Anna C Squicciarini
Anna C Squicciarini
Verified email at
Cited by
Cited by
Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment
E Bertino, E Ferrari, AC Squicciarini
IEEE Transactions on Knowledge and data engineering 16 (7), 827-842, 2004
Collective privacy management in social networks
AC Squicciarini, M Shehab, F Paci
Proceedings of the 18th international conference on World wide web, 521-530, 2009
Ensuring distributed accountability for data sharing in the cloud
S Sundareswaran, A Squicciarini, D Lin
IEEE transactions on dependable and secure computing 9 (4), 556-568, 2012
A brokerage-based approach for cloud service selection
S Sundareswaran, A Squicciarini, D Lin
2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs
D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz
Ieee transactions on mobile computing 16 (5), 1357-1370, 2016
Privacy preserving multi-factor authentication with biometrics
A Bhargav-Spantzel, A Squicciarini, E Bertino
Proceedings of the second ACM workshop on Digital identity management, 63-72, 2006
Sentiment analysis during Hurricane Sandy in emergency response
VK Neppalli, C Caragea, A Squicciarini, A Tapia, S Stehle
International journal of disaster risk reduction 21, 213-222, 2017
Content-Driven Detection of Cyberbullying on the Instagram Social Network.
H Zhong, H Li, AC Squicciarini, SM Rajtmajer, C Griffin, DJ Miller, ...
IJCAI 16, 3952-3958, 2016
Security for web services and service-oriented architectures
E Bertino, L Martino, F Paci, A Squicciarini
Springer 4, 67, 2010
Mapping moods: Geo-mapped sentiment analysis during hurricane sandy.
C Caragea, AC Squicciarini, S Stehle, K Neppalli, AH Tapia
ISCRAM, 2014
Backdoor embedding in convolutional neural network models via invisible perturbation
H Zhong, C Liao, AC Squicciarini, S Zhu, D Miller
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
Backdoor embedding in convolutional neural network models via invisible perturbation
C Liao, H Zhong, A Squicciarini, S Zhu, D Miller
arXiv preprint arXiv:1808.10307, 2018
Establishing and protecting digital identity in federation systems
A Bhargav-Spantzel, AC Squicciarini, E Bertino
Proceedings of the 2005 workshop on Digital identity management, 11-19, 2005
Trust negotiations: concepts, systems, and languages
E Bertino, E Ferrari, A Squicciarini
Computing in science & engineering 6 (4), 27-34, 2004
Privacy policies for shared content in social network sites
AC Squicciarini, M Shehab, J Wede
The VLDB Journal 19, 777-796, 2010
Privacy policy inference of user-uploaded images on content sharing sites
AC Squicciarini, D Lin, S Sundareswaran, J Wede
IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014
Information-oriented trustworthiness evaluation in vehicular ad-hoc networks
S Gurung, D Lin, A Squicciarini, E Bertino
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
Identification and characterization of cyberbullying dynamics in an online social network
A Squicciarini, S Rajtmajer, Y Liu, C Griffin
Proceedings of the 2015 IEEE/ACM international conference on advances in …, 2015
Uncovering crowdsourced manipulation of online reviews
A Fayazi, K Lee, J Caverlee, A Squicciarini
Proceedings of the 38th international ACM SIGIR conference on research and …, 2015
CoPE: Enabling collaborative privacy management in online social networks
AC Squicciarini, H Xu, X Zhang
Journal of the American Society for Information Science and Technology 62 (3 …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20