Ponnurangam Kumaraguru

According to our database1, Ponnurangam Kumaraguru authored at least 101 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
MalReG: Detecting and Analyzing Malicious Retweeter Groups.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

2018
Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook.
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018

Misinformation in Social Networks: Analyzing Twitter During Crisis Events.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Collective aspects of privacy in the Twitter social network.
EPJ Data Sci., 2018

Stop the KillFies! Using Deep Learning Models to Identify Dangerous Selfies.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Collective Classification of Spam Campaigners on Twitter: A Hierarchical Meta-Path Based Approach.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Neural Machine Translation for English-Tamil.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018

Worth its Weight in Likes: Towards Detecting Fake Likes on Instagram.
Proceedings of the 10th ACM Conference on Web Science, 2018

Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks.
Proceedings of the 10th ACM Conference on Web Science, 2018

The follower count fallacy: detecting Twitter users with manipulated follower count.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

IceBreaker: Solving Cold Start Problem for Video Recommendation Engines.
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018

Empowering First Responders through Automated Multimodal Content Moderation.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Fully Automatic Approach to Identify Factual or Fact-checkable Tweets.
Proceedings of the Working Notes of FIRE 2018, 2018

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

CbI: Improving Credibility of User-Generated Content on Facebook.
Proceedings of the Big Data Analytics - 6th International Conference, 2018

Followee Management: Helping Users Follow the Right Users on Online Social Media.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Language Identification and Named Entity Recognition in Hinglish Code Mixed Tweets.
Proceedings of ACL 2018, Melbourne, Australia, July 15-20, 2018, Student Research Workshop, 2018

A Twitter Corpus for Hindi-English Code Mixed POS Tagging.
Proceedings of the Sixth International Workshop on Natural Language Processing for Social Media, 2018

2017
Facebook Inspector (FbI): Towards automatic real-time detection of malicious content on Facebook.
Social Netw. Analys. Mining, 2017

Cultural and Psychological Factors in Cyber-Security.
J. Mobile Multimedia, 2017

On the security and usability of dynamic cognitive game CAPTCHAs.
Journal of Computer Security, 2017

Multiple metric aware YouTube tutorial videos virality analysis.
IJSNM, 2017

Nudging Nemo: Helping Users Control Linkability Across Social Networks.
Proceedings of the Social Informatics, 2017

An Empirical Analysis of Facebook's Free Basics.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

#VisualHashtags: Visual Summarization of Social Media Events Using Mid-Level Visual Elements.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

From Camera to Deathbed: Understanding Dangerous Selfies on Social Media.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Leveraging Facebook's Free Basics Engine for Web Service Deployment in Developing Regions.
Proceedings of the Ninth International Conference on Information and Communication Technologies and Development, 2017

Call for Service: Characterizing and Modeling Police Response to Serviceable Requests on Facebook.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

A Social Media Based Index of Mental Well-Being in College Campuses.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Understanding Psycho-Sociological Vulnerability of ISIS Patronizers in Twitter.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Medical Persona Classification in Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Towards Understanding Crisis Events On Online Social Networks Through Pictures.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
PicHunt: Social Media Image Retrieval for Improved Law Enforcement.
Proceedings of the Social Informatics - 8th International Conference, 2016

KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Disinformation in Multimedia Annotation: Misleading Metadata Detection on YouTube.
Proceedings of the 2016 ACM workshop on Vision and Language Integration Meets Multimedia Fusion, 2016

Cultural and psychological factors in cyber-security.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Emotions, Demographics and Sociability in Twitter Interactions.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Social Media - New Face of Collaborative Policing? - A Survey Exploring Perceptions, Behavior, Challenges for Police Field Officers and Residents.
Proceedings of the Social Computing and Social Media, 2016

On the Dynamics of Username Changing Behavior on Twitter.
Proceedings of the 3rd IKDD Conference on Data Science, 2016

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

Social Media for Safety: Characterizing Online Interactions Between Citizens and Police.
Proceedings of the HCI 2016, 2016

Hiding in plain sight: Characterizing and detecting malicious Facebook pages.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Towards automatic real time identification of malicious posts on Facebook.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

