Author of the publication

Equitable Security: Optimizing Distribution of Nudges and Resources.

, , , and . ACM Conference on Computer and Communications Security, page 2270-2272. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring and analyzing the characteristics of Napster and Gnutella hosts., , and . Multimedia Syst., 9 (2): 170-184 (2003)Exploring the design space of social network-based Sybil defenses., , , , , , and . COMSNETS, page 1-8. IEEE, (2012)An Analysis of Internet Content Delivery Systems., , , , and . OSDI, USENIX Association, (2002)Operating Systems Review 36, Special Issue, Winter 2002.The Emergence of Conventions in Online Social Networks., , , , and . ICWSM, The AAAI Press, (2012)Geographic Dissection of the Twitter Network., , , and . ICWSM, The AAAI Press, (2012)Towards Trusted Cloud Computing., , and . HotCloud, USENIX Association, (2009)Inside the Walled Garden: Deconstructing Facebook's Free Basics Program., , , , , , and . Computer Communication Review, 47 (5): 12-24 (2017)Fairness Constraints: A Mechanism for Fair Classification., , , and . CoRR, (2015)On Microtargeting Socially Divisive Ads: A Case Study of Russia-Linked Ad Campaigns on Facebook., , , , , , , , and . CoRR, (2018)Modeling Diffusion of Competing Products and Conventions in Social Media., , and . CoRR, (2014)