Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior., , , , , , , , and . CoRR, (2018)Enabling Social Applications via Decentralized Social Data Management, , , and . CoRR, (2012)Special Issue on Foundations of Social Computing: Enabling Social Applications via Decentralized Social Data Management., , , and . ACM Trans. Internet Techn., 15 (1): 1:1-1:26 (2015)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , and . WWW (Companion Volume), page 218-226. ACM, (2019)CHIMP: Crowdsourcing Human Inputs for Mobile Phones., , , , , , and . WWW, page 45-54. ACM, (2018)EGG 2014: Exploration on Games and Gamers - Introduction., , and . SocInfo Workshops, volume 8852 of Lecture Notes in Computer Science, page 179-182. Springer, (2014)On the Origins of Memes by Means of Fringe Web Communities., , , , , , and . IMC, page 188-202. ACM, (2018)Detecting Aggressors and Bullies on Twitter., , , , , and . WWW (Companion Volume), page 767-768. ACM, (2017)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , and . TWEB, 13 (3): 17:1-17:51 (2019)The Social Hourglass: An Infrastructure for Socially Aware Applications and Services., , and . IEEE Internet Comput., 16 (3): 13-23 (2012)