Skip to main content

Showing 1–15 of 15 results for author: Squicciarini, A

.
  1. arXiv:2311.15427  [pdf, ps, other

    cs.HC

    Lived experiences of online harm amongst marginalized and vulnerable individuals in support-seeking communities on Reddit

    Authors: Yingfan Zhou, Anna Squicciarini, Sarah Rajtmajer

    Abstract: Online communities can serve as meaningful sources of social support, particularly for marginalized and vulnerable groups. Disclosure of personal information facilitates integration into online communities but may also expose individuals to harm, including cyberbullying and manipulation. To better understand negative user experiences resulting from self-disclosure in online conversations, we inter… ▽ More

    Submitted 26 November, 2023; originally announced November 2023.

  2. Consensus in Complex Networks with Noisy Agents and Peer Pressure

    Authors: Christopher Griffin, Anna Squicciarini, Feiran Jia

    Abstract: In this paper we study a discrete time consensus model on a connected graph with monotonically increasing peer-pressure and noise perturbed outputs masking a hidden state. We assume that each agent maintains a constant hidden state and a presents a dynamic output that is perturbed by random noise drawn from a mean-zero distribution. We show consensus is ensured in the limit as time goes to infinit… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: 11 pages, 10 figures

  3. arXiv:2206.08396  [pdf, other

    cs.CR

    User Customizable and Robust Geo-Indistinguishability for Location Privacy

    Authors: Primal Pappachan, Chenxi Qiu, Anna Squicciarini, Vishnu Sharma Hunsur Manjunath

    Abstract: Location obfuscation functions generated by existing systems for ensuring location privacy are monolithic and do not allow users to customize their obfuscation range. This can lead to the user being mapped in undesirable locations (e.g., shady neighborhoods) to the location-requesting services. Modifying the obfuscation function generated by a centralized server on the user side can result in poor… ▽ More

    Submitted 1 October, 2022; v1 submitted 16 June, 2022; originally announced June 2022.

    Comments: Under review

  4. RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model

    Authors: Hangzhi Guo, Feiran Jia, **ghui Chen, Anna Squicciarini, Amulya Yadav

    Abstract: Counterfactual (CF) explanations for machine learning (ML) models are preferred by end-users, as they explain the predictions of ML models by providing a recourse (or contrastive) case to individuals who are adversely impacted by predicted outcomes. Existing CF explanation methods generate recourses under the assumption that the underlying target ML model remains stationary over time. However, due… ▽ More

    Submitted 18 August, 2023; v1 submitted 1 June, 2022; originally announced June 2022.

  5. arXiv:2202.00879  [pdf, ps, other

    cs.SI cs.AI cs.CL cs.CR cs.CY

    Automated Detection of Doxing on Twitter

    Authors: Younes Karimi, Anna Squicciarini, Shomir Wilson

    Abstract: Doxing refers to the practice of disclosing sensitive personal information about a person without their consent. This form of cyberbullying is an unpleasant and sometimes dangerous phenomenon for online social networks. Although prior work exists on automated identification of other types of cyberbullying, a need exists for methods capable of detecting doxing on Twitter specifically. We propose an… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 24 pages, 1 figure. Accepted in the 25th ACM Conference on Computer-Supported Cooperative Work and Social Computing (ACM CSCW 2022)

    MSC Class: 68T01; 68T50; 91F20 ACM Class: H.4.3; I.7.0; J.4; K.4.2

  6. arXiv:2202.00878  [pdf, other

    cs.SI cs.AI cs.CL cs.CR cs.LG

    A Longitudinal Dataset of Twitter ISIS Users

    Authors: Younes Karimi, Anna Squicciarini, Peter K. Forster, Kira M. Leavitt

    Abstract: We present a large longitudinal dataset of tweets from two sets of users that are suspected to be affiliated with ISIS. These sets of users are identified based on a prior study and a campaign aimed at shutting down ISIS Twitter accounts. These users have engaged with known ISIS accounts at least once during 2014-2015 and are still active as of 2021. Some of them have directly supported the ISIS u… ▽ More

    Submitted 2 February, 2022; originally announced February 2022.

    Comments: 10 pages, 7 figures; Submitted to the 16th International Conference on Web and Social Media (AAAI ICWSM-2022)

    MSC Class: 68T50; 68-11 ACM Class: J.4; K.4.1; I.2.7; H.4.3

  7. arXiv:2201.06924  [pdf, other

    cs.CY cs.AI cs.IR cs.LG cs.MA

    A Synthetic Prediction Market for Estimating Confidence in Published Work

    Authors: Sarah Rajtmajer, Christopher Griffin, Jian Wu, Robert Fraleigh, Laxmaan Balaji, Anna Squicciarini, Anthony Kwasnica, David Pennock, Michael McLaughlin, Timothy Fritton, Nishanth Nakshatri, Arjun Menon, Sai Ajay Modukuri, Rajal Nivargi, Xin Wei, C. Lee Giles

    Abstract: Explainably estimating confidence in published scholarly work offers opportunity for faster and more robust scientific progress. We develop a synthetic prediction market to assess the credibility of published claims in the social and behavioral sciences literature. We demonstrate our system and detail our findings using a collection of known replication projects. We suggest that this work lays the… ▽ More

    Submitted 23 December, 2021; originally announced January 2022.

  8. arXiv:2004.09717  [pdf, other

    cs.SI cs.CY

    Privacy in Crisis: A study of self-disclosure during the Coronavirus pandemic

    Authors: Taylor Blose, Prasanna Umar, Anna Squicciarini, Sarah Rajtmajer

    Abstract: We study observed incidence of self-disclosure in a large dataset of Tweets representing user-led English-language conversation about the Coronavirus pandemic. Using an unsupervised approach to detect voluntary disclosure of personal information, we provide early evidence that situational factors surrounding the Coronavirus pandemic may impact individuals' privacy calculus. Text analyses reveal to… ▽ More

    Submitted 10 October, 2020; v1 submitted 20 April, 2020; originally announced April 2020.

  9. arXiv:1906.01677  [pdf, other

    cs.GT cs.SI

    Power Law Public Goods Game for Personal Information Sharing in News Commentaries

    Authors: Christopher Griffin, Sarah Rajtmajer, Anna Squicciarini, Prasana Umar

    Abstract: We propose a public goods game model of user sharing in an online commenting forum. In particular, we assume that users who share personal information incur an information cost but reap the benefits of a more extensive social interaction. Freeloaders benefit from the same social interaction but do not share personal information. The resulting public goods structure is analyzed both theoretically a… ▽ More

    Submitted 25 October, 2019; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: 14 pages, 5 figures (Published at: https://link.springer.com/chapter/10.1007/978-3-030-32430-8_12)

    MSC Class: 91A06; 91A40; 91A80; 91A90; 65K05

  10. Consensus and Information Cascades in Game-Theoretic Imitation Dynamics with Static and Dynamic Network Topologies

    Authors: Christopher Griffin, Sarah Rajtmajer, Anna Squicciarini, Andrew Belmonte

    Abstract: We construct a model of strategic imitation in an arbitrary network of players who interact through an additive game. Assuming a discrete time update, we show a condition under which the resulting difference equations converge to consensus. Two conjectures on general convergence are also discussed. We then consider the case where players not only may choose their strategies, but also affect their… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: 30 pages, 15 figures, Accepted to SIAM J. Applied Dynamical Systems

    MSC Class: 37N40; 91A43; 39A30

  11. arXiv:1808.10307  [pdf, other

    cs.CR cs.LG stat.ML

    Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

    Authors: Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller

    Abstract: Deep learning models have consistently outperformed traditional machine learning models in various classification tasks, including image classification. As such, they have become increasingly prevalent in many real world applications including those where security is of great concern. Such popularity, however, may attract attackers to exploit the vulnerabilities of the deployed deep learning model… ▽ More

    Submitted 30 August, 2018; originally announced August 2018.

  12. arXiv:1702.07912  [pdf, other

    cs.SI cs.DM physics.soc-ph

    Increasing Peer Pressure on any Connected Graph Leads to Consensus

    Authors: Justin Semonsen, Christopher Griffin, Anna Squicciarini, Sarah Rajtmajer

    Abstract: In this paper, we study a model of opinion dynamics in a social network in the presence increasing interpersonal influence, i.e., increasing peer pressure. Each agent in the social network has a distinct social stress function given by a weighted sum of internal and external behavioral pressures. We assume a weighted average update rule and prove conditions under which a connected group of agents… ▽ More

    Submitted 18 June, 2017; v1 submitted 25 February, 2017; originally announced February 2017.

    Comments: Extended abstract form appearing in AAMAS 2017 (Sao Paulo, Brazil)

  13. arXiv:1408.2770  [pdf, ps, other

    cs.GT cs.SI physics.soc-ph

    A cooperate-defect model for the spread of deviant behavior in social networks

    Authors: Sarah Rajtmajer, Christopher Griffin, Derek Mikesell, Anna Squicciarini

    Abstract: We present a game-theoretic model for the spread of deviant behavior in online social networks. We utilize a two-strategy framework wherein each player's behavior is classified as normal or deviant and evolves according to the cooperate-defect payoff scheme of the classic prisoner's dilemma game. We demonstrate convergence of individual behavior over time to a final strategy vector and indicate co… ▽ More

    Submitted 16 August, 2014; v1 submitted 12 August, 2014; originally announced August 2014.

    Comments: 9 pages, 6 figures, corrects an oversight in Version 1 in which equilibrium point analysis is insufficiently qualified

    MSC Class: 91A22; 91A43; 91A50

  14. arXiv:1210.0268  [pdf, other

    cs.GT cs.SI

    Two Species Evolutionary Game Model of User and Moderator Dynamics

    Authors: Christopher Griffin, Douglas Mercer, James Fan, Anna Squicciarini

    Abstract: We construct a two species evolutionary game model of an online society consisting of ordinary users and behavior enforcers (moderators). Among themselves, moderators play a coordination game choosing between being "positive" or "negative" (or harsh) while ordinary users play prisoner's dilemma. When interacting, moderators motivate good behavior (cooperation) among the users through punitive acti… ▽ More

    Submitted 30 September, 2012; originally announced October 2012.

    Comments: 8 pages, 4 figures, submitted to 2012 ASE Conference on Social Informatics

  15. arXiv:1206.0981  [pdf, other

    cs.SI cs.GT physics.soc-ph

    An Informed Model of Personal Information Release in Social Networking Sites

    Authors: Anna Squicciarini, Christopher Griffin

    Abstract: The emergence of online social networks and the growing popularity of digital communication has resulted in an increasingly amount of information about individuals available on the Internet. Social network users are given the freedom to create complex digital identities, and enrich them with truthful or even fake personal information. However, this freedom has led to serious security and privacy i… ▽ More

    Submitted 5 June, 2012; originally announced June 2012.

    Comments: Submitted to 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust

    MSC Class: 91D30; 91A22; 91A80