Michael Sirivianos

Orcid: 0000-0002-6500-581X

According to our database1, Michael Sirivianos authored at least 59 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
HyperGraphDis: Leveraging Hypergraphs for Contextual and Social-Based Disinformation Detection.
CoRR, 2023

Identifying Misinformation on YouTube through Transcript Contextual Analysis with Transformer Models.
CoRR, 2023

A Data-driven Understanding of Left-Wing Extremists on Social Media.
CoRR, 2023

Privacy-Preserving Online Content Moderation with Federated Learning.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Privacy-Preserving Online Content Moderation: A Federated Learning Use Case.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Did State-Sponsored Trolls Shape the 2016 US Presidential Election Discourse? Quantifying Influence on Twitter.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Graph Analysis of Blockchain P2P Overlays and Their Security Implications.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2023

Resilience of Blockchain Overlay Networks.
Proceedings of the Network and System Security - 17th International Conference, 2023

A Qualitative Analysis of Illicit Arms Trafficking on Darknet Marketplaces.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Hihooi: A Database Replication Middleware for Scaling Transactional Databases Consistently.
IEEE Trans. Knowl. Data Eng., 2022

A Unified Graph-Based Approach to Disinformation Detection Using Contextual and Semantic Relations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

"It Is Just a Flu": Assessing the Effect of Watch History on YouTube's Pseudoscientific Video Recommendations.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
"How over is it?" Understanding the Incel Community on YouTube.
Proc. ACM Hum. Comput. Interact., 2021

A First Look into the Structural Properties and Resilience of Blockchain Overlays.
CoRR, 2021

Attaining Workload Scalability and Strong Consistency for Replicated Databases with Hihooi.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
Killing the Password and Preserving Privacy With Device-Centric and Attribute-Based Authentication.
IEEE Trans. Inf. Forensics Secur., 2020

Pseudoscientific Content on YouTube: Assessing the Effects of Watch History on the Recommendation Algorithm.
CoRR, 2020

A Privacy-Preserving Architecture for the Protection of Adolescents in Online Social Networks.
CoRR, 2020

Did State-sponsored Trolls Shape the US Presidential Election Discourse? Quantifying Influence on Twitter.
CoRR, 2020

Understanding the Incel Community on YouTube.
CoRR, 2020

SECONDO: A Platform for Cybersecurity Investments and Cyber Insurance Decisions.
Proceedings of the Trust, Privacy and Security in Digital Business, 2020

Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

2019
The Web of False Information: Rumors, Fake News, Hoaxes, Clickbait, and Various Other Shenanigans.
ACM J. Data Inf. Qual., 2019

On the Influence of Twitter Trolls during the 2016 US Presidential Election.
CoRR, 2019

Disturbed YouTube for Kids: Characterizing and Detecting Disturbing Content on YouTube.
CoRR, 2019

Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Who Let The Trolls Out?: Towards Understanding State-Sponsored Trolls.
Proceedings of the 11th ACM Conference on Web Science, 2019

Towards Auto-Scaling Existing Transactional Databases with Strong Consistency.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

2018
Killing the Password and Preserving Privacy with Device-Centric and Attribute-based Authentication.
CoRR, 2018

From risk factors to detection and intervention: a practical proposal for future work on cyberbullying.
Behav. Inf. Technol., 2018

What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

The Good, the Bad and the Bait: Detecting and Characterizing Clickbait on YouTube.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

On the Origins of Memes by Means of Fringe Web Communities.
Proceedings of the Internet Measurement Conference 2018, 2018

Understanding Web Archiving Services and Their (Mis)Use on Social Media.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

2017
Cybersafety in Modern Online Social Networks (Dagstuhl Reports 17372).
Dagstuhl Reports, 2017

Who is Fiddling with Prices?: Building and Deploying a Watchdog Service for E-commerce.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

The web centipede: understanding how web communities influence each other through the lens of mainstream and alternative news sources.
Proceedings of the 2017 Internet Measurement Conference, 2017

E-safety in Web 2.0 Learning Environments: A Research Synthesis and Implications for Researchers and Practitioners.
Proceedings of the Learning and Collaboration Technologies. Novel Learning Ecosystems, 2017

2016
Cyber security risks for minors: A taxonomy and a software architecture.
Proceedings of the 11th International Workshop on Semantic and Social Media Adaptation and Personalization, 2016

Exploiting path diversity in datacenters using MPTCP-aware SDN.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Combating Friend Spam Using Social Rejections.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
Leveraging Social Feedback to Verify Online Identity Claims.
ACM Trans. Web, 2014

2012
Aiding the Detection of Fake Accounts in Large Scale Social Online Services.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

Sharing the cost of backbone networks: Simplicity vs. precision.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

Sharing the cost of backbone networks: cui bono?
Proceedings of the 12th ACM SIGCOMM Internet Measurement Conference, 2012

Assessing the veracity of identity assertions via OSNs.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Inter-datacenter bulk transfers with netstitcher.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

2010
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation.
Proceedings of the 2010 Workshop on Collaborative Methods for Security and Privacy, 2010

2009
Robust and efficient incentives for cooperative content distribution.
IEEE/ACM Trans. Netw., 2009

Using audio in secure device pairing.
Int. J. Secur. Networks, 2009

SocialFilter: Collaborative Spam Mitigation using Social Networks
CoRR, 2009

2008
Poking facebook: characterization of osn applications.
Proceedings of the first Workshop on Online Social Networks, 2008

2007
Non-Manipulable Aggregator Node Election Protocols for Wireless Sensor Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Dandelion: Cooperative Content Distribution with Robust Incentives.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Free-riding in BitTorrent Networks with the Large View Exploit.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

2005
Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptol. ePrint Arch., 2005


  Loading...