Publications
Journals
-
Ravi, H., Subramanyam, A. V., Emmanuel, S., Forensic Analysis of Linear and Non Linear Image Filtering Using Quantization Noise. Accepted at ACM Transactions on Multimedia Computing Communication and Applications (ACM TOMM), 2015. Author's version
-
Ravi, H., Subramanyam, A. V., Emmanuel, S., ACE - An Effective Anti-Forensic Contrast Enhancement Technique. Accepted at IEEE Signal Processing Letters (IEEE SPL), 2015. Author's version
Conferences
-
Jain, P., Kumaraguru, P., Joshi, A. Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. Accepted at Hypertext, 2015. Author's version.
-
Aggarwal, A., Kumaraguru, P. What They Do in Shadows: Twitter Underground Follower Market. Accepted at the 13th Annual Conference on Privacy, Security and Trust (PST), 2015.
-
Dewan, P., Kumaraguru, P. Towards Automatic Real Time Identification of Malicious Posts on Facebook. Accepted at the 13th Annual Conference on Privacy, Security and Trust (PST), 2015.
-
Dhar, A., Purandare, R., Dhawan, M., Rangaswamy, S. Clotho:Saving Programs from Malformed Strings and Incorrect String-handling. Accepted at Foundations of Software Engineering, 2015.
-
Ravi, H., Subramanyam, A. V., Emmanuel S. Spatial Domain Quantization Noise Based Image FIltering Detection. Accepted at the IEEE International conference on Image Processing, 2015. Author's version.
-
Sachdeva, N., and Kumaraguru, P. Online Social Networks and Police in India - Understanding the Perceptions, Behavior, Challenges. Accepted at the European conference on Computer-Supported Cooperative Work (ECSCW), 2015. Author's version.
-
Sachdeva, N., and Kumaraguru, P. Social Networks for Police and Residents in India: Exploring Online Communication for Crime Prevention. Accepted at the 16th Annual International Conference on Digital Government Research (dg.o), 2015. Author's version.
-
Mohamed, M., Sachdeva, N., Georgescu, M., Gao, S., Saxena, N., Zhang, C., Kumaraguru, P., Van Oorschot, P., and Chen, W. A Three-Way Investigation of a Game-CAPTCHA: Automated Attacks, Relay Attacks and Usability. Accepted at 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
-
Gupta, A., Kumaraguru, P., Castillo, C., and Meier, P. TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter. In 6th International Conference on Social Informatics (SocInfo), 2014. Runner-up for best paper award. Author's version
-
Dewan, P., Kashyap, A., Kumaraguru, P. Analyzing Social and Stylometric Features to Identify Spear phishing Emails. Accepted at 9th APWG Symposium on Electronic Crime Research (eCrime), 2014. Author's version
-
Gupta, N., Aggarwal A. and Kumaraguru, P. bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection. Accepted at 9th APWG Symposium on Electronic Crime Research (eCrime), 2014. Author's version
-
Gupta, S., and Kumaraguru, P. Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page. Accepted at 9th APWG Symposium on Electronic Crime Research (eCrime), 2014. Author's version
-
Ravi, H., Subramanyam, A. V., Gupta, G. and Avinash Kumar, B., Compression Noise Based Video Forgery Detection. Accepted at International Conference on Image Processing (ICIP), 2014. Author's version
Wokshops
Thesis
-
IIIT-D-PhD-CS-CERC-16-002: Designing and Evaluating Techniques to Mitigate Misinformation Spread on Microblogging Web Services | PDF | Slides
Research Area(s): Online Social Media
Publication Date: April 25, 2016
Student Name: Paridhi Jain
-
IIIT-D-MTech-CS-GEN-16-008: Image Search for Improved Law and Order: Search,
Analyse, Predict image spread on Twitter | PDF | Slides
Research Area(s): Online Social Media
Publication Date: April 25, 2016
Student Name: Sonal Goel
-
IIIT-D-MTech-CS-IS-15-007: Video Inpainting detection using inconsistencies in optical Flow
Infrastructure | PDF | Slides
Research Area(s): Digital Multimedia Forensics
Publication Date: July 29, 2015
Student Name: Shobhita Saxena
-
IIIT-D-MTech-CS-IS-15-006: TASVEER : Tomography of India’s Internet
Infrastructure | PDF | Slides
Research Area(s): Network Security
Publication Date: July 28, 2015
Student Name: Rahul Kumar Singh
-
IIIT-D-PhD-CS-CERC-15-001: Designing and Evaluating Techniques to Mitigate Misinformation Spread on Microblogging Web Services | PDF | Slides | Video
Research Area(s): Online Social Media
Publication Date: July 6, 2015
Student Name: Aditi Gupta
-
IIIT-D-MTech-CS-IS-15-005: Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Implementations | PDF | Slides
Research Area(s): Network Security
Publication Date: June 19, 2015
Student Name: Vaishali Garg
-
IIIT-D-MTech-CS-IS-154-004: Clotho: Saving Programs from Malformed Strings and Incorrect String-handling | PDF | Slides
Research Area(s): Program Analysis
Publication Date: November 25, 2014
Student Name: Aritra Dhar
-
IIIT-D-MTech-CS-IS-14-003: Broker Bots: Analyzing automated activity during
High Impact Events on Twitter | PDF | Slides
Research Area(s): Online Social Media
Publication Date: June 19, 2014
Student Name: Sudip Mittal
-
IIIT-D-MTech-CS-IS-14-002: Twitter and Polls: Analyzing and estimating political orientation of Twitter users in India General #Elections2014 | PDF | Slides
Research Area(s): Online Social Media
Publication Date: June 19, 2014
Student Name: Abhishek Bhola
-
IIIT-D-MTech-CS-IS-14-001: Exploration of gaps in Bitly’s spam detection and relevant counter measures | PDF | Slides | Video
Research Area(s): Privacy and Security in Online Social Media
Publication Date: April 15, 2014
Student Name: Neha Gupta
Technical Reports
-
IIITD-CERC-14-009: Privacy4ICTD in India: Exploring Perceptions, Attitudes and Awareness about ICT Use | PDF
Research Area(s): Online social networks, Privacy
Publication Date: October 15, 2014
-
IIITD-CERC-14-008: Social Media Policy for Policing in India | PDF
Research Area(s): Online social networks, Policy, Policing
Publication Date: July 1, 2014
-
IIITD-CERC-14-007: Analyzing Social and Stylometric Features to Identify Spear phishing Emails | PDF
Research Area(s): Phishing, Privacy and Security in Online Social Media
Publication Date: June 14, 2014
-
IIITD-CERC-14-006: bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection Page | PDF
Research Area(s): Privacy and Security in Online Social Media
Publication Date: June 14, 2014
-
IIITD-CERC-14-005: Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page | PDF
Research Area(s): Phishing, eCrime
Publication Date: June 14, 2014
-
IIITD-CERC-14-004: @I to @Me: An anatomy of username changing behavior on Twitter | PDF
Research Area(s): Online Social Media, Identity Resolution
Publication Date: May 27, 2014
-
IIITD-CERC-14-003: TweetCred: A Real-time Web-based System for Assessing Credibility of Content on Twitter | PDF
Research Area(s): Privacy and Security in Online Social Media
Publication Date: May 21, 2014
-
IIITD-CERC-14-002: It Doesn’t Break Just on Twitter. Characterizing Facebook content During Real World Events | PDF
Research Area(s): Online Social Media
Publication Date: May 20, 2014
-
IIITD-CERC-14-001: Online Social Media and Police in India: Behavior, Perceptions, Challenges | PDF
Research Area(s): Privacy and Security in Online Social Media, Usable Security
Publication Date: Feb 11, 2014
Annual Reports