Online social networks: threats and solutions
Many online social network (OSN) users are unaware of the numerous security risks that
exist in these networks, including privacy violations, identity theft, and sexual harassment …
exist in these networks, including privacy violations, identity theft, and sexual harassment …
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
kee** in touch with friends. OSNs resort to trust evaluation models and algorithms to …
[HTML][HTML] Metaverse governance: An empirical analysis of voting within Decentralized Autonomous Organizations
In this paper we explore the importance of platform governance. We discuss various
problems of centralized architecture in the context of the metaverse or sharing economy …
problems of centralized architecture in the context of the metaverse or sharing economy …
The limitations of federated learning in sybil settings
Federated learning over distributed multi-party data is an emerging paradigm that iteratively
aggregates updates from a group of devices to train a globally shared model. Relying on a …
aggregates updates from a group of devices to train a globally shared model. Relying on a …
Mitigating sybils in federated learning poisoning
Machine learning (ML) over distributed multi-party data is required for a variety of domains.
Existing approaches, such as federated learning, collect the outputs computed by a group of …
Existing approaches, such as federated learning, collect the outputs computed by a group of …
Design choices for central bank digital currency: Policy and technical considerations
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …
Fraudar: Bounding graph fraud in the face of camouflage
Given a bipartite graph of users and the products that they review, or followers and
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
followees, how can we detect fake reviews or follows? Existing fraud detection methods …
Sybil attacks and their defenses in the internet of things
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the …
TrustChain: A Sybil-resistant scalable blockchain
TrustChain is capable of creating trusted transactions among strangers without central
control. This enables new areas of blockchain use with a focus on building trust between …
control. This enables new areas of blockchain use with a focus on building trust between …
Aiding the detection of fake accounts in large scale social online services
Users increasingly rely on the trustworthiness of the information exposed on Online Social
Networks (OSNs). In addition, OSN providers base their business models on the …
Networks (OSNs). In addition, OSN providers base their business models on the …