Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment E Bertino, E Ferrari, AC Squicciarini IEEE Transactions on Knowledge and data engineering 16 (7), 827-842, 2004 | 315 | 2004 |
Collective privacy management in social networks AC Squicciarini, M Shehab, F Paci Proceedings of the 18th international conference on World wide web, 521-530, 2009 | 312 | 2009 |
Ensuring distributed accountability for data sharing in the cloud S Sundareswaran, A Squicciarini, D Lin IEEE transactions on dependable and secure computing 9 (4), 556-568, 2012 | 297 | 2012 |
A brokerage-based approach for cloud service selection S Sundareswaran, A Squicciarini, D Lin 2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012 | 253 | 2012 |
Sentiment analysis during Hurricane Sandy in emergency response VK Neppalli, C Caragea, A Squicciarini, A Tapia, S Stehle International journal of disaster risk reduction 21, 213-222, 2017 | 248 | 2017 |
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz Ieee transactions on mobile computing 16 (5), 1357-1370, 2016 | 248 | 2016 |
Privacy preserving multi-factor authentication with biometrics A Bhargav-Spantzel, A Squicciarini, E Bertino Proceedings of the second ACM workshop on Digital identity management, 63-72, 2006 | 246 | 2006 |
Content-Driven Detection of Cyberbullying on the Instagram Social Network. H Zhong, H Li, AC Squicciarini, SM Rajtmajer, C Griffin, DJ Miller, ... IJCAI 16, 3952-3958, 2016 | 219 | 2016 |
Security for web services and service-oriented architectures E Bertino, L Martino, F Paci, A Squicciarini Springer 4, 67, 2010 | 207 | 2010 |
Backdoor embedding in convolutional neural network models via invisible perturbation H Zhong, C Liao, AC Squicciarini, S Zhu, D Miller Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 204 | 2020 |
Mapping moods: Geo-mapped sentiment analysis during hurricane sandy. C Caragea, AC Squicciarini, S Stehle, K Neppalli, AH Tapia ISCRAM, 2014 | 201 | 2014 |
Backdoor embedding in convolutional neural network models via invisible perturbation C Liao, H Zhong, A Squicciarini, S Zhu, D Miller arXiv preprint arXiv:1808.10307, 2018 | 165 | 2018 |
Establishing and protecting digital identity in federation systems A Bhargav-Spantzel, AC Squicciarini, E Bertino Proceedings of the 2005 workshop on Digital identity management, 11-19, 2005 | 140 | 2005 |
Privacy policies for shared content in social network sites AC Squicciarini, M Shehab, J Wede The VLDB Journal 19, 777-796, 2010 | 136 | 2010 |
Trust negotiations: concepts, systems, and languages E Bertino, E Ferrari, A Squicciarini Computing in science & engineering 6 (4), 27-34, 2004 | 136 | 2004 |
Privacy policy inference of user-uploaded images on content sharing sites AC Squicciarini, D Lin, S Sundareswaran, J Wede IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014 | 135 | 2014 |
Information-oriented trustworthiness evaluation in vehicular ad-hoc networks S Gurung, D Lin, A Squicciarini, E Bertino Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 133 | 2013 |
Identification and characterization of cyberbullying dynamics in an online social network A Squicciarini, S Rajtmajer, Y Liu, C Griffin Proceedings of the 2015 IEEE/ACM international conference on advances in …, 2015 | 120 | 2015 |
Uncovering crowdsourced manipulation of online reviews A Fayazi, K Lee, J Caverlee, A Squicciarini Proceedings of the 38th international ACM SIGIR conference on research and …, 2015 | 119 | 2015 |
A3p: adaptive policy prediction for shared images over popular content sharing sites AC Squicciarini, S Sundareswaran, D Lin, J Wede Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011 | 116 | 2011 |