Author of the publication

You Are How You Click: Clickstream Analysis for Sybil Detection.

, , , , , and . USENIX Security Symposium, page 241-256. USENIX Association, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measurement-calibrated graph models for social network experiments., , , , , and . WWW, page 861-870. ACM, (2010)Sharing graphs using differentially private graph models., , , , and . Internet Measurement Conference, page 81-98. ACM, (2011)Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)Clickstream User Behavior Models., , , , , and . ACM Trans. Web, 11 (4): 21:1-21:37 (2017)Auditing Algorithms: Understanding Algorithmic Systems from the Outside In., , , , , , and . Found. Trends Hum. Comput. Interact., 14 (4): 272-344 (2021)A Longitudinal, End-to-End View of the DNSSEC Ecosystem., , , , , , , and . USENIX Security Symposium, page 1307-1322. USENIX Association, (2017)Investigating the Impact of Gender on Rank in Resume Search Engines., , , and . CHI, page 651. ACM, (2018)Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites., , and . J. Comput. Mediat. Commun., 23 (2): 72-89 (2018)An End-to-End View of DNSSEC Ecosystem Management., , , , , , , and . login Usenix Mag., (2017)No Root Store Left Behind., , , , , , , and . HotNets, page 295-301. ACM, (2023)