Skip to main content

Showing 1–50 of 76 results for author: Kourtellis, N

.
  1. arXiv:2406.02801  [pdf, other

    cs.SI

    SenTopX: Benchmark for User Sentiment on Various Topics

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zhao, Ian Wood, Mohamad Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxic sentiment analysis on Twitter (X) often focuses on specific topics and events such as politics and elections. Datasets of toxic users in such research are typically gathered through lexicon-based techniques, providing only a cross-sectional view. his approach has a tight confine for studying toxic user behavior and effective platform moderation. To identify users consistently spreading toxic… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

  2. arXiv:2403.07937  [pdf, other

    eess.AS cs.CL cs.LG cs.SD

    Speech Robust Bench: A Robustness Benchmark For Speech Recognition

    Authors: Muhammad A. Shah, David Solans Noguero, Mikko A. Heikkila, Nicolas Kourtellis

    Abstract: As Automatic Speech Recognition (ASR) models become ever more pervasive, it is important to ensure that they make reliable predictions under corruptions present in the physical and digital world. We propose Speech Robust Bench (SRB), a comprehensive benchmark for evaluating the robustness of ASR models to diverse corruptions. SRB is composed of 69 input perturbations which are intended to simulate… ▽ More

    Submitted 8 March, 2024; originally announced March 2024.

  3. On mission Twitter Profiles: A Study of Selective Toxic Behavior

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, an D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: The argument for persistent social media influence campaigns, often funded by malicious entities, is gaining traction. These entities utilize instrumented profiles to disseminate divisive content and disinformation, sha** public perception. Despite ample evidence of these instrumented profiles, few identification methods exist to locate them in the wild. To evade detection and appear genuine, sm… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Journal ref: 2023 IEEE International Conference on Big Data (BigData)

  4. Exploring the Distinctive Tweeting Patterns of Toxic Twitter Users

    Authors: Hina Qayyum, Muhammad Ikram, Benjamin Zi Hao Zhao, Ian D. Wood, Nicolas Kourtellis, Mohamed Ali Kaafar

    Abstract: In the pursuit of bolstering user safety, social media platforms deploy active moderation strategies, including content removal and user suspension. These measures target users engaged in discussions marked by hate speech or toxicity, often linked to specific keywords or hashtags. Nonetheless, the increasing prevalence of toxicity indicates that certain users adeptly circumvent these measures. Thi… ▽ More

    Submitted 25 January, 2024; originally announced January 2024.

    Comments: 2023 IEEE International Conference on Big Data (BigData)

  5. arXiv:2401.10397  [pdf, other

    cs.CV

    Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset

    Authors: Dewant Katare, David Solans Noguero, Souneil Park, Nicolas Kourtellis, Marijn Janssen, Aaron Yi Ding

    Abstract: The accuracy and fairness of perception systems in autonomous driving are essential, especially for vulnerable road users such as cyclists, pedestrians, and motorcyclists who face significant risks in urban driving environments. While mainstream research primarily enhances class performance metrics, the hidden traits of bias inheritance in the AI models, class imbalances and disparities within the… ▽ More

    Submitted 12 May, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  6. arXiv:2306.08418  [pdf, other

    cs.CY

    The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem

    Authors: Emmanouil Papadogiannakis, Nicolas Kourtellis, Panagiotis Papadopoulos, Evangelos P. Markatos

    Abstract: The online advertising market has recently reached the 500 billion dollar mark, and to accommodate the need to match a user with the highest bidder at a fraction of a second, it has moved towards a complex automated model involving numerous agents and middle men. Stimulated by potential revenue and the lack of transparency, bad actors have found ways to abuse it, circumvent restrictions, and gener… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: 17 pages

  7. A longitudinal study of the top 1% toxic Twitter profiles

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Toxicity is endemic to online social networks including Twitter. It follows a Pareto like distribution where most of the toxicity is generated by a very small number of profiles and as such, analyzing and characterizing these toxic profiles is critical. Prior research has largely focused on sporadic, event centric toxic content to characterize toxicity on the platform. Instead, we approach the pro… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

