Folgen
Christo Wilson
Christo Wilson
Associate Professor, Northeastern University
Bestätigte E-Mail-Adresse bei ccs.neu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
User interactions in social networks and their implications
C Wilson, B Boe, A Sala, KPN Puttaswamy, BY Zhao
Proceedings of the 4th ACM European conference on Computer systems, 205-218, 2009
12552009
Better never than late: Meeting deadlines in datacenter networks
C Wilson, H Ballani, T Karagiannis, A Rowtron
ACM SIGCOMM Computer Communication Review 41 (4), 50-61, 2011
8302011
Detecting and characterizing social spam campaigns
H Gao, J Hu, C Wilson, Z Li, Y Chen, BY Zhao
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 35-47, 2010
7402010
Uncovering social network sybils in the wild
Z Yang, C Wilson, X Wang, T Gao, BY Zhao, Y Dai
ACM Transactions on Knowledge Discovery from Data (TKDD) 8 (1), 1-29, 2014
5752014
Measuring personalization of web search
A Hannak, P Sapiezynski, A Molavi Kakhki, B Krishnamurthy, D Lazer, ...
Proceedings of the 22nd international conference on World Wide Web, 527-538, 2013
5692013
Measuring price discrimination and steering on e-commerce web sites
A Hannak, G Soeller, D Lazer, A Mislove, C Wilson
Proceedings of the 2014 conference on internet measurement conference, 305-318, 2014
4482014
Peeking beneath the hood of uber
L Chen, A Mislove, C Wilson
Proceedings of the 2015 internet measurement conference, 495-508, 2015
4072015
Bias in online freelance marketplaces: Evidence from taskrabbit and fiverr
A Hannák, C Wagner, D Garcia, A Mislove, M Strohmaier, C Wilson
Proceedings of the 2017 ACM conference on computer supported cooperative …, 2017
3912017
You are how you click: Clickstream analysis for sybil detection
G Wang, T Konolige, C Wilson, X Wang, H Zheng, BY Zhao
22nd USENIX security symposium (USENIX Security 13), 241-256, 2013
3872013
Understanding latent interactions in online social networks
J Jiang, C Wilson, X Wang, W Sha, P Huang, Y Dai, BY Zhao
ACM Transactions on the Web (TWEB) 7 (4), 1-39, 2013
3822013
Sharing graphs using differentially private graph models
A Sala, X Zhao, C Wilson, H Zheng, BY Zhao
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
3232011
An empirical analysis of algorithmic pricing on amazon marketplace
L Chen, A Mislove, C Wilson
Proceedings of the 25th international conference on World Wide Web, 1339-1349, 2016
3112016
Serf and turf: crowdturfing for fun and profit
G Wang, C Wilson, X Zhao, Y Zhu, M Mohanlal, H Zheng, BY Zhao
Proceedings of the 21st international conference on World Wide Web, 679-688, 2012
3062012
Do social networks improve e-commerce? A study on social marketplaces
G Swamynathan, C Wilson, B Boe, K Almeroth, BY Zhao
Proceedings of the first workshop on Online social networks, 1-6, 2008
2882008
Social turing tests: Crowdsourcing sybil detection
G Wang, M Mohanlal, C Wilson, X Wang, M Metzger, H Zheng, BY Zhao
arXiv preprint arXiv:1205.3856, 2012
2752012
Misinformation in action: Fake news exposure is linked to lower trust in media, higher trust in government when your side is in power
K Ognyanova, D Lazer, RE Robertson, C Wilson
Harvard Kennedy School Misinformation Review, 2020
2402020
Measurement-calibrated graph models for social network experiments
A Sala, L Cao, C Wilson, R Zablit, H Zheng, BY Zhao
Proceedings of the 19th international conference on World wide web, 861-870, 2010
2392010
Beyond social graphs: User interactions in online social networks and their implications
C Wilson, A Sala, KPN Puttaswamy, BY Zhao
ACM Transactions on the Web (TWEB) 6 (4), 1-31, 2012
2222012
Auditing partisan audience bias within google search
RE Robertson, S Jiang, K Joseph, L Friedland, D Lazer, C Wilson
Proceedings of the ACM on Human-Computer Interaction 2 (CSCW), 1-22, 2018
2082018
Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web
T Lauinger, A Chaabane, S Arshad, W Robertson, C Wilson, E Kirda
arXiv preprint arXiv:1811.00918, 2018
1962018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20