Anna Squicciarini
#177,008
Most Influential Person Now
Computer scientist
Anna Squicciarini's AcademicInfluence.com Rankings
Anna Squicciarinicomputer-science Degrees
Computer Science
#11019
World Rank
#11627
Historical Rank
Database
#8103
World Rank
#8448
Historical Rank
Download Badge
Computer Science
Anna Squicciarini's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Anna Squicciarini Influential?
(Suggest an Edit or Addition)According to Wikipedia, Anna Cinzia Squicciarini is a computer scientist specializing in computer security and data privacy, including research on sentiment analysis, computational trust, and cloud computing. She is Edward Frymoyer Endowed Chair in the Penn State College of Information Sciences and Technology, and a program director for Secure and Trustworthy Cyberspace at the National Science Foundation.
Anna Squicciarini's Published Works
Published Works
- Collective privacy management in social networks (2009) (262)
- Trust-X: A Peer-to-Peer Framework for Trust Establishment (2004) (259)
- MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs (2017) (201)
- A Brokerage-Based Approach for Cloud Service Selection (2012) (184)
- Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation (2018) (182)
- Privacy preserving multi-factor authentication with biometrics (2006) (174)
- Sentiment analysis during Hurricane Sandy in emergency response (2017) (137)
- Mapping moods: Geo-mapped sentiment analysis during hurricane sandy (2014) (135)
- Security for Web Services and Service-Oriented Architectures (2009) (130)
- Content-Driven Detection of Cyberbullying on the Instagram Social Network (2016) (129)
- Preventing Information Leakage from Indexing in the Cloud (2010) (110)
- A3P: adaptive policy prediction for shared images over popular content sharing sites (2011) (102)
- Establishing and protecting digital identity in federation systems (2005) (100)
- CoPE: Enabling collaborative privacy management in online social networks (2011) (99)
- Privacy policies for shared content in social network sites (2010) (99)
- Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites (2015) (96)
- Trust negotiations: concepts, systems, and languages (2004) (95)
- Uncovering Crowdsourced Manipulation of Online Reviews (2015) (86)
- Ensuring Distributed Accountability for Data Sharing in the Cloud (2012) (81)
- Trust Negotiation in Identity Management (2007) (80)
- Identification and characterization of cyberbullying dynamics in an online social network (2015) (77)
- Twitter Mining for Disaster Response: A Domain Adaptation Approach (2015) (74)
- PP-trust-X: A system for privacy preserving trust negotiations (2007) (73)
- Promoting Distributed Accountability in the Cloud (2011) (73)
- Access control for online social networks third party applications (2012) (71)
- /spl Xscr/-TNL: an XML-based language for trust negotiations (2003) (68)
- Achieving privacy in trust negotiations with an ontology-based approach (2006) (67)
- Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks (2013) (66)
- Survey on Access Control for Community-Centered Collaborative Systems (2018) (66)
- Data protection models for service provisioning in the cloud (2010) (65)
- Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach (2018) (55)
- Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation (2011) (54)
- Enabling Privacy-Preserving Image-Centric Social Discovery (2014) (48)
- Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds (2017) (45)
- Identifying hidden social circles for advanced privacy configuration (2014) (45)
- PriMa: an effective privacy protection mechanism for social networks (2010) (44)
- Security and Privacy in Social Networks (2011) (42)
- Toward Automated Online Photo Privacy (2017) (40)
- The Design and Evaluation of Accountable Grid Computing System (2009) (39)
- Privacy-Preserving Trust Negotiations (2004) (39)
- Analyzing images' privacy for the modern web (2014) (38)
- An Informed Model of Personal Information Release in Social Networking Sites (2012) (37)
- Toward De-Anonymizing Bitcoin by Mapping Users Location (2015) (36)
- PriMa: a comprehensive approach to privacy protection in social network sites (2014) (35)
