Rishab Nithyanand

Orcid: 0000-0002-1280-1353

According to our database1, Rishab Nithyanand authored at least 49 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Algorithmic amplification of biases on Google Search.
CoRR, 2024

2023
How Auditing Methodologies Can Impact Our Understanding of YouTube's Recommendation Systems.
CoRR, 2023

Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild.
Proceedings of the 32nd USENIX Security Symposium, 2023

The Morbid Realities of Social Media: An Investigation into the Narratives Shared by the Deceased Victims of COVID-19.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

Making Sense of Constellations: Methodologies for Understanding Starlink's Scheduling Algorithms.
Proceedings of the Companion of the 19th International Conference on emerging Networking EXperiments and Technologies, 2023

2022
ATOM: Ad-network Tomography.
Proc. Priv. Enhancing Technol., 2022

Making a Radical Misogynist: How Online Social Engagement with the Manosphere Influences Traits of Radicalization.
Proc. ACM Hum. Comput. Interact., 2022

Paying Attention to the Algorithm Behind the Curtain: Bringing Transparency to YouTube's Demonetization Algorithms.
Proc. ACM Hum. Comput. Interact., 2022

The Inventory is Dark and Full of Misinformation: Understanding the Abuse of Ad Inventory Pooling in the Ad-Tech Supply Chain.
CoRR, 2022

The Morbid Realities of Social Media: An Investigation into the Misinformation Shared by the Deceased Victims of COVID-19.
CoRR, 2022

ATOM: A Generalizable Technique for Inferring Tracker-Advertiser Data Sharing in the Online Behavioral Advertising Ecosystem.
CoRR, 2022

Exploring the Magnitude and Effects of Media Influence on Reddit Moderation.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Are Proactive Interventions for Reddit Communities Feasible?
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

When Are Cache-Oblivious Algorithms Cache Adaptive? A Case Study of Matrix Multiplication and Sorting.
Proceedings of the 30th Annual European Symposium on Algorithms, 2022

2021
Reddit and the Fourth Estate: Exploring the magnitude and effects of media influence on community level moderation on Reddit.
CoRR, 2021

2020
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
Proc. Priv. Enhancing Technol., 2020

Apophanies or Epiphanies? How Crawlers Impact Our Understanding of the Web.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Extortion or Expansion? An Investigation into the Costs and Consequences of ICANN's gTLD Experiments.
Proceedings of the Passive and Active Measurement - 21st International Conference, 2020

2019
To Act or React: Investigating Proactive Strategies For Online Community Moderation.
CoRR, 2019

2018
Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Online Political Discourse in the Trump Era.
CoRR, 2017

Characterizing the Nature and Dynamics of Tor Exit Blocking.
Proceedings of the 26th USENIX Security Symposium, 2017

Measuring Offensive Speech in Online Political Discourse.
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017

A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

2016
The Adblocking Tug-of-War.
login Usenix Mag., 2016

Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem.
CoRR, 2016

Exploring the Design Space of Longitudinal Censorship Measurement Platforms.
CoRR, 2016

Holding all the ASes: Identifying and Circumventing the Pitfalls of AS-aware Tor Client Design.
CoRR, 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race.
CoRR, 2016

Adblocking and Counter Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet, 2016

Measuring and Mitigating AS-level Adversaries Against Tor.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Games without Frontiers: Investigating Video Games as a Covert Channel.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2014
How Best to Handle a Dicey Situation.
CoRR, 2014

New Approaches to Website Fingerprinting Defenses.
CoRR, 2014

Glove: A Bespoke Website Fingerprinting Defense.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Effective Attacks and Provable Defenses for Website Fingerprinting.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Can Jannie verify? Usability of display-equipped RFID tags for security purposes.
J. Comput. Secur., 2013

The password allocation problem: strategies for reusing passwords effectively.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

2012
A Theoretical Analysis: Physical Unclonable Functions and the Software Protection Problem.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

2011
User-aided reader revocation in PKI-based RFID systems.
J. Comput. Secur., 2011

Usability of Display-Equipped RFID Tags for Security Purposes.
Proceedings of the Computer Security - ESORICS 2011, 2011

Poster: making the case for intrinsic personal physical unclonable functions (IP-PUFs).
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

2009
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
IACR Cryptol. ePrint Arch., 2009

Fuzzy Privacy Preserving Peer-to-Peer Reputation Management.
IACR Cryptol. ePrint Arch., 2009

Securing Plastic Money Using an RFID Based Protocol Stack.
IACR Cryptol. ePrint Arch., 2009

A Survey on the Evolution of Cryptographic Protocols in ePassports.
IACR Cryptol. ePrint Arch., 2009


  Loading...