Author of the publication

Don't kill my ads!: balancing privacy in an ad-supported mobile application market.

, , , and . HotMobile, page 2. ACM, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Leontiadis, Ilias
add a person with the name Leontiadis, Ilias
 

Other publications of authors with the same name

A hybrid approach for content-based publish/subscribe in vehicular networks., , and . Pervasive and Mobile Computing, 5 (6): 697-713 (2009)Extending Access Point Connectivity through Opportunistic Routing in Vehicular Networks., , and . INFOCOM, page 486-490. IEEE, (2010)"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks., , , , , , , and . CoRR, (2018)A Unified Deep Learning Architecture for Abuse Detection., , , , , and . WebSci, page 105-114. ACM, (2019)LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers., , , , , and . ACSAC, page 137-146. ACM, (2018)A shared sensor network infrastructure., , , and . SenSys, page 367-368. ACM, (2010)Tracking serendipitous interactions: how individual cultures shape the office., , , , and . CSCW, page 1072-1081. ACM, (2014)From Cells to Streets: Estimating Mobile Paths with Cellular-Side Data., , , , , and . CoNEXT, page 121-132. ACM, (2014)The Cost of the "S" in HTTPS., , , , , , , and . CoNEXT, page 133-140. ACM, (2014)Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior., , , , , , , , and . CoRR, (2018)