Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Building Fuel Powered Supercomputing Data Center at Low Cost., , , , and . ICS, page 241-250. ACM, (2015)Generative AI in User-Generated Content., , , , , and . CHI Extended Abstracts, page 471:1-471:7. ACM, (2024)Towards Measuring Adversarial Twitter Interactions against Candidates in the US Midterm Elections., , and . ICWSM, page 272-282. AAAI Press, (2020)VoterFraud2020: a Multi-modal Dataset of Election Fraud Claims on Twitter., , , , and . ICWSM, page 901-912. AAAI Press, (2021)WikiDetox Visualization, , and . (2019)Characterizing Alternative Monetization Strategies on YouTube., , , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW2): 1-30 (2022)Characterizing Reddit Participation of Users Who Engage in the QAnon Conspiracy Theories., , , and . Proc. ACM Hum. Comput. Interact., 6 (CSCW1): 53:1-53:22 (2022)Increasing Adversarial Uncertainty to Scale Private Similarity Testing., , , , and . CoRR, (2021)Increasing Adversarial Uncertainty to Scale Private Similarity Testing., , , , and . USENIX Security Symposium, page 1777-1794. USENIX Association, (2022)Characterizing Twitter Users Who Engage in Adversarial Interactions against Political Candidates., , and . CHI, page 1-13. ACM, (2020)