Alan Mislove

According to our database1, Alan Mislove authored at least 105 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Track You: A Deep Dive into Safety Alerts for Apple AirTags.
Proc. Priv. Enhancing Technol., October, 2023

Problematic Advertising and its Disparate Exposure on Facebook.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Broadening Participation in Computing via Ubiquitous Combined Majors (CS+X).
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Measurement and analysis of implied identity in ad delivery optimization.
Proceedings of the 22nd ACM Internet Measurement Conference, 2022

Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Algorithms that "Don't See Color": Measuring Biases in Lookalike and Special Ad Audiences.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

2021
Utilizing Web Trackers for Sybil Defense.
ACM Trans. Web, 2021

Ad Delivery Algorithms: The Hidden Arbiters of Political Messaging.
Proceedings of the WSDM '21, 2021

Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning Model Protection in Mobile Apps.
Proceedings of the 30th USENIX Security Symposium, 2021

The ties that un-bind: decoupling IP from web services and sockets for robust addressing agility at CDN-scale.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

Measurement and Analysis of Automated Certificate Reissuance.
Proceedings of the Passive and Active Measurement - 22nd International Conference, 2021

Selfish & opaque transaction ordering in the Bitcoin blockchain: the case for chain neutrality.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Under the Hood of the Ethereum Gossip Protocol.
Proceedings of the Financial Cryptography and Data Security, 2021

Building and Auditing Fair Algorithms: A Case Study in Candidate Screening.
Proceedings of the FAccT '21: 2021 ACM Conference on Fairness, 2021

2020
On the Potential for Discrimination via Composition.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

2019
Rolling With Confidence: Managing the Complexity of DNSSEC Operations.
IEEE Trans. Netw. Serv. Manag., 2019

Investigating sources of PII used in Facebook's targeted advertising.
Proc. Priv. Enhancing Technol., 2019

Discrimination through Optimization: How Facebook's Ad Delivery Can Lead to Biased Outcomes.
Proc. ACM Hum. Comput. Interact., 2019

Machine behaviour.
Nat., 2019

Algorithms that "Don't See Color": Comparing Biases in Lookalike and Special Ad Audiences.
CoRR, 2019

Discrimination through optimization: How Facebook's ad delivery can lead to skewed outcomes.
CoRR, 2019

Quantifying the Impact of User Attention on Fair Group Representation in Ranked Lists.
CoRR, 2019

Taking a long look at QUIC: an approach for rigorous evaluation of rapidly evolving transport protocols.
Commun. ACM, 2019

Auditing Offline Data Brokers via Facebook's Advertising Platform.
Proceedings of the World Wide Web Conference, 2019

Quantifying the Impact of User Attentionon Fair Group Representation in Ranked Lists.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

A large-scale analysis of deployed traffic differentiation practices.
Proceedings of the ACM Special Interest Group on Data Communication, 2019

Measuring the Facebook Advertising Ecosystem.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins.
Proceedings of the Internet Measurement Conference, 2019

You Are Who You Appear to Be: A Longitudinal Study of Domain Impersonation in TLS Certificates.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
A First Look at Certification Authority Authorization (CAA).
Comput. Commun. Rev., 2018

Analysis of SSL certificate reissues and revocations in the wake of heartbleed.
Commun. ACM, 2018

On Ridesharing Competition and Accessibility: Evidence from Uber, Lyft, and Taxi.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Privacy Risks with Facebook's PII-Based Targeting: Auditing a Data Broker's Advertising Interface.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Analyzing Ethereum's Contract Topology.
Proceedings of the Internet Measurement Conference 2018, 2018

Is the Web Ready for OCSP Must-Staple?
Proceedings of the Internet Measurement Conference 2018, 2018

Treads: Transparency-Enhancing Ads.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

Potential for Discrimination in Online Targeted Advertising.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

Measuring Adoption of Security Additions to the HTTPS Ecosystem.
Proceedings of the Applied Networking Research Workshop, 2018

2017
An End-to-End View of DNSSEC Ecosystem Management.
login Usenix Mag., 2017

Measuring Personalization of Web Search.
CoRR, 2017

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.
Proceedings of the 26th USENIX Security Symposium, 2017

CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

The Root Canary: Monitoring and Measuring the DNSSEC Root Key Rollover.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

lib•erate, (n): a library for exposing (traffic-classification) rules and avoiding them efficiently.
Proceedings of the 2017 Internet Measurement Conference, 2017

Understanding the role of registrars in DNSSEC deployment.
Proceedings of the 2017 Internet Measurement Conference, 2017

Stick a fork in it: Analyzing the Ethereum network partition.
Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, 2017

Using millions of emoji occurrences to learn any-domain representations for detecting sentiment, emotion and sarcasm.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

