which makes it a prime target for attackers. Increasingly, we see phishing ...
- research-articleNovember 2019
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1639–1656https://doi.org/10.1145/3319535.3363202End-to-end encrypted messaging (E2E) is only secure if participants have a way to retrieve the correct public key for the desired recipient. However, to make these systems usable, users must be able to replace their keys (e.g. when they lose or reset ...
- research-articleNovember 2019
The Art and Craft of Fraudulent App Promotion in Google Play
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2437–2454https://doi.org/10.1145/3319535.3345658Black Hat App Search Optimization (ASO) in the form of fake reviews and sockpuppet accounts, is prevalent in peer-opinion sites, e.g., app stores, with negative implications on the digital and real lives of their users. To detect and filter fraud, a ...