What they do in shadows: Twitter underground follower market.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks.
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 2015

Online Social Networks and Police in India - Understanding the Perceptions, Behavior, Challenges.
Proceedings of the ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 2015

Deriving requirements for social media based community policing: insights from police.
Proceedings of the 16th Annual International Conference on Digital Government Research, 2015

Social networks for police and residents in India: exploring online communication for crime prevention.
Proceedings of the 16th Annual International Conference on Digital Government Research, 2015

Automated Linguistic Personalization of Targeted Marketing Messages Mining User-Generated Text on Social Media.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

EnTwine: Feature Analysis and Candidate Selection for Social User Identity Aggregation.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Misinformation in Social Networks, Analyzing Twitter During Crisis Events.
Encyclopedia of Social Network Analysis and Mining, 2014

TweetCred: Real-Time Credibility Assessment of Content on Twitter.
Proceedings of the Social Informatics, 2014

Emerging phishing trends and effectiveness of the anti-phishing landing page.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

bit.ly/malicious: Deep dive into short URL based e-crime detection.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

Analyzing social and stylometric features to identify spear phishing emails.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

Pinned it! A Large Scale Study of the Pinterest Network.
Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, 2014

A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
uTrack: track yourself! monitoring information on online social media.
Proceedings of the 22nd International World Wide Web Conference, 2013

@i seek 'fb.me': identifying users across multiple online social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Detection of spam tipping behaviour on foursquare.
Proceedings of the 22nd International World Wide Web Conference, 2013

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

Limited Attention and Centrality in Social Networks.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013

The paper slip should be there!: perceptions of transaction receipts in branchless banking.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Network flows and the link prediction problem.
Proceedings of the 7th Workshop on Social Network Mining and Analysis, 2013

On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study.
Proceedings of the Information Security, 16th International Conference, 2013

Ladies First: Analyzing Gender Roles and Behaviors in Pinterest.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

Call me maybe: understanding nature and risks of sharing mobile numbers on online social networks.
Proceedings of the Conference on Online Social Networks, 2013

On the viability of CAPTCHAs for use in telephony systems: a usability field study.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

2012
WYSWYE: shoulder surfing defense for recognition based graphical passwords.
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012

Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Beware of What You Share: Inferring Home Location in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

We know where you live: privacy characterization of foursquare behavior.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

PhishAri: Automatic realtime phishing detection on twitter.
Proceedings of the 2012 eCrime Researchers Summit, 2012

Who's Who: Linking User's Multiple Identities on Online Social Media.
Proceedings of the 18th International Conference on Management of Data, 2012

Identifying and characterizing user communities on Twitter during crisis events.
Proceedings of the 2012 workshop on Data-driven User Behavioral Modelling and Mining from Social Media, 2012

Studying User Footprints in Different Online Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

User controllable security and privacy for mobile mashups.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Home is safer than the cloud!: privacy concerns for consumer cloud storage.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MARASIM: a novel jigsaw based authentication scheme using tagging.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Phi.sh/$oCiaL: the phishing landscape through short URLs.
Proceedings of the 8th Annual Collaboration, 2011

The UID Project: Lessons Learned from the West and Challenges Identified for India.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Influence of user perception, security needs, and social factors on device pairing method choices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Cue: a framework for generating meaningful feedback in XACML.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Challenges and novelties while using mobile phones as ICT devices for Indian masses: short paper.
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, 2010

The Unique Identification Number Project: Challenges and Recommendations.
Proceedings of the Ethics and Policy of Biometrics, 2010

Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Mining YouTube to Discover Extremist Videos, Users and Hidden Communities.
Proceedings of the Information Retrieval Technology, 2010

2009
Policy framework for security and privacy management.
IBM Journal of Research and Development, 2009

School of phish: a real-word evaluation of anti-phishing training.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

A Contextual Method for Evaluating Privacy Preferences.
Proceedings of the Policies and Research in Identity Management, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Trust modelling for online transactions: a phishing scenario.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
Privacy in India: Attitudes and Awareness.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005


  Loading...