On the evolution of user interaction in facebook B Viswanath, A Mislove, M Cha, KP Gummadi Proceedings of the 2nd ACM workshop on Online social networks, 37-42, 2009 | 1917 | 2009 |
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao 2019 IEEE symposium on security and privacy (SP), 707-723, 2019 | 1429 | 2019 |
You are who you know: inferring user profiles in online social networks A Mislove, B Viswanath, KP Gummadi, P Druschel Proceedings of the third ACM international conference on Web search and data …, 2010 | 1038 | 2010 |
Understanding and combating link farming in the twitter social network S Ghosh, B Viswanath, F Kooti, NK Sharma, G Korlam, F Benevenuto, ... Proceedings of the 21st international conference on World Wide Web, 61-70, 2012 | 520 | 2012 |
An analysis of social network-based sybil defenses B Viswanath, A Post, KP Gummadi, A Mislove ACM SIGCOMM Computer Communication Review 40 (4), 363-374, 2010 | 478 | 2010 |
Towards detecting anomalous user behavior in online social networks B Viswanath, MA Bashir, M Crovella, S Guha, KP Gummadi, ... 23rd usenix security symposium (usenix security 14), 223-238, 2014 | 372 | 2014 |
Automated crowdturfing attacks and defenses in online review systems Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 222 | 2017 |
With great training comes great vulnerability: Practical attacks against transfer learning B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao 27th USENIX security symposium (USENIX Security 18), 1281-1297, 2018 | 134 | 2018 |
Sieve: Actionable insights from monitored metrics in distributed systems J Thalheim, A Rodrigues, IE Akkus, P Bhatotia, R Chen, B Viswanath, ... Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 14-27, 2017 | 120 | 2017 |
Complexity vs. performance: empirical analysis of machine learning as a service Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017 | 117 | 2017 |
{T-Miner}: A generative approach to defend against trojan attacks on {DNN-based} text classification A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ... 30th USENIX Security Symposium (USENIX Security 21), 2255-2272, 2021 | 85 | 2021 |
Canal: Scaling social network-based Sybil tolerance schemes B Viswanath, M Mondal, KP Gummadi, A Mislove, A Post Proceedings of the 7th ACM european conference on Computer Systems, 309-322, 2012 | 84 | 2012 |
Throwing darts in the dark? detecting bots with limited data using neural data augmentation STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath 2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020 | 68 | 2020 |
Exploring the design space of social network-based sybil defenses B Viswanath, M Mondal, A Clement, P Druschel, KP Gummadi, A Mislove, ... 2012 Fourth International Conference on Communication Systems and Networks …, 2012 | 60 | 2012 |
Strength in numbers: Robust tamper detection in crowd computations B Viswanath, MA Bashir, MB Zafar, S Bouget, S Guha, KP Gummadi, ... Proceedings of the 2015 ACM on Conference on Online Social Networks, 113-124, 2015 | 57 | 2015 |
What happens after you leak your password: Understanding credential sharing on phishing sites P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019 | 56 | 2019 |
Deepfake videos in the wild: Analysis and detection J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ... Proceedings of the Web Conference 2021, 981-992, 2021 | 49 | 2021 |
Defending against large-scale crawls in online social networks M Mondal, B Viswanath, A Clement, P Druschel, KP Gummadi, A Mislove, ... Proceedings of the 8th international conference on Emerging networking …, 2012 | 45 | 2012 |
Deepfake text detection: Limitations and opportunities J Pu, Z Sarwar, SM Abdullah, A Rehman, Y Kim, P Bhattacharya, M Javed, ... 2023 IEEE symposium on security and privacy (SP), 1613-1630, 2023 | 44 | 2023 |
Sharing social content from home: a measurement-driven feasibility study M Marcon, B Viswanath, M Cha, KP Gummadi Proceedings of the 21st international workshop on Network and operating …, 2011 | 43 | 2011 |