  8. arXiv:2303.01243  [pdf, other

    cs.LG cs.CR cs.PF

    Poster: Sponge ML Model Attacks of Mobile Apps

    Authors: Souvik Paul, Nicolas Kourtellis

    Abstract: Machine Learning (ML)-powered apps are used in pervasive devices such as phones, tablets, smartwatches and IoT devices. Recent advances in collaborative, distributed ML such as Federated Learning (FL) attempt to solve privacy concerns of users and data owners, and thus used by tech industry leaders such as Google, Facebook and Apple. However, FL systems and models are still vulnerable to adversari… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

    Comments: 2 pages, 6 figures. Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications (HotMobile). Feb. 2023

    MSC Class: 68M25; 68P27; 68Txx ACM Class: I.2.11

  9. arXiv:2212.06987  [pdf, other

    cs.CR

    A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks

    Authors: Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage

    Abstract: The upcoming Beyond 5G (B5G) and 6G networks are expected to provide enhanced capabilities such as ultra-high data rates, dense connectivity, and high scalability. It opens many possibilities for a new generation of services driven by Artificial Intelligence (AI) and billions of interconnected smart devices. However, with this expected massive upgrade, the privacy of people, organizations, and sta… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

    Comments: 35 pages, 11 figures. arXiv admin note: text overlap with arXiv:2203.04264

  10. arXiv:2212.06492  [pdf, other

    cs.CY cs.CR cs.LG

    FNDaaS: Content-agnostic Detection of Fake News sites

    Authors: Panagiotis Papadopoulos, Dimitris Spithouris, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Automatic fake news detection is a challenging problem in misinformation spreading, and it has tremendous real-world political and social impacts. Past studies have proposed machine learning-based methods for detecting such fake news, focusing on different properties of the published news articles, such as linguistic characteristics of the actual content, which however have limitations due to the… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  11. arXiv:2209.11843  [pdf, other

    cs.LG cs.SI

    Privacy-Preserving Online Content Moderation: A Federated Learning Use Case

    Authors: Pantelitsa Leonidou, Nicolas Kourtellis, Nikos Salamanos, Michael Sirivianos

    Abstract: Users are daily exposed to a large volume of harmful content on various social network platforms. One solution is develo** online moderation tools using Machine Learning techniques. However, the processing of user data by online platforms requires compliance with privacy policies. Federated Learning (FL) is an ML paradigm where the training is performed locally on the users' devices. Although th… ▽ More

    Submitted 23 September, 2022; originally announced September 2022.

  12. The Hitchhiker's Guide to Facebook Web Tracking with Invisible Pixels and Click IDs

    Authors: Paschalis Bekos, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Over the past years, advertisement companies have used various tracking methods to persistently track users across the web. Such tracking methods usually include first and third-party cookies, cookie synchronization, as well as a variety of fingerprinting mechanisms. Facebook (FB) recently introduced a new tagging mechanism that attaches a one-time tag as a URL parameter (FBCLID) on outgoing links… ▽ More

    Submitted 28 March, 2023; v1 submitted 1 August, 2022; originally announced August 2022.

    Journal ref: In Proceedings of the ACM Web Conference 2023 (WWW '23)

  13. arXiv:2206.10963  [pdf, other

    cs.CR cs.DC

    FLaaS: Cross-App On-device Federated Learning in Mobile Environments

    Authors: Kleomenis Katevas, Diego Perino, Nicolas Kourtellis

    Abstract: Federated Learning (FL) has recently emerged as a popular solution to distributedly train a model on user devices improving user privacy and system scalability. Major Internet companies have deployed FL in their applications for specific use cases (e.g., keyboard prediction or acoustic keyword trigger), and the research community has devoted significant attention to improving different aspects of… ▽ More

    Submitted 16 December, 2022; v1 submitted 22 June, 2022; originally announced June 2022.

    Comments: 12 pages, 6 figures, 46 references

    MSC Class: 68T05 ACM Class: I.2.11

  14. arXiv:2206.05209  [pdf, other

    cs.LG cs.CR

    Hierarchical Federated Learning with Privacy

    Authors: Varun Chandrasekaran, Suman Banerjee, Diego Perino, Nicolas Kourtellis

    Abstract: Federated learning (FL), where data remains at the federated clients, and where only gradient updates are shared with a central aggregator, was assumed to be private. Recent work demonstrates that adversaries with gradient-level access can mount successful inference and reconstruction attacks. In such settings, differentially private (DP) learning is known to provide resilience. However, approache… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

  15. YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children

    Authors: Myrsini Gkolemi, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: In the last years, hundreds of new Youtube channels have been creating and sharing videos targeting children, with themes related to animation, superhero movies, comics, etc. Unfortunately, many of these videos are inappropriate for consumption by their target audience, due to disturbing, violent, or sexual scenes. In this paper, we study YouTube channels found to post suitable or disturbing video… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: 12 pages, 10 Tables, 23 Figures. In Proceedings of 14th ACM Web Science Conference 2022, Barcelona, Spain

    MSC Class: 68U01

  16. A Survey on Privacy for B5G/6G: New Privacy Challenges, and Research Directions

    Authors: Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage

    Abstract: Massive developments in mobile wireless telecommunication networks have been made during the last few decades. At present, mobile users are getting familiar with the latest 5G networks, and the discussion for the next generation of Beyond 5G (B5G)/6G networks has already been initiated. It is expected that B5G/6G will push the existing network capabilities to the next level, with higher speeds, en… ▽ More

    Submitted 13 December, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

    Comments: Survey paper, 49 Pages, 15 figures

    Journal ref: Journal of Industrial Information Integration 30 (2022)

  17. arXiv:2202.07853  [pdf, other

    cs.SI cs.CY

    A deep dive into the consistently toxic 1% of Twitter

    Authors: Hina Qayyum, Benjamin Zi Hao Zhao, Ian D. Wood, Muhammad Ikram, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Misbehavior in online social networks (OSN) is an ever-growing phenomenon. The research to date tends to focus on the deployment of machine learning to identify and classify types of misbehavior such as bullying, aggression, and racism to name a few. The main goal of identification is to curb natural and mechanical misconduct and make OSNs a safer place for social discourse. Going beyond past work… ▽ More

    Submitted 15 February, 2022; originally announced February 2022.

  18. arXiv:2202.05079  [pdf, other

    cs.CY

    Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News sites

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Fake news is an age-old phenomenon, widely assumed to be associated with political propaganda published to sway public opinion. Yet, with the growth of social media, it has become a lucrative business for Web publishers. Despite many studies performed and countermeasures proposed, unreliable news sites have increased in the last years their share of engagement among the top performing news sources… ▽ More

    Submitted 17 February, 2023; v1 submitted 10 February, 2022; originally announced February 2022.

    Comments: 12 pages, The Web Conference 2023

    ACM Class: K.4.2

  19. Leveraging Google's Publisher-specific IDs to Detect Website Administration

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Digital advertising is the most popular way for content monetization on the Internet. Publishers spawn new websites, and older ones change hands with the sole purpose of monetizing user traffic. In this ever-evolving ecosystem, it is challenging to effectively answer questions such as: Which entities monetize what websites? What categories of websites does an average entity typically monetize on a… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 10 pages, To be published at The Web Conference 2022 (WWW 2022). Please cite the WWW version

    ACM Class: K.4.2

  20. Measuring the (Over)use of Service Workers for In-Page Push Advertising Purposes

    Authors: George Pantelakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos

    Abstract: Rich offline experience, periodic background sync, push notification functionality, network requests control, improved performance via requests caching are only a few of the functionalities provided by the Service Worker (SW) API. This new technology, supported by all major browsers, can significantly improve users' experience by providing the publisher with the technical foundations that would no… ▽ More

    Submitted 29 March, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 13 pages, PAM'22

    Journal ref: International Conference on Passive and Active Network Measurement 2022

  21. arXiv:2104.14380  [pdf, other

    cs.CR cs.DC cs.LG

    PPFL: Privacy-preserving Federated Learning with Trusted Execution Environments

    Authors: Fan Mo, Hamed Haddadi, Kleomenis Katevas, Eduard Marin, Diego Perino, Nicolas Kourtellis

    Abstract: We propose and implement a Privacy-preserving Federated Learning ($PPFL$) framework for mobile systems to limit privacy leakages in federated learning. Leveraging the widespread presence of Trusted Execution Environments (TEEs) in high-end and mobile devices, we utilize TEEs on clients for local training, and on servers for secure aggregation, so that model/gradient updates are hidden from adversa… ▽ More

    Submitted 28 June, 2021; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: 15 pages, 8 figures, accepted to MobiSys 2021

  22. arXiv:2104.03044  [pdf, other

    cs.NI cs.CR

    A First Look into the Structural Properties and Resilience of Blockchain Overlays

    Authors: Aristodemos Paphitis, Nicolas Kourtellis, Michael Sirivianos

    Abstract: Blockchain (BC) systems are highly distributed peer-to-peer networks that offer an alternative to centralized services and promise robustness to coordinated attacks. However, the resilience and overall security of a BC system rests heavily on the structural properties of its underlying peer-to-peer overlay. Despite their success, BC overlay networks' critical design aspects, connectivity propertie… ▽ More

    Submitted 10 June, 2021; v1 submitted 7 April, 2021; originally announced April 2021.

    Comments: 23 pages, 8 figures, 6 tables, submitted to ACM IMC 2021

    ACM Class: C.4; C.2.1; C.2.4

  23. arXiv:2103.14601  [pdf, other

    cs.SI cs.CY

    YouTubing at Home: Media Sharing Behavior Change as Proxy for MobilityAround COVID-19 Lockdowns

    Authors: Yelena Mejova, Nicolas Kourtellis

    Abstract: Compliance with public health measures, such as restrictions on movement and socialization, is paramount in limiting the spread of diseases such as the severe acute respiratory syndrome coronavirus 2 (also referred to as COVID-19). Although large population datasets, such as phone-based mobility data, may provide some glimpse into such compliance, it is often proprietary, and may not be available… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

  24. arXiv:2103.09258  [pdf, other

    cs.SI cs.CR cs.LG

    The Rise and Fall of Fake News sites: A Traffic Analysis

    Authors: Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Over the past decade, we have witnessed the rise of misinformation on the Internet, with online users constantly falling victims of fake news. A multitude of past studies have analyzed fake news diffusion mechanics and detection and mitigation techniques. However, there are still open questions about their operational behavior such as: How old are fake news websites? Do they typically stay online… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

  25. arXiv:2103.04442  [pdf, other

    cs.CY

    Differential Tracking Across Topical Webpages of Indian News Media

    Authors: Yash Vekaria, Vibhor Agarwal, Pushkal Agarwal, Sangeeta Mahapatra, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis

    Abstract: Online user privacy and tracking have been extensively studied in recent years, especially due to privacy and personal data-related legislations in the EU and the USA, such as the General Data Protection Regulation, ePrivacy Regulation, and California Consumer Privacy Act. Research has revealed novel tracking and personal identifiable information leakage methods that first- and third-parties emplo… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

  26. User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos

    Abstract: During the past few years, mostly as a result of the GDPR and the CCPA, websites have started to present users with cookie consent banners. These banners are web forms where the users can state their preference and declare which cookies they would like to accept, if such option exists. Although requesting consent before storing any identifiable information is a good start towards respecting the us… ▽ More

    Submitted 10 February, 2022; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: 12 pages, Published at The Web Conference 2021 (WWW 2021). Please cite the WWW version; Made source code publicly available

    ACM Class: K.4.2

  27. arXiv:2102.03656  [pdf, other

    cs.CY

    Under the Spotlight: Web Tracking in Indian Partisan News Websites

    Authors: Vibhor Agarwal, Yash Vekaria, Pushkal Agarwal, Sangeeta Mahapatra, Shounak Set, Sakthi Balan Muthiah, Nishanth Sastry, Nicolas Kourtellis

    Abstract: India is experiencing intense political partisanship and sectarian divisions. The paper performs, to the best of our knowledge, the first comprehensive analysis on the Indian online news media with respect to tracking and partisanship. We build a dataset of 103 online, mostly mainstream news websites. With the help of two experts, alongside data from the Media Ownership Monitor of the Reporters wi… ▽ More

    Submitted 8 March, 2021; v1 submitted 6 February, 2021; originally announced February 2021.

