Ponnurangam Kumaraguru

Orcid: 0000-0001-5082-2078

According to our database1, Ponnurangam Kumaraguru authored at least 251 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning.
CoRR, 2024

COBIAS: Contextual Reliability in Bias Assessment.
CoRR, 2024

Corrective Machine Unlearning.
CoRR, 2024

SaGE: Evaluating Moral Consistency in Large Language Models.
CoRR, 2024

Multilingual Coreference Resolution in Low-resource South Asian Languages.
CoRR, 2024

Television Discourse Decoded: Comprehensive Multimodal Analytics at Scale.
CoRR, 2024

InSaAF: Incorporating Safety through Accuracy and Fairness | Are LLMs ready for the Indian Legal Domain?
CoRR, 2024

MiMiC: Minimally Modified Counterfactuals in the Representation Space.
CoRR, 2024

RanDumb: A Simple Approach that Questions the Efficacy of Continual Representation Learning.
CoRR, 2024

Measuring Moral Inconsistencies in Large Language Models.
CoRR, 2024

2023
Exploring Graph Neural Networks for Indian Legal Judgment Prediction.
CoRR, 2023

Game, Set, and Conflict: Evaluating Conflict and Game Frames in Indian Election News Coverage.
CoRR, 2023

Tight Sampling in Unbounded Networks.
CoRR, 2023

CiteCaseLAW: Citation Worthiness Detection in Caselaw for Legal Assistive Writing.
CoRR, 2023

Are Models Trained on Indian Legal Data Fair?
CoRR, 2023

Social Re-Identification Assisted RTO Detection for E-Commerce.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

PrecogIIITH@WASSA2023: Emotion Detection for Urdu-English Code-mixed Text.
Proceedings of the 13th Workshop on Computational Approaches to Subjectivity, 2023

A Suspect Identification Framework using Contrastive Relevance Feedback.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

CiteCaseLAW: Citation Worthiness Detection in Caselaw for Legal Assistive Writing.
Proceedings of the Legal Knowledge and Information Systems, 2023

IndIE: A Multilingual Open Information Extraction Tool For Indic Languages.
Proceedings of the Findings of the Association for Computational Linguistics: IJCNLP-AACL 2023, 2023

Effect of Feedback on Drug Consumption Disclosures on Social Media.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Towards Effective Paraphrasing for Information Disguise.
Proceedings of the Advances in Information Retrieval, 2023

CAFIN: Centrality Aware Fairness Inducing IN-Processing for Unsupervised Representation Learning on Graphs.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

JobXMLC: EXtreme Multi-Label Classification of Job Skills with Graph Neural Networks.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2023, 2023

Warning: It's a scam!! Towards understanding the Employment Scams using Knowledge Graphs.
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023

Explaining Finetuned Transformers on Hate Speech Predictions Using Layerwise Relevance Propagation.
Proceedings of the Big Data and Artificial Intelligence - 11th International Conference, 2023

Together Apart: Decoding Support Dynamics in Online COVID-19 Communities.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

X-RiSAWOZ: High-Quality End-to-End Multilingual Dialogue Datasets and Few-shot Agents.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

2022
Predictive linguistic cues for fake news: a societal artificial intelligence problem.
CoRR, 2022

PreCogIIITH at HinglishEval : Leveraging Code-Mixing Metrics & Language Model Embeddings To Estimate Code-Mix Quality.
CoRR, 2022

FaIRCoP: Facial Image Retrieval using Contrastive Personalization.
CoRR, 2022

Learning to Automate Follow-up Question Generation using Process Knowledge for Depression Triage on Reddit Posts.
CoRR, 2022

Zero-shot Entity and Tweet Characterization with Designed Conditional Prompts and Contexts.
CoRR, 2022

GAME-ON: Graph Attention Network based Multimodal Fusion for Fake News Detection.
CoRR, 2022

Erasing Labor with Labor: Dark Patterns and Lockstep Behaviors on the Google Play Store.
CoRR, 2022

Co-WIN: Really Winning? Analysing Inequity in India's Vaccination Response.
CoRR, 2022

Evaluating Inexact Unlearning Requires Revisiting Forgetting.
CoRR, 2022

FakeNewsIndia: A benchmark dataset of fake news incidents in India, collection methodology and impact assessment in social media.
Comput. Commun., 2022

'Will I Regret for This Tweet?' - Twitter User's Behavior Analysis System for Private Data Disclosure.
Comput. J., 2022

Fake news in India: scale, diversity, solution, and opportunities.
Commun. ACM, 2022

Leveraging Intra and Inter Modality Relationship for Multimodal Fake News Detection.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

TweetBoost: Influence of Social Media on NFT Valuation.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

A Tale of Two Sides: Study of Protesters and Counter-protesters on #CitizenshipAmendmentAct Campaign on Twitter.
Proceedings of the WebSci '22: 14th ACM Web Science Conference 2022, Barcelona, Spain, June 26, 2022

"The Times They Are-a-Changin": The Effect of the Covid-19 Pandemic on Online Music Sharing in India.
Proceedings of the Social Informatics - 13th International Conference, 2022

HashSet - A Dataset For Hashtag Segmentation.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

Ask It Right! Identifying Low-Quality questions on Community Question Answering Services.
Proceedings of the International Joint Conference on Neural Networks, 2022

Twitter-STMHD: An Extensive User-Level Database of Multiple Mental Health Disorders.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

FactDrill: A Data Repository of Fact-Checked Social Media Content to Study Fake News Incidents in India.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Effect of Popularity Shocks on User Behaviour.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Erasing Labor with Labor: Dark Patterns and Lockstep Behaviors on Google Play.
Proceedings of the HT '22: 33rd ACM Conference on Hypertext and Social Media, 2022

An Unsupervised, Geometric and Syntax-aware Quantification of Polysemy.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

Note: Urbanization and Literacy as factors in Politicians' Social Media Use in a largely Rural State: Evidence from Uttar Pradesh, India.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

CamPros at CASE 2022 Task 1: Transformer-based Multilingual Protest News Detection.
Proceedings of the 5th Workshop on Challenges and Applications of Automated Extraction of Socio-political Events from Text, 2022

Understanding the Impact of Awards on Award Winners and the Community on Reddit.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

The Pursuit of Being Heard: An Unsupervised Approach to Narrative Detection in Online Protest.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

SyMCoM - Syntactic Measure of Code Mixing A Study Of English-Hindi Code-Mixing.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

HLDC: Hindi Legal Documents Corpus.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

Contrastive Personalization Approach to Suspect Identification (Student Abstract).
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Tweet-scan-post: a system for analysis of sensitive private data disclosure in online social media.
Knowl. Inf. Syst., 2021

Diagnosing Web Data of ICTs to Provide Focused Assistance in Agricultural Adoptions.
CoRR, 2021

Influence of NaMo App on Twitter.
CoRR, 2021

Statistical Learning to Operationalize a Domain Agnostic Data Quality Scoring.
CoRR, 2021

Koo: The new King? Characterizing India's Emerging Social Network.
CoRR, 2021

Factorization of Fact-Checks for Low Resource Indian Languages.
CoRR, 2021

Capitol (Pat)riots: A comparative study of Twitter and Parler.
CoRR, 2021

"Subverting the Jewtocracy": Online Antisemitism Detection Using Multimodal Deep Learning.
Proceedings of the WebSci '21: 13th ACM Web Science Conference 2021, 2021

Efficient Representation of Interaction Patterns with Hyperbolic Hierarchical Clustering for Classification of Users on Twitter.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

"I'll be back": Examining Restored Accounts On Twitter.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Melbourne VIC Australia, December 14, 2021

Inter-modality Discordance for Multimodal Fake News Detection.
Proceedings of the MMAsia '21: ACM Multimedia Asia, Gold Coast, Australia, December 1, 2021

Spy the Lie: Fraudulent Jobs Detection in Recruitment Domain using Knowledge Graphs.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Precog-LTRC-IIITH at GermEval 2021: Ensembling Pre-Trained Language Models with Feature Engineering.
Proceedings of the GermEval 2021 Shared Task on the Identification of Toxic, 2021

KCNet: Kernel-Based Canonicalization Network for Entities in Recruitment Domain.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

"A Virus Has No Religion": Analyzing Islamophobia on Twitter During the COVID-19 Outbreak.
Proceedings of the HT '21: 32nd ACM Conference on Hypertext and Social Media, Virtual Event, Ireland, 30 August 2021, 2021

Battling Hateful Content in Indic Languages HASOC'21.
Proceedings of the Working Notes of FIRE 2021, 2021

A Geometric Measure of Polysemy in Hindi Language.
Proceedings of the CODS-COMAD 2021: 8th ACM IKDD CODS and 26th COMAD, 2021