Bias in Online Freelance Marketplaces: Evidence from TaskRabbit and Fiverr.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

2016
An Empirical Analysis of Algorithmic Pricing on Amazon Marketplace.
Proceedings of the 25th International Conference on World Wide Web, 2016

BingeOn Under the Microscope: Understanding T-Mobiles Zero-Rating Implementation.
Proceedings of the 2016 workshop on QoE-based Analysis and Management of Data Communication Networks, 2016

Classifiers Unclassified: An Efficient Approach to Revealing IP Traffic Classification Rules.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Measuring and Applying Invalid SSL Certificates: The Silent Majority.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Picocenter: supporting long-lived, mostly-idle applications in cloud environments.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Opportunities and Challenges in Crowdsourced Wardriving.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

An End-to-End Measurement of Certificate Revocation in the Web's PKI.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Location, Location, Location: The Impact of Geolocation on Web Search Personalization.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Identifying Traffic Differentiation in Mobile Networks.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Peeking Beneath the Hood of Uber.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Identifying Personal Information in Internet Traffic.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
Timescales of Massive Human Entrainment.
CoRR, 2014

Towards Detecting Anomalous User Behavior in Online Social Networks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Understanding and Specifying Social Access Control Lists.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Identifying traffic differentiation on cellular data networks.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Measuring Price Discrimination and Steering on E-commerce Web Sites.
Proceedings of the 2014 Internet Measurement Conference, 2014

Of Pins and Tweets: Investigating How Users Behave Across Image- and Text-Based Social Networks.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

The Tweets They Are a-Changin: Evolution of Twitter Users and Behavior.
Proceedings of the Eighth International Conference on Weblogs and Social Media, 2014

Beyond CPM and CPC: determining the value of users on OSNs.
Proceedings of the second ACM conference on Online social networks, 2014

Measurement and analysis of OSN ad auctions.
Proceedings of the second ACM conference on Online social networks, 2014

2013
Iolaus: securing online content rating systems.
Proceedings of the 22nd International World Wide Web Conference, 2013

Measuring personalization of web search.
Proceedings of the 22nd International World Wide Web Conference, 2013

Maygh: building a CDN from client web browsers.
Proceedings of the Eighth Eurosys Conference 2013, 2013

Building confederated web-based services with Priv.io.
Proceedings of the Conference on Online Social Networks, 2013

2012
Simplifying friendlist management.
Proceedings of the 21st World Wide Web Conference, 2012

WebCloud: Recruiting Social Network Users to Assist in Content Distribution.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

Tweetin' in the Rain: Exploring Societal-Scale Effects of Weather on Mood.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Canal: scaling social network-based Sybil tolerance schemes.
Proceedings of the European Conference on Computer Systems, 2012

Defending against large-scale crawls in online social networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Exploring the design space of social network-based Sybil defenses.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Limiting large-scale crawls of social networking sites.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Bazaar: Strengthening User Reputations in Online Marketplaces.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Analyzing facebook privacy settings: user expectations vs. reality.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Understanding the Demographics of Twitter Users.
Proceedings of the Fifth International Conference on Weblogs and Social Media, 2011

2010
You are who you know: inferring user profiles in online social networks.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

An analysis of social network-based Sybil defenses.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

2009
A measurement-driven analysis of information propagation in the flickr social network.
Proceedings of the 18th International Conference on World Wide Web, 2009

On the evolution of user interaction in Facebook.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

2008
Growth of the flickr social network.
Proceedings of the first Workshop on Online Social Networks, 2008

Characterizing social cascades in flickr.
Proceedings of the first Workshop on Online Social Networks, 2008

Ostra: Leveraging Trust to Thwart Unwanted Communication.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

Detecting bittorrent blocking.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
Measurement and analysis of online social networks.
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, 2007

2006
Fallacies in Evaluating Decentralized Systems.
Proceedings of the 5th International workshop on Peer-To-Peer Systems, 2006

Exploiting Social Networks for Internet Search.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Experiences in building and operating ePOST, a reliable peer-to-peer application.
Proceedings of the 2006 EuroSys Conference, Leuven, Belgium, April 18-21, 2006, 2006

2005
ePOST.
Proceedings of the Peer-to-Peer Systems and Applications, 2005

Glacier: Highly Durable, Decentralized Storage Despite Massive Correlated Failures.
Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI 2005), 2005

FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification.
Proceedings of the Peer-to-Peer Systems IV, 4th International Workshop, 2005

2004
AP3: cooperative, decentralized anonymous communication.
Proceedings of the 11st ACM SIGOPS European Workshop, 2004

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

2003
POST: A Secure, Resilient, Cooperative Messaging System.
Proceedings of HotOS'03: 9th Workshop on Hot Topics in Operating Systems, 2003


  Loading...