Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates., , , , , and . ACM Conference on Computer and Communications Security, page 2489-2504. ACM, (2019)Measurement and Analysis of Online Social Networks, , , , and . (2007)A Measurement-driven Analysis of Information Propagation in the Flickr Social Network, , and . (2009)Utilizing Web Trackers for Sybil Defense., , , , and . ACM Trans. Web, 15 (2): 8:1-8:19 (2021)Ad Delivery Algorithms: The Hidden Arbiters of Political Messaging., , , , and . CoRR, (2019)Algorithms that "Don't See Color": Comparing Biases in Lookalike and Special Ad Audiences., , , , and . CoRR, (2019)Location, Location, Location: The Impact of Geolocation on Web Search Personalization., , , , and . Internet Measurement Conference, page 121-127. ACM, (2015)A large-scale analysis of deployed traffic differentiation practices., , , , and . SIGCOMM, page 130-144. ACM, (2019)BingeOn Under the Microscope: Understanding T-Mobiles Zero-Rating Implementation., , , , and . Internet-QoE@SIGCOMM, page 43-48. ACM, (2016)Quantifying the Impact of User Attentionon Fair Group Representation in Ranked Lists., , , , and . WWW (Companion Volume), page 553-562. ACM, (2019)