Jeremiah Onaolapo

Orcid: 0000-0003-1162-4110

According to our database1, Jeremiah Onaolapo authored at least 21 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Human Dimensions of Animal Exploitation: Towards Understanding the International Wildlife Trade and Selfie-Tourism on Twitter.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

2022
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks.
CoRR, 2022

Stick It to The Man: Correcting for Non-Cooperative Behavior of Subjects in Experiments on Social Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

Lifelikeness is in the eye of the beholder: demographics of deepfake detection and their impacts on online social networks.
Proceedings of the LIFELIKE 2022, 2022

Limits of Individual Consent and Models of Distributed Consent in Online Social Networks.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

2021
SocialHEISTing: Understanding Stolen Facebook Accounts.
Proceedings of the 30th USENIX Security Symposium, 2021

e-Game of FAME: Automatic Detection of FAke MEmes.
Proceedings of the 2021 Truth and Trust Online Conference (TTO 2021), 2021

2019
Honeypot boulevard: understanding malicious activity via decoy accounts.
PhD thesis, 2019

Master of Sheets: A Tale of Compromised Cloud Documents.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

2017
Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?
CoRR, 2017

Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

What's in a Name?: Understanding Profile Name Reuse on Twitter.
Proceedings of the 26th International Conference on World Wide Web, 2017

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

All your cards are belong to us: Understanding online carding forums.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
A Longitudinal Measurement Study of 4chan's Politically Incorrect Forum and its Effect on the Web.
CoRR, 2016

Honey Sheets: What Happens to Leaked Google Spreadsheets?
Proceedings of the 9th Workshop on Cyber Security Experimentation and Test, 2016

What Happens After You Are Pwnd: Understanding the Use of Leaked Webmail Credentials in the Wild.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

Why allowing profile name reuse is a bad idea.
Proceedings of the 9th European Workshop on System Security, 2016

What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016


  Loading...