What's kooking?: characterizing India's emerging social network, Koo.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

Truth and travesty intertwined: a case study of #SSR counterpublic campaign.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

CoMeT: Towards Code-Mixed Translation Using Parallel Monolingual Sentences.
Proceedings of the Fifth Workshop on Computational Approaches to Linguistic Code-Switching, 2021

Detecting Lexical Semantic Change across Corpora with Smooth Manifolds (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Automating fake news detection system using multi-level voting model.
Soft Comput., 2020

Deepfakes: temporal sequential analysis to detect face-swapped video clips using convolutional long short-term memory.
J. Electronic Imaging, 2020

Detecting clickbaits using two-phase hybrid CNN-LSTM biterm model.
Expert Syst. Appl., 2020

(Un)Masked COVID-19 Trends from Social Media.
CoRR, 2020

VacSIM: Learning Effective Strategies for COVID-19 Vaccine Distribution using Reinforcement Learning.
CoRR, 2020

Trawling for Trolling: A Dataset.
CoRR, 2020

WorkerRep: Immutable Reputation System For Crowdsourcing Platform Based on Blockchain.
CoRR, 2020

Psychometric Analysis and Coupling of Emotions Between State Bulletins and Twitter in India during COVID-19 Infodemic.
CoRR, 2020

imdpGAN: Generating Private and Specific Data with Generative Adversarial Networks.
Proceedings of the Second IEEE International Conference on Trust, 2020

Multi-objective Reinforcement Learning based approach for User-Centric Power Optimization in Smart Home Environments.
Proceedings of the IEEE International Conference on Smart Data Services, 2020

Investigation of biases in identity linkage DataSets.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Modeling Citation Trajectories of Scientific Papers.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Driving the Last Mile: Characterizing and Understanding Distracted Driving Posts on Social Networks.
Proceedings of the Fourteenth International AAAI Conference on Web and Social Media, 2020

AbuseAnalyzer: Abuse Detection, Severity and Target Prediction for Gab Posts.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Analyzing Traffic Violations through e-challan System in Metropolitan Cities (Workshop Paper).
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

Are Bots Humans? Analysis of Bot Accounts in 2019 Indian Lok Sabha Elections (Workshop Paper).
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

Hashtags Are (Not) Judgemental: The Untold Story of Lok Sabha Elections 2019.
Proceedings of the 6th IEEE International Conference on Multimedia Big Data, 2020

SpotFake+: A Multimodal Framework for Fake News Detection via Transfer Learning (Student Abstract).
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
A distant supervision based approach to medical persona classification.
J. Biomed. Informatics, 2019

Is change the only constant? Profile change perspective on #LokSabhaElections2019.
CoRR, 2019

Don't cross that stop line: Characterizing Traffic Violations in Metropolitan Cities.
CoRR, 2019

Catching up with trends: The changing landscape of political discussions on twitter in 2014 and 2019.
CoRR, 2019

Understanding Vulnerability of Communities in Complex Networks.
CoRR, 2019

The positive and negative effects of social media in India.
Commun. ACM, 2019

Travel Time Estimation Accuracy in Developing Regions: An Empirical Case Study with Uber Data in Delhi-NCR✱.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Signals Matter: Understanding Popularity and Impact of Users on Stack Overflow.
Proceedings of the World Wide Web Conference, 2019

Building Sociality through Sharing: Seniors' Perspectives on Misinformation.
Proceedings of the 11th ACM Conference on Web Science, 2019

What sets Verified Users apart?: Insights, Analysis and Prediction of Verified Users on Twitter.
Proceedings of the 11th ACM Conference on Web Science, 2019

KidsGUARD: fine grained approach for child unsafe video representation and detection.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Towards Increased Accessibility of Meme Images with the Help of Rich Face Emotion Captions.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

Detection of Misbehaviors in Clone Identities on Online Social Networks.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2019

Methods for User Profiling across Social Networks.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Hardening Deep Neural Networks via Adversarial Model Cascades.
Proceedings of the International Joint Conference on Neural Networks, 2019

Attentional Road Safety Networks.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Elites Tweet? Characterizing the Twitter Verified User Network.
Proceedings of the 35th IEEE International Conference on Data Engineering Workshops, 2019

Con2KG-A Large-scale Domain-Specific Knowledge Graph.
Proceedings of the 30th ACM Conference on Hypertext and Social Media, 2019

MalReG: Detecting and Analyzing Malicious Retweeter Groups.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2019