- Opinion Dynamics in the Presence of Increasing Agreement Pressure (2019) (34)
- Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing Via Geo-Indistinguishability (2019) (33)
- Beyond User-to-User Access Control for Online Social Networks (2008) (33)
- MMB$^{cloud}$ -Tree: Authenticated Index for Verifiable Cloud Service Selection (2017) (32)
- Identifying valuable information from twitter during natural disasters (2014) (31)
- A fine-grained access control model for Web services (2004) (31)
- Ws-AC: A Fine Grained Access Control System for Web Services (2006) (30)
- Automatic social group organization and privacy management (2012) (29)
- An Ultimatum Game Model for the Evolution of Privacy in Jointly Managed Content (2017) (28)
- A Group-Based Personalized Model for Image Privacy Classification and Labeling (2017) (27)
- Towards automatic privacy management in Web 2.0 with semantic analysis on annotations (2009) (26)
- Adaptive data protection in distributed systems (2013) (25)
- Uncovering the Spatio-Temporal Dynamics of Memes in the Presence of Incomplete Information (2016) (24)
- A Privacy-Preserving Approach for Web Service Selection and Provisioning (2011) (24)
- Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks (2016) (24)
- Detecting Malicious Co-resident Virtual Machines Indulging in Load-Based Attacks (2013) (24)
- CrowdSelect: Increasing Accuracy of Crowdsourcing Tasks through Behavior Prediction and User Selection (2016) (23)
- User Centric Policy Management in Online Social Networks (2010) (23)
- Towards Provenance-Based Anomaly Detection in MapReduce (2015) (23)
- Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation (2009) (22)
- Automatic Compliance of Privacy Policies in Federated Digital Identity Management (2006) (22)
- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies (2007) (20)
- Toward Detecting Compromised MapReduce Workers through Log Analysis (2014) (20)
- End-to-end accountability in grid computing systems for coalition information sharing (2008) (20)
- An Adaptive Access Control Model for Web Services (2006) (20)
- Trust establishment in the formation of Virtual Organizations (2008) (19)
- Multifactor Identity Verification Using Aggregated Proof of Knowledge (2010) (19)
- Learning based access control in online social networks (2010) (19)
- Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results (2012) (18)
- A framework for contractual resource sharing in coalitions (2004) (18)
- Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations (2007) (18)
- Web Services Threats, Vulnerabilities, and Countermeasures (2009) (18)
- An emotional step toward automated trust detection in crisis social media (2017) (18)
- Privacy in Crisis: A study of self-disclosure during the Coronavirus pandemic (2020) (18)
- Uncovering Scene Context for Predicting Privacy of Online Shared Images (2018) (16)
- Identity-based long running negotiations (2008) (16)
- Minimal credential disclosure in trust negotiations (2008) (16)
- Toward Automated Multiparty Privacy Conflict Detection (2018) (15)
- Group-Based Negotiations in P2P Systems (2010) (15)
- Detection and Analysis of Self-Disclosure in Online News Commentaries (2019) (15)
- Digital Identity Management and Trust Negotiation (2009) (14)
- Biometrics-based identifiers for digital identity management (2010) (14)
- SecLoc: Securing Location-Sensitive Storage in the Cloud (2015) (14)
- The relativity of privacy preservation based on social tagging (2014) (14)
- Towards Privacy-Preserving and Practical Image-Centric Social Discovery (2018) (14)
- Web-Traveler Policies for Images on Social Networks (2009) (14)
- A Flexible Approach to Multisession Trust Negotiations (2012) (13)
- Verification of Receipts from M-commerce Transactions on NFC Cellular Phones (2008) (12)
- A Policy-Based Accountability Tool for Grid Computing Systems (2008) (12)
- Incentivizing Distributive Fairness for Crowdsourcing Workers (2019) (12)
- CrowdEval: A Cost-Efficient Strategy to Evaluate Crowdsourced Worker's Reliability (2018) (12)
- Towards a Game Theoretical Model for Identity Validation in Social Network Sites (2011) (12)
- Dynamic Contract Design for Heterogenous Workers in Crowdsourcing for Quality Control (2017) (11)
