Saikat Guha

Orcid: 0009-0003-6333-5297

Affiliations:
  • Microsoft Research, Bangalore, India
  • Max Planck Institute for Software Systems, MPI-SWS, Germany
  • Cornell University, Department of Computer Science, Ithaca, NY, USA (PhD 2009)


According to our database1, Saikat Guha authored at least 35 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On viewing SpaceX Starlink through the Social Media Lens.
CoRR, 2023

Don't Forget the User: It's Time to Rethink Network Measurements.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

2021
Discovering Related Data At Scale.
Proc. VLDB Endow., 2021

2017
Exploring the dynamics of search advertiser fraud.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
How Much is Your Attention Worth?: Analysis of Prices in LinkedIn Advertising Network - Short talk.
SIGMETRICS Perform. Evaluation Rev., 2016

Targeting algorithms for online social advertising markets.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Interpreting Advertiser Intent in Sponsored Search.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

Empirical Analysis of Search Advertising Strategies.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

2014
No "one-size fits all": towards a principled approach for incentives in mobile crowdsourcing.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

Towards Detecting Anomalous User Behavior in Online Social Networks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Characterizing Large-Scale Click Fraud in ZeroAccess.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ViceROI: catching click-spam in search ad networks.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Measuring and fingerprinting click-spam in ad networks.
Proceedings of the ACM SIGCOMM 2012 Conference, 2012

Koi: A Location-Privacy Platform for Smartphone Apps.
Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation, 2012

RadioJockey: mining program execution to optimize cellular radio usage.
Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, 2012

Act for affordable data care.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

Generalized resource allocation for the cloud.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012

2011
Privad: Practical Privacy in Online Advertising.
Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, 2011

Auctions in do-not-track compliant internet advertising.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Glasnost: Enabling End Users to Detect Traffic Differentiation.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010

Challenges in measuring online advertising systems.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Chasing EME: Arguments for an End-Middle-End Internet.
PhD thesis, 2009

Not All Adware Is Badware: Towards Privacy-Aware Advertising.
Proceedings of the Software Services for e-Business and e-Society, 2009

Serving Ads from localhost for Performance, Privacy, and Profit.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
NOYB: privacy in online social networks.
Proceedings of the first Workshop on Online Social Networks, 2008

How healthy are today's enterprise networks?
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
Is high-quality vod feasible using P2P swarming?
Proceedings of the 16th International Conference on World Wide Web, 2007

An end-middle-end approach to connection establishment.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

Identity Trail: Covert Surveillance Using DNS.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Exploring VoD in P2P Swarming Systems.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2005

Sextant: a unified node and event localization framework using non-convex constraints.
Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2005

Characterization and Measurement of TCP Traversal Through NATs and Firewalls.
Proceedings of the 5th Internet Measurement Conference, 2005

2004
NUTSS: a SIP-based approach to UDP and TCP network connectivity.
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, 2004


  Loading...