  28. arXiv:2011.09359  [pdf, other

    cs.LG cs.CR cs.DC

    FLaaS: Federated Learning as a Service

    Authors: Nicolas Kourtellis, Kleomenis Katevas, Diego Perino

    Abstract: Federated Learning (FL) is emerging as a promising technology to build machine learning models in a decentralized, privacy-preserving fashion. Indeed, FL enables local training on user devices, avoiding user data to be transferred to centralized servers, and can be enhanced with differential privacy mechanisms. Although FL has been recently deployed in real systems, the possibility of collaborativ… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 7 pages, 4 figures, 7 subfigures, 34 references

    Journal ref: In 1st Workshop on Distributed Machine Learning (DistributedML'20), Dec. 1, 2020, Barcelona, Spain. ACM, New York, NY, USA, 7 pages

  29. Not one but many Tradeoffs: Privacy Vs. Utility in Differentially Private Machine Learning

    Authors: Benjamin Zi Hao Zhao, Mohamed Ali Kaafar, Nicolas Kourtellis

    Abstract: Data holders are increasingly seeking to protect their user's privacy, whilst still maximizing their ability to produce machine models with high quality predictions. In this work, we empirically evaluate various implementations of differential privacy (DP), and measure their ability to fend off real-world privacy attacks, in addition to measuring their core goal of providing accurate classificatio… ▽ More

    Submitted 15 September, 2020; v1 submitted 20 August, 2020; originally announced August 2020.

    Comments: 12 pages, Accepted at CCSW'20, an ACM CCS Workshop

  30. arXiv:2007.01260  [pdf, other

    cs.DC

    S2CE: A Hybrid Cloud and Edge Orchestrator for Mining Exascale Distributed Streams

    Authors: Nicolas Kourtellis, Herodotos Herodotou, Maciej Grzenda, Piotr Wawrzyniak, Albert Bifet

    Abstract: The explosive increase in volume, velocity, variety, and veracity of data generated by distributed and heterogeneous nodes such as IoT and other devices, continuously challenge the state of art in big data processing platforms and mining techniques. Consequently, it reveals an urgent need to address the ever-growing gap between this expected exascale data generation and the extraction of insights… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Comments: 11 pages, 4 figures, 2 tables

    ACM Class: H.2.4

  31. arXiv:2006.16849  [pdf, other

    cs.CY cs.CR cs.LG cs.SI

    I call BS: Fraud Detection in Crowdfunding Campaigns

    Authors: Beatrice Perez, Sara R. Machado, Jerone T. A. Andrews, Nicolas Kourtellis

    Abstract: Donations to charity-based crowdfunding environments have been on the rise in the last few years. Unsurprisingly, deception and fraud in such platforms have also increased, but have not been thoroughly studied to understand what characteristics can expose such behavior and allow its automatic detection and blocking. Indeed, crowdfunding platforms are the only ones typically performing oversight fo… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

  32. arXiv:2006.10104  [pdf, other

    cs.SI cs.IR

    A Streaming Machine Learning Framework for Online Aggression Detection on Twitter

    Authors: Herodotos Herodotou, Despoina Chatzakou, Nicolas Kourtellis

    Abstract: The rise of online aggression on social media is evolving into a major point of concern. Several machine and deep learning approaches have been proposed recently for detecting various types of aggressive behavior. However, social media are fast paced, generating an increasing amount of content, while aggressive behavior evolves over time. In this work, we introduce the first, practical, real-time… ▽ More

    Submitted 9 November, 2020; v1 submitted 17 June, 2020; originally announced June 2020.