- Privacy Requirements in Identity Management Solutions (2007) (11)
- PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network (2011) (11)
- A moving zone based architecture for message dissemination in VANETs (2012) (10)
- Privacy policies compliance across digital identity management systems (2008) (10)
- Why and how to deceive: game results with sociological evidence (2014) (10)
- From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing (2017) (10)
- DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems (2020) (10)
- Protecting Databases from Query Flood Attacks (2008) (10)
- Using Modeling and Simulation to Evaluate Enterprises' Risk Exposure to Social Networks (2011) (10)
- A Large Scale Study of Web Service Vulnerabilities (2015) (10)
- A privacy preserving assertion based policy language for federation systems (2007) (10)
- Situational awareness through reasoning on network incidents (2014) (10)
- LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System (2016) (9)
- Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters (2016) (9)
- XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting Attacks (2012) (9)
- Privacy aware service selection of composite web services invited paper (2013) (9)
- Time-Efficient Geo-Obfuscation to Protect Worker Location Privacy over Road Networks in Spatial Crowdsourcing (2020) (8)
- The Expertise Involved in Deciding which HITs are Worth Doing on Amazon Mechanical Turk (2021) (8)
- An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices (2009) (8)
- Anonymity Preserving Techniques in Trust Negotiations (2005) (8)
- Adaptive data management for self-protecting objects in cloud computing systems (2012) (7)
- Consensus and Information Cascades in Game-Theoretic Imitation Dynamics with Static and Dynamic Network Topologies (2019) (7)
- Detection and Protection against Distributed Denial of Service Attacks in Accountable Grid Computing Systems (2011) (7)
- Standards for Web Services Security (2009) (7)
- A Flexible Access Control Model for Web Services (2004) (7)
- A hybrid epidemic model for deindividuation and antinormative behavior in online social networks (2016) (6)
- VeryIDX - A Digital Identity Management System for Pervasive Computing Environments (2008) (6)
- Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering (2008) (6)
- Flexible Inference for Cyberbully Incident Detection (2018) (6)
- Trust-/spl Xscr/;: a peer-to-peer framework for trust establishment (2004) (6)
- In the wild: a large scale study of web services vulnerabilities (2014) (6)
- Contextual representation of self-disclosure and supportiveness in short text (2020) (6)
- STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds (2014) (6)
- Privacy-Aware Tag Recommendation for Image Sharing (2018) (5)
- Privacy-aware access control for message exchange in vehicular ad hoc networks (2015) (5)
- Profile-Based Selection of Accountability Policies in Grid Computing Systems (2011) (5)
- Toward Scalable Trustworthy Computing Using the Human-Physiology-Immunity Metaphor (2011) (5)
- Policy languages for digital identity management in federation systems (2006) (5)
- Positive and negative behavioral analysis in social networks (2017) (5)
- Online abusive users analytics through visualization (2014) (5)
- Access Control Strategies for Virtualized Environments in Grid Computing Systems (2007) (5)
- REMIND: Risk Estimation Mechanism for Images in Network Distribution (2020) (4)
- Hierarchical Clustering for Discrimination Discovery: A Top-Down Approach (2019) (4)
- A study of self-disclosure during the Coronavirus pandemic (2021) (4)
- Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks (2012) (4)
- Trust-Chi: An XML Framework for Trust Negotiations (2003) (4)
- Early Detection of Policies Violations in a Social Media Site: A Bayesian Belief Network Approach (2012) (4)
- A Comprehensive XML Based Approach to Trust Negotiations (2005) (4)
- A Vision for Scalable Trustworthy Computing (2010) (4)
- Multi-Party Access Control: Requirements, State of the Art and Open Challenges (2018) (4)
- Web Service Technologies, Principles, Architectures, and Standards (2009) (4)