SpotFake: A Multi-modal Framework for Fake News Detection.
Proceedings of the Fifth IEEE International Conference on Multimedia Big Data, 2019

Maybe Look Closer? Detecting Trolling Prone Images on Instagram.
Proceedings of the Fifth IEEE International Conference on Multimedia Big Data, 2019

Characterizing and detecting livestreaming chatbots.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Finding your social space: empirical study of social exploration in multiplayer online games.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

On churn and social contagion.
Proceedings of the ASONAM '19: International Conference on Advances in Social Networks Analysis and Mining, 2019

Get IT Scored Using AutoSAS - An Automated System for Scoring Short Answers.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Mind Your Language: Abuse and Offense Detection for Code-Switched Languages.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Hiding in Plain Sight: The Anatomy of Malicious Pages on Facebook.
Proceedings of the Social Network Based Big Data Analysis and Applications, 2018

Misinformation in Social Networks: Analyzing Twitter During Crisis Events.
Proceedings of the Encyclopedia of Social Network Analysis and Mining, 2nd Edition, 2018

Collective aspects of privacy in the Twitter social network.
EPJ Data Sci., 2018

IceBreaker: Solving Cold Start Problem for Video Recommendation Engines.
CoRR, 2018

White or Blue, the Whale gets its Vengeance: A Social Media Analysis of the Blue Whale Challenge.
CoRR, 2018

Stop the KillFies! Using Deep Learning Models to Identify Dangerous Selfies.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

Collective Classification of Spam Campaigners on Twitter: A Hierarchical Meta-Path Based Approach.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Neural Machine Translation for English-Tamil.
Proceedings of the Third Conference on Machine Translation: Shared Task Papers, 2018

Worth its Weight in Likes: Towards Detecting Fake Likes on Instagram.
Proceedings of the 10th ACM Conference on Web Science, 2018

Under the Shadow of Sunshine: Characterizing Spam Campaigns Abusing Phone Numbers Across Online Social Networks.
Proceedings of the 10th ACM Conference on Web Science, 2018

The follower count fallacy: detecting Twitter users with manipulated follower count.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

IceBreaker: Solving Cold Start Problem for Video Recommendation Engines.
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018

Analysing Indicator of Compromises for Ransomware: Leveraging IOCs with Machine Learning Techniques.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Empowering First Responders through Automated Multimodal Content Moderation.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Fully Automatic Approach to Identify Factual or Fact-checkable Tweets.
Proceedings of the Working Notes of FIRE 2018, 2018

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

CbI: Improving Credibility of User-Generated Content on Facebook.
Proceedings of the Big Data Analytics - 6th International Conference, 2018

Followee Management: Helping Users Follow the Right Users on Online Social Media.
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018

Language Identification and Named Entity Recognition in Hinglish Code Mixed Tweets.
Proceedings of ACL 2018, Melbourne, Australia, July 15-20, 2018, Student Research Workshop, 2018

A Twitter Corpus for Hindi-English Code Mixed POS Tagging.
Proceedings of the Sixth International Workshop on Natural Language Processing for Social Media, 2018

2017
Facebook Inspector (FbI): Towards automatic real-time detection of malicious content on Facebook.
Soc. Netw. Anal. Min., 2017

Cultural and Psychological Factors in Cyber-Security.
J. Mobile Multimedia, 2017

On the security and usability of dynamic cognitive game CAPTCHAs.
J. Comput. Secur., 2017

Multiple metric aware YouTube tutorial videos virality analysis.
Int. J. Soc. Netw. Min., 2017

Nudging Nemo: Helping Users Control Linkability Across Social Networks.
Proceedings of the Social Informatics, 2017

An Empirical Analysis of Facebook's Free Basics.
Proceedings of the 2017 ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05, 2017

#VisualHashtags: Visual Summarization of Social Media Events Using Mid-Level Visual Elements.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

From Camera to Deathbed: Understanding Dangerous Selfies on Social Media.
Proceedings of the Eleventh International Conference on Web and Social Media, 2017

Leveraging Facebook's Free Basics Engine for Web Service Deployment in Developing Regions.
Proceedings of the Ninth International Conference on Information and Communication Technologies and Development, 2017

Call for Service: Characterizing and Modeling Police Response to Serviceable Requests on Facebook.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

A Social Media Based Index of Mental Well-Being in College Campuses.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

Understanding Psycho-Sociological Vulnerability of ISIS Patronizers in Twitter.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Medical Persona Classification in Social Media.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

Towards Understanding Crisis Events On Online Social Networks Through Pictures.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Other times, other values: leveraging attribute history to link user profiles across online social networks.
Soc. Netw. Anal. Min., 2016

Me, Myself and My Killfie: Characterizing and Preventing Selfie Deaths.
CoRR, 2016

Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events.
CoRR, 2016

Spying Browser Extensions: Analysis and Detection.
CoRR, 2016

PicHunt: Social Media Image Retrieval for Improved Law Enforcement.
Proceedings of the Social Informatics - 8th International Conference, 2016

KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Disinformation in Multimedia Annotation: Misleading Metadata Detection on YouTube.
Proceedings of the 2016 ACM workshop on Vision and Language Integration Meets Multimedia Fusion, 2016

Cultural and psychological factors in cyber-security.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Emotions, Demographics and Sociability in Twitter Interactions.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

Social Media - New Face of Collaborative Policing? - A Survey Exploring Perceptions, Behavior, Challenges for Police Field Officers and Residents.
Proceedings of the Social Computing and Social Media, 2016

On the Dynamics of Username Changing Behavior on Twitter.
Proceedings of the 3rd IKDD Conference on Data Science, 2016

Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

Social Media for Safety: Characterizing Online Interactions Between Citizens and Police.
Proceedings of the HCI 2016, 2016

Hiding in plain sight: Characterizing and detecting malicious Facebook pages.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Characterising Behavior and Emotions on Social Media for Safety: Exploring Online Communication between Police and Citizens.
CoRR, 2015

Social Ties and Emotions: Evidence from Social Media.
CoRR, 2015

Abusing Phone Numbers and Cross-Application Features for Crafting Targeted Attacks.
CoRR, 2015

Hiding in Plain Sight: The Anatomy of Malicious Facebook Pages.
CoRR, 2015

Detecting Malicious Content on Facebook.
CoRR, 2015

Towards automatic real time identification of malicious posts on Facebook.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

What they do in shadows: Twitter underground follower market.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

Online Social Networks and Police in India - Understanding the Perceptions, Behavior, Challenges.
Proceedings of the ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 2015

Deriving requirements for social media based community policing: insights from police.
Proceedings of the 16th Annual International Conference on Digital Government Research, 2015

Social networks for police and residents in India: exploring online communication for crime prevention.
Proceedings of the 16th Annual International Conference on Digital Government Research, 2015

Automated Linguistic Personalization of Targeted Marketing Messages Mining User-Generated Text on Social Media.
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2015

EnTwine: Feature Analysis and Candidate Selection for Social User Identity Aggregation.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Misinformation in Social Networks, Analyzing Twitter During Crisis Events.
Encyclopedia of Social Network Analysis and Mining, 2014

Online Social Media and Police in India: Behavior, Perceptions, Challenges.
CoRR, 2014

Broker Bots: Analyzing automated activity during High Impact Events on Twitter.
CoRR, 2014

Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use.
CoRR, 2014

@I to @Me: An Anatomy of Username Changing Behavior on Twitter.
CoRR, 2014

Exploration of gaps in Bitly's spam detection and relevant counter measures.
CoRR, 2014

It Doesn't Break Just on Twitter. Characterizing Facebook content During Real World Events.
CoRR, 2014

Indian Premier League (IPL), Cricket, Online Social Media.
CoRR, 2014

Followers or Phantoms? An Anatomy of Purchased Twitter Followers.
CoRR, 2014

TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter.
CoRR, 2014

TweetCred: Real-Time Credibility Assessment of Content on Twitter.
Proceedings of the Social Informatics, 2014

Emerging phishing trends and effectiveness of the anti-phishing landing page.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

bit.ly/malicious: Deep dive into short URL based e-crime detection.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

Analyzing social and stylometric features to identify spear phishing emails.
Proceedings of the 2014 APWG Symposium on Electronic Crime Research, 2014

Pinned it! A Large Scale Study of the Pinterest Network.
Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, 2014

A three-way investigation of a game-CAPTCHA: automated attacks, relay attacks and usability.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
ChaMAILeon: Simplified email sharing like never before!
CoRR, 2013

Three-Way Dissection of a Game-CAPTCHA: Automated Attacks, Relay Attacks, and Usability.
CoRR, 2013

The Pin-Bang Theory: Discovering The Pinterest World.
CoRR, 2013

Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks.
CoRR, 2013

OCEAN: Open-source Collation of eGovernment data And Networks - Understanding Privacy Leaks in Open Government Data.
CoRR, 2013

ChaMAILeon: Exploring the Usability of a Privacy Preserving Email Sharing System.
CoRR, 2013

uTrack: track yourself! monitoring information on online social media.
Proceedings of the 22nd International World Wide Web Conference, 2013

@i seek 'fb.me': identifying users across multiple online social networks.
Proceedings of the 22nd International World Wide Web Conference, 2013

Detection of spam tipping behaviour on foursquare.
Proceedings of the 22nd International World Wide Web Conference, 2013

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.
Proceedings of the 22nd International World Wide Web Conference, 2013

Limited Attention and Centrality in Social Networks.
Proceedings of the 2013 International Conference on Social Intelligence and Technology, 2013

The paper slip should be there!: perceptions of transaction receipts in branchless banking.
Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2013

Network flows and the link prediction problem.
Proceedings of the 7th Workshop on Social Network Mining and Analysis, 2013

Ladies First: Analyzing Gender Roles and Behaviors in Pinterest.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Call me maybe: understanding nature and risks of sharing mobile numbers on online social networks.
Proceedings of the Conference on Online Social Networks, 2013

On the viability of CAPTCHAs for use in telephony systems: a usability field study.
Proceedings of the 11th Asia Pacific Conference on Computer Human Interaction, 2013

2012
Finding Nemo: Searching and Resolving Identities of Users Across Online Social Networks
CoRR, 2012

Characterizing Pedophile Conversations on the Internet using Online Grooming
CoRR, 2012

WYSWYE: shoulder surfing defense for recognition based graphical passwords.
Proceedings of the 24th Australian Computer-Human Interaction Conference, OzCHI '12, Melbourne, VIC, Australia - November 26, 2012

Take Control of Your SMSes: Designing an Usable Spam SMS Filtering System.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

Beware of What You Share: Inferring Home Location in Social Networks.
Proceedings of the 12th IEEE International Conference on Data Mining Workshops, 2012

We know where you live: privacy characterization of foursquare behavior.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

PhishAri: Automatic realtime phishing detection on twitter.
Proceedings of the 2012 eCrime Researchers Summit, 2012

Who's Who: Linking User's Multiple Identities on Online Social Media.
Proceedings of the 18th International Conference on Management of Data, 2012

Identifying and characterizing user communities on Twitter during crisis events.
Proceedings of the 2012 workshop on Data-driven User Behavioral Modelling and Mining from Social Media, 2012

Studying User Footprints in Different Online Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

User controllable security and privacy for mobile mashups.
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, 2011

Home is safer than the cloud!: privacy concerns for consumer cloud storage.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

MARASIM: a novel jigsaw based authentication scheme using tagging.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

Phi.sh/$oCiaL: the phishing landscape through short URLs.
Proceedings of the 8th Annual Collaboration, 2011

The UID Project: Lessons Learned from the West and Challenges Identified for India.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Teaching Johnny not to fall for phish.
ACM Trans. Internet Techn., 2010

Influence of user perception, security needs, and social factors on device pairing method choices.
Proceedings of the Sixth Symposium on Usable Privacy and Security, 2010

Cue: a framework for generating meaningful feedback in XACML.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Challenges and novelties while using mobile phones as ICT devices for Indian masses: short paper.
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, 2010

The Unique Identification Number Project: Challenges and Recommendations.
Proceedings of the Ethics and Policy of Biometrics, 2010

Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

Mining YouTube to Discover Extremist Videos, Users and Hidden Communities.
Proceedings of the Information Retrieval Technology, 2010

2009
Policy framework for security and privacy management.
IBM J. Res. Dev., 2009

School of phish: a real-word evaluation of anti-phishing training.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Improving phishing countermeasures: An analysis of expert interviews.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Lessons from a real world evaluation of anti-phishing training.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

A Contextual Method for Evaluating Privacy Preferences.
Proceedings of the Policies and Research in Identity Management, 2007

Getting users to pay attention to anti-phishing education: evaluation of retention and transfer.
Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit 2007, 2007

Protecting people from phishing: the design and evaluation of an embedded training email system.
Proceedings of the 2007 Conference on Human Factors in Computing Systems, 2007

2006
Trust modelling for online transactions: a phishing scenario.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
Privacy in India: Attitudes and Awareness.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005


  Loading...