    Comments: 12 pages, 16 figures, 2 tables

    MSC Class: 68U15

  33. arXiv:2005.10646  [pdf, other

    cs.SI physics.soc-ph

    On the Aggression Diffusion Modeling and Minimization in Online Social Networks

    Authors: Marinos Poiitis, Athena Vakali, Nicolas Kourtellis

    Abstract: Aggression in online social networks has been studied mostly from the perspective of machine learning which detects such behavior in a static context. However, the way aggression diffuses in the network has received little attention as it embeds modeling challenges. In fact, modeling how aggression propagates from one user to another, is an important research topic since it can enable effective ag… ▽ More

    Submitted 30 August, 2021; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: 23 pages, 10 figures, 3 tables, submitted to TWEB

  34. Modeling Aggression Propagation on Social Media

    Authors: Chrysoula Terizi, Despoina Chatzakou, Evaggelia Pitoura, Panayiotis Tsaparas, Nicolas Kourtellis

    Abstract: Cyberaggression has been studied in various contexts and online social platforms, and modeled on different data using state-of-the-art machine and deep learning algorithms to enable automatic detection and blocking of this behavior. Users can be influenced to act aggressively or even bully others because of elevated toxicity and aggression in their own (online) social circle. In effect, this behav… ▽ More

    Submitted 25 June, 2021; v1 submitted 24 February, 2020; originally announced February 2020.

    Comments: 13 pages, 5 figures, 3 tables

    ACM Class: I.6.4; I.6.5; J.4

    Journal ref: Online Social Networks and Media 24 (2021): 100137

  35. arXiv:2002.00934  [pdf, other

    cs.CY cs.CR

    Stop Tracking Me Bro! Differential Tracking Of User Demographics On Hyper-partisan Websites

    Authors: Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis

    Abstract: Websites with hyper-partisan, left or right-leaning focus offer content that is typically biased towards the expectations of their target audience. Such content often polarizes users, who are repeatedly primed to specific (extreme) content, usually reflecting hard party lines on political and socio-economic topics. Though this polarization has been extensively studied with respect to content, it i… ▽ More

    Submitted 30 March, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Published at The Web Conference 2020 (WWW 2020). Please cite the WWW version

    ACM Class: K.4.2

  36. arXiv:1907.12860  [pdf, ps, other

    cs.CR

    Clash of the Trackers: Measuring the Evolution of the Online Tracking Ecosystem

    Authors: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis

    Abstract: Websites are constantly adapting the methods used, and intensity with which they track online visitors. However, the wide-range enforcement of GDPR since one year ago (May 2018) forced websites serving EU-based online visitors to eliminate or at least reduce such tracking activity, given they receive proper user consent. Therefore, it is important to record and analyze the evolution of this tracki… ▽ More

    Submitted 1 June, 2020; v1 submitted 30 July, 2019; originally announced July 2019.

  37. arXiv:1907.12649  [pdf, other

    cs.CY cs.NI

    No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

    Authors: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: In recent years, Header Bidding (HB) has gained popularity among web publishers, challenging the status quo in the ad ecosystem. Contrary to the traditional waterfall standard, HB aims to give back to publishers control of their ad inventory, increase transparency, fairness and competition among advertisers, resulting in higher ad-slot prices. Although promising, little is known about how this ad… ▽ More

    Submitted 26 September, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 14 pages, 24 Figures, 56 References, 1 Table. Accepted in ACM IMC 2019

  38. arXiv:1907.10331  [pdf, other

    cs.CR cs.GT cs.NI

    YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy

    Authors: Michalis Pachilakis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: The Real Time Bidding (RTB) protocol is by now more than a decade old. During this time, a handful of measurement papers have looked at bidding strategies, personal information flow, and cost of display advertising through RTB. In this paper, we present YourAdvalue, a privacy-preserving tool for displaying to end-users in a simple and intuitive manner their advertising value as seen through RTB. U… ▽ More

    Submitted 4 November, 2021; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 16 pages, 17 Figures, 5 tables, 50 References

    Journal ref: Sigmetrics '21: ACM Meas. Anal. Comput. Syst., December 2021

  39. arXiv:1907.08873  [pdf, other

    cs.SI cs.CY cs.IR

    Detecting Cyberbullying and Cyberaggression in Social Media

    Authors: Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali, Nicolas Kourtellis

    Abstract: Cyberbullying and cyberaggression are increasingly worrisome phenomena affecting people across all demographics. More than half of young social media users worldwide have been exposed to such prolonged and/or coordinated digital harassment. Victims can experience a wide range of emotions, with negative consequences such as embarrassment, depression, isolation from other community members, which em… ▽ More

    Submitted 20 July, 2019; originally announced July 2019.

    Comments: To appear in ACM Transactions on the Web (TWEB)

  40. Beyond content analysis: Detecting targeted ads via distributed counting

    Authors: Costas Iordanou, Nicolas Kourtellis, Juan Miguel Carrascosa, Claudio Soriente, Ruben Cuevas, Nikolaos Laoutaris

    Abstract: Being able to check whether an online advertisement has been targeted is essential for resolving privacy controversies and implementing in practice data protection regulations like GDPR, CCPA, and COPPA. In this paper we describe the design, implementation, and deployment of an advertisement auditing system called iWnder that uses crowdsourcing to reveal in real time whether a display advertisemen… ▽ More

    Submitted 23 July, 2019; v1 submitted 3 July, 2019; originally announced July 2019.

    Comments: 14 pages, 5 Figures, 3 Tables

    Report number: Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies

    Journal ref: CoNEXT 2019

  41. arXiv:1905.01972  [pdf, other

    cs.CL cs.LG stat.ML

    A Self-Attentive Emotion Recognition Network

    Authors: Harris Partaourides, Kostantinos Papadamou, Nicolas Kourtellis, Ilias Leontiadis, Sotirios Chatzis

    Abstract: Modern deep learning approaches have achieved groundbreaking performance in modeling and classifying sequential data. Specifically, attention networks constitute the state-of-the-art paradigm for capturing long temporal dynamics. This paper examines the efficacy of this paradigm in the challenging task of emotion recognition in dyadic conversations. In contrast to existing approaches, our work int… ▽ More

    Submitted 24 April, 2019; originally announced May 2019.

  42. arXiv:1901.07046  [pdf, other

    cs.SI cs.CY

    Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children

    Authors: Kostantinos Papadamou, Antonis Papasavva, Savvas Zannettou, Jeremy Blackburn, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Michael Sirivianos

    Abstract: A large number of the most-subscribed YouTube channels target children of a very young age. Hundreds of toddler-oriented channels on YouTube feature inoffensive, well-produced, and educational videos. Unfortunately, inappropriate content that targets this demographic is also common. YouTube's algorithmic recommendation system regrettably suggests inappropriate content because some of it mimics or… ▽ More

    Submitted 16 September, 2021; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: Published at the 14th International Conference on Web and Social Media (ICWSM 2020). Please cite the ICWSM version

  43. arXiv:1812.11393  [pdf, other

    cs.CR cs.NI

    Talon: An Automated Framework for Cross-Device Tracking Detection

    Authors: Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis

    Abstract: Although digital advertising fuels much of today's free Web, it typically does so at the cost of online users' privacy, due to the continuous tracking and leakage of users' personal data. In search for new ways to optimize the effectiveness of ads, advertisers have introduced new advanced paradigms such as cross-device tracking (CDT), to monitor users' browsing on multiple devices and screens, and… ▽ More

    Submitted 31 July, 2019; v1 submitted 29 December, 2018; originally announced December 2018.

  44. arXiv:1809.09684  [pdf, other

    cs.CR cs.SI

    LOBO -- Evaluation of Generalization Deficiencies in Twitter Bot Classifiers

    Authors: Juan Echeverría, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Gianluca Stringhini, Shi Zhou

    Abstract: Botnets in online social networks are increasingly often affecting the regular flow of discussion, attacking regular users and their posts, spamming them with irrelevant or offensive content, and even manipulating the popularity of messages and accounts. Researchers and cybercriminals are involved in an arms race, and new and updated botnets designed to defeat current detection systems are constan… ▽ More

    Submitted 25 September, 2018; originally announced September 2018.

    Journal ref: Proceedings of the 2018 Annual Computer Security Ap- plications Conference (ACSAC 2018)

  45. arXiv:1806.02701  [pdf, other

    cs.CR

    There goes Wally: Anonymously sharing your location gives you away

    Authors: Apostolos Pyrgelis, Nicolas Kourtellis, Ilias Leontiadis, Joan Serrà, Claudio Soriente

    Abstract: With current technology, a number of entities have access to user mobility traces at different levels of spatio-temporal granularity. At the same time, users frequently reveal their location through different means, including geo-tagged social media posts and mobile app usage. Such leaks are often bound to a pseudonym or a fake identity in an attempt to preserve one's privacy. In this work, we inv… ▽ More

    Submitted 15 November, 2018; v1 submitted 7 June, 2018; originally announced June 2018.

    Comments: To appear in the 2018 IEEE International Conference on Big Data

  46. arXiv:1805.11477  [pdf, other

    cs.DC

    Large-Scale Learning from Data Streams with Apache SAMOA

    Authors: Nicolas Kourtellis, Gianmarco De Francisci Morales, Albert Bifet

    Abstract: Apache SAMOA (Scalable Advanced Massive Online Analysis) is an open-source platform for mining big data streams. Big data is defined as datasets whose size is beyond the ability of typical software tools to capture, store, manage, and analyze, due to the time and memory complexity. Apache SAMOA provides a collection of distributed streaming algorithms for the most common data mining and machine le… ▽ More

    Submitted 26 May, 2018; originally announced May 2018.

    Comments: 31 pages, 7 Tables, 16 Figures, 26 References. arXiv admin note: substantial text overlap with arXiv:1607.08325

  47. Cookie Synchronization: Everything You Always Wanted to Know But Were Afraid to Ask

    Authors: Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos

    Abstract: User data is the primary input of digital advertising, fueling the free Internet as we know it. As a result, web companies invest a lot in elaborate tracking mechanisms to acquire user data that can sell to data markets and advertisers. However, with same-origin policy, and cookies as a primary identification mechanism on the web, each tracker knows the same user with a different ID. To mitigate t… ▽ More

    Submitted 25 February, 2020; v1 submitted 26 May, 2018; originally announced May 2018.

    Journal ref: Proceedings of the 2018 World Wide Web Conference (WWW'19)

  48. arXiv:1805.08168  [pdf, other

    cs.CY cs.CR cs.SI

    "You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

    Authors: Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini

    Abstract: Video sharing platforms like YouTube are increasingly targeted by aggression and hate attacks. Prior work has shown how these attacks often take place as a result of "raids," i.e., organized efforts by ad-hoc mobs coordinating from third-party communities. Despite the increasing relevance of this phenomenon, however, online services often lack effective countermeasures to mitigate it. Unlike well-… ▽ More

    Submitted 23 August, 2019; v1 submitted 21 May, 2018; originally announced May 2018.

    Journal ref: 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019)

  49. arXiv:1804.03461  [pdf, ps, other

    cs.SI cs.CY

    The Web of False Information: Rumors, Fake News, Hoaxes, Clickbait, and Various Other Shenanigans

    Authors: Savvas Zannettou, Michael Sirivianos, Jeremy Blackburn, Nicolas Kourtellis

    Abstract: A new era of Information Warfare has arrived. Various actors, including state-sponsored ones, are weaponizing information on Online Social Networks to run false information campaigns with targeted manipulation of public opinion on specific topics. These false information campaigns can have dire consequences to the public: mutating their opinions and actions, especially with respect to critical wor… ▽ More

    Submitted 18 January, 2019; v1 submitted 10 April, 2018; originally announced April 2018.

    Journal ref: Journal of Data and Information Quality (JDIQ) 2019

  50. arXiv:1802.00393  [pdf, other

    cs.SI

    Large Scale Crowdsourcing and Characterization of Twitter Abusive Behavior

    Authors: Antigoni-Maria Founta, Constantinos Djouvas, Despoina Chatzakou, Ilias Leontiadis, Jeremy Blackburn, Gianluca Stringhini, Athena Vakali, Michael Sirivianos, Nicolas Kourtellis

    Abstract: In recent years, offensive, abusive and hateful language, sexism, racism and other types of aggressive and cyberbullying behavior have been manifesting with increased frequency, and in many online social media platforms. In fact, past scientific work focused on studying these forms in popular media, such as Facebook and Twitter. Building on such work, we present an 8-month study of the various for… ▽ More

    Submitted 15 April, 2018; v1 submitted 1 February, 2018; originally announced February 2018.

    Comments: crowdsourcing, abusive behavior, hate speech, Twitter, aggression, bullying

    MSC Class: 68T06 ACM Class: K.4.2