Author of the publication

Designing Toxic Content Classification for a Diversity of Perspectives.

, , , , , , , and . SOUPS @ USENIX Security Symposium, page 299-318. USENIX Association, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

No Calm in The Storm: Investigating QAnon Website Relationships., , and . CoRR, (2021)Partial Mobilization: Tracking Multilingual Information Flows Amongst Russian Media Outlets and Telegram., and . CoRR, (2023)Fast Internet-Wide Scanning: A New Security Perspective.. University of Michigan, USA, (2017)Measuring the Security Harm of TLS Crypto Shortcuts., , and . Internet Measurement Conference, page 33-47. ACM, (2016)What's in a Name? Exploring CA Certificate Control., , , , and . USENIX Security Symposium, page 4383-4400. USENIX Association, (2021)Predicting IPv4 services across all ports., , and . SIGCOMM, page 503-515. ACM, (2022)No Calm in the Storm: Investigating QAnon Website Relationships., , and . ICWSM, page 299-310. AAAI Press, (2022)ASdb: a system for classifying owners of autonomous systems., , , , and . Internet Measurement Conference, page 703-719. ACM, (2021)Retroactive identification of targeted DNS infrastructure hijacking., , , , , , and . IMC, page 14-32. ACM, (2022)Machine-Made Media: Monitoring the Mobilization of Machine-Generated Articles on Misinformation and Mainstream News Websites., and . ICWSM, page 542-556. AAAI Press, (2024)