Mainack Mondal

Orcid: 0000-0003-4317-0184

Affiliations:
  • IIT Kharagpur, India


According to our database1, Mainack Mondal authored at least 49 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
"I just hated it and I want my money back": Data-driven Understanding of Mobile VPN Service Switching Preferences in The Wild.
CoRR, 2024

Uncovering Gender Bias within Journalist-Politician Interaction in Indian Twitter.
Proceedings of the 16th ACM Web Science Conference, 2024

Identifying Tensions that Arise in Cross-cultural Online Communication.
Proceedings of the Joint Proceedings of the ACM IUI 2024 Workshops co-located with the 29th Annual ACM Conference on Intelligent User Interfaces (IUI 2024), 2024

2023
A Tale of Two Cultures: Comparing Interpersonal Information Disclosure Norms on Twitter.
Proc. ACM Hum. Comput. Interact., 2023

SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

A Comparative Audit of Privacy Policies from Healthcare Organizations in USA, UK and India.
CoRR, 2023

MDAP: Module Dependency based Anomaly Prediction.
Comput. Commun., 2023

"We Must Protect the Transformers": Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

"Dummy Grandpa, Do You Know Anything?": Identifying and Characterizing Ad Hominem Fallacy Usage in the Wild.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

MASCARA : Systematically Generating Memorable And Secure Passphrases.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
IACR Cryptol. ePrint Arch., 2022

Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data.
Proceedings of the 31st USENIX Security Symposium, 2022

Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Proceedings of the 31st USENIX Security Symposium, 2022

Winds of Change: Impact of COVID-19 on Vaccine-Related Opinions of Twitter Users.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Designing to Fight Pandemics: A Review of Literature and Identifying Design Patterns for COVID-19 Tracing Apps.
Proceedings of the Human-Computer Interaction. User Experience and Behavior, 2022

What Cookie Consent Notices Do Users Prefer: A Study In The Wild.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

A Privacy Paradox? Impact of Privacy Concerns on Willingness to Disclose COVID-19 Health Status in the United States.
Proceedings of the Companion Computer Supported Cooperative Work and Social Computing, 2022

Understanding the Impact of Awards on Award Winners and the Community on Reddit.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

2021
Understanding and Improving Usability of Data Dashboards for Simplified Privacy Control of Voice Assistant Data (Extended Version).
CoRR, 2021

CCCC: Corralling Cookies into Categories with CookieMonster.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Perceptions of Retrospective Edits, Changes, and Deletion on Social Media.
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021

2020
"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020

A Survey on Disaster: Understanding the After-effects of Super-cyclone Amphan and Helping Hand of Social Media.
CoRR, 2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms.
CoRR, 2020

Anonymity Effects: A Large-Scale Dataset from an Anonymous Social Media Platform.
Proceedings of the HT '20: 31st ACM Conference on Hypertext and Social Media, 2020

Cultural Norms and Interpersonal Relationships: Comparing Disclosure Behaviors on Twitter.
Proceedings of the Companion Publication of the 2020 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2020

2019
Lethe: Conceal Content Deletion from Persistent Observers.
Proc. Priv. Enhancing Technol., 2019

Oh, the Places You've Been! User Reactions to Longitudinal Transparency About Third-Party Web Tracking and Inferencing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Moving Beyond Set-It-And-Forget-It Privacy Settings on Social Media.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Characterizing usage of explicit hate expressions in social media.
New Rev. Hypermedia Multim., 2018

Draining the Data Swamp: A Similarity-based Approach.
Proceedings of the Workshop on Human-In-the-Loop Data Analytics, 2018

2017
Understanding & controlling user privacy in social media via exposure.
PhD thesis, 2017

Longitudinal Privacy Management in Social Media: The Need for Better Controls.
IEEE Internet Comput., 2017

Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017

A Measurement Study of Hate Speech in Social Media.
Proceedings of the 28th ACM Conference on Hypertext and Social Media, 2017

Double-edged Swords: The Good and the Bad of Privacy and Anonymity in Social Media.
Proceedings of the Workshops Proceedings and Tutorials of the 28th ACM Conference on Hypertext and Social Media (HT 2017), 2017

2016
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Analyzing the Targets of Hate in Online Social Media.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

2015
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

2014
Understanding and Specifying Social Access Control Lists.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Deep Twitter diving: exploring topical groups in microblogs at scale.
Proceedings of the Computer Supported Cooperative Work, 2014

2012
Simplifying friendlist management.
Proceedings of the 21st World Wide Web Conference, 2012

Canal: scaling social network-based Sybil tolerance schemes.
Proceedings of the European Conference on Computer Systems, 2012

Defending against large-scale crawls in online social networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Exploring the design space of social network-based Sybil defenses.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
TweLEX: A Tweaked Version of the LEX Stream Cipher.
IACR Cryptol. ePrint Arch., 2011

Limiting large-scale crawls of social networking sites.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

2010
Pinpointing Cache Timing Attacks on AES.
Proceedings of the VLSI Design 2010: 23rd International Conference on VLSI Design, 2010


  Loading...