His Social psychology study frequently draws connections to other fields, such as Embarrassment and Harassment. His study on Embarrassment is mostly dedicated to connecting different topics, such as Social psychology. Emiliano De Cristofaro is investigating Information privacy as part of his inquiry into Privacy by Design and Privacy software. His Privacy by Design study frequently draws connections between related disciplines such as Internet privacy. Emiliano De Cristofaro undertakes multidisciplinary studies into Internet privacy and Privacy software in his work. His Computer security study frequently links to other fields, such as Private information retrieval. As part of his studies on Private information retrieval, Emiliano De Cristofaro often connects relevant subjects like Computer security. His Artificial intelligence study frequently draws connections to other fields, such as Leverage (statistics). His research brings together the fields of Machine learning and Leverage (statistics).
Emiliano De Cristofaro combines topics linked to Information sensitivity, Cryptography and Adversary with his work on Computer security. His study on World Wide Web is intertwined with other disciplines of science such as Internet privacy and Social media. In his works, he performs multidisciplinary study on Internet privacy and World Wide Web. Artificial intelligence overlaps with fields such as Machine learning, Data mining and Inference in his research. While working in this field, Emiliano De Cristofaro studies both Machine learning and Artificial intelligence. His Programming language study frequently draws connections between adjacent fields such as Set (abstract data type). In his papers, Emiliano De Cristofaro integrates diverse fields, such as Operating system and Computer security. As part of his studies on Intersection (aeronautics), Emiliano De Cristofaro often connects relevant areas like Aerospace engineering. His research ties Intersection (aeronautics) and Aerospace engineering together.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Exploiting Unintended Feature Leakage in Collaborative Learning
Luca Melis;Congzheng Song;Emiliano De Cristofaro;Vitaly Shmatikov.
ieee symposium on security and privacy (2019)
Practical private set intersection protocols with linear complexity
Emiliano De Cristofaro;Gene Tsudik.
financial cryptography (2010)
Mean Birds: Detecting Aggression and Bullying on Twitter
Despoina Chatzakou;Nicolas Kourtellis;Jeremy Blackburn;Emiliano De Cristofaro.
web science (2017)
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes
Pierre Baldi;Roberta Baronio;Emiliano De Cristofaro;Paolo Gasti.
computer and communications security (2011)
LOGAN: Membership Inference Attacks Against Generative Models
Jamie Hayes;Luca Melis;George Danezis;Emiliano De Cristofaro.
privacy enhancing technologies (2019)
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
Emiliano De Cristofaro;Jihye Kim;Gene Tsudik.
IACR Cryptology ePrint Archive (2010)
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
Enrico Mariconti;Lucky Onwuzurike;Panagiotis Andriotis;Emiliano De Cristofaro.
network and distributed system security symposium (2017)
Fast and Private Computation of Cardinality of Set Intersection and Union
Emiliano De Cristofaro;Paolo Gasti;Gene Tsudik.
cryptology and network security (2012)
What is Gab: A Bastion of Free Speech or an Alt-Right Echo Chamber
Savvas Zannettou;Barry Bradlyn;Emiliano De Cristofaro;Haewoon Kwak.
the web conference (2018)
On the Origins of Memes by Means of Fringe Web Communities
Savvas Zannettou;Tristan Caulfield;Jeremy Blackburn;Emiliano De Cristofaro.
internet measurement conference (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: