| Cashtag Piggybacking: Uncovering Spam and Bot Activity in Stock Microblogs on Twitter |
10 |
| Polarization and Fake News: Early Warning of Potential Misinformation Targets |
7 |
| A Large-scale Behavioural Analysis of Bots and Humans on Twitter |
5 |
| BUbiNG Massive Crawling for the Masses |
5 |
| Understanding Cross-Site Linking in Online Social Networks |
5 |
| Imaginary People Representing Real Numbers: Generating Personas from Online Social Media Data |
5 |
| You, the Web, and Your Device: Longitudinal Characterization of Browsing Habits |
4 |
| Extracting and Summarizing Situational Information from the Twitter Social Media during Disasters |
4 |
| Web Portals for High-performance Computing: A Survey |
4 |
| Recommendation in a Changing World: Exploiting Temporal Dynamics in Ratings and Reviews |
3 |
| Detecting Cyberbullying and Cyberaggression in Social Media |
2 |
| Semantics-Based Analysis of Content Security Policy Deployment |
2 |
| When Simpler Data Does Not Imply Less Information: A Study of User Profiling Scenarios With Constrained View of Mobile HTTP(S) Traffic |
2 |
| A Model of Information Diffusion in Interconnected Online Social Networks |
2 |
| Adaptive Knowledge Propagation in Web Ontologies |
2 |
| Test-Based Security Certification of Composite Services |
1 |
| Social Networks under Stress: Specialized Team Roles and Their Communication Structure |
1 |
| Analyzing Privacy Policies at Scale: From Crowdsourcing to Automated Annotations |
1 |
| Activity Recommendation with Partners |
1 |
| Caching to Reduce Mobile App Energy Consumption |
1 |
| Exploring the Emerging Type of Comment for Online Videos: DanMu |
1 |
| Completeness Management for RDF Data Sources |
1 |
| Evaluating Quality in Use of Corporate Web Sites: An Empirical Investigation |
1 |
| Localness of Location-based Knowledge Sharing: A Study of Naver KiN Here |
1 |
| Faster Base64 Encoding and Decoding Using AVX2 Instructions |
1 |
| FusE: Entity-Centric Data Fusion on Linked Data |
1 |
| What Web Template Extractor Should I Use? A Benchmarking and Comparison for Five Template Extractors |
1 |
| Layout Cross-Platform and Cross-Browser Incompatibilities Detection using Classification of DOM Elements |
1 |
| The Enemy Among Us: Detecting Cyber Hate Speech with Threats-based Othering Language Embeddings |
1 |
| Unsupervised Domain Ranking in Large-Scale Web Crawls |
0 |
| Learning Linear Influence Models in Social Networks from Transient Opinion Dynamics |
0 |
| Exploring and Analysing the African Web Ecosystem |
0 |
| A Rule-Based Transducer for Querying Incompletely Aligned Datasets |
0 |
| Top-k User-Defined Vertex Scoring Queries in Edge-Labeled Graph Databases |
0 |
| Long-term Measurement and Analysis of the Free Proxy Ecosystem |
0 |
| Efficient Pairwise Penetrating-rank Similarity Retrieval |
0 |
| Fast and Practical Snippet Generation for RDF Datasets |
0 |
| Combining URL and HTML Features for Entity Discovery in the Web |
0 |
| Knowledge Graph Embedding: A Locally and Temporally Adaptive Translation-Based Approach |
0 |
| Characterizing and Predicting Users' Behavior on Local Search Queries |
0 |
| User Studies on End-User Service Composition: A Literature Review and a Design Framework |
0 |
| Exploiting Usage to Predict Instantaneous App Popularity: Trend Filters and Retention Rates |
0 |
| Optimizing Whole-Page Presentation for Web Search |
0 |
| Mining Abstract XML Data-Types |
0 |
| New Phone, Who Dis? Modeling Millennials' Backup Behavior |
0 |
| Modeling and Simulating the Web of Things from an Information Retrieval Perspective |
0 |