Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing graphs using differentially private graph models., , , , and . Internet Measurement Conference, page 81-98. ACM, (2011)Measurement-calibrated graph models for social network experiments., , , , , and . WWW, page 861-870. ACM, (2010)Benefits of Browsing? The Prevalence, Nature, and Effects of Profile Consumption Behavior in Social Network Sites., , and . J. Comput. Mediat. Commun., 23 (2): 72-89 (2018)Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)An End-to-End View of DNSSEC Ecosystem Management., , , , , , , and . login Usenix Mag., (2017)A Longitudinal, End-to-End View of the DNSSEC Ecosystem., , , , , , , and . USENIX Security Symposium, page 1307-1322. USENIX Association, (2017)Clickstream User Behavior Models., , , , , and . ACM Trans. Web, 11 (4): 21:1-21:37 (2017)Auditing Algorithms: Understanding Algorithmic Systems from the Outside In., , , , , , and . Found. Trends Hum. Comput. Interact., 14 (4): 272-344 (2021)Investigating the Impact of Gender on Rank in Resume Search Engines., , , and . CHI, page 651. ACM, (2018)No Root Store Left Behind., , , , , , , and . HotNets, page 295-301. ACM, (2023)