Research involving at-risk users – that is, users who are more likely to...
One of the key emerging roles of the YouTube platform is providing creat...
Credential stuffing attacks use stolen passwords to log into victim acco...
Social media and other platforms rely on automated detection of abusive
...
As an emerging application paradigm, serverless computing attracts atten...
Abusers increasingly use spyware apps, account compromise, and social
en...
Social media provides a critical communication platform for political
fi...
Adversarial interactions against politicians on social media such as Twi...
To prevent credential stuffing attacks, industry best practice now
proac...
We evaluate Tencent's QQ Browser, a popular mobile browser in China with...
Machine learning (ML) models may be deemed confidential due to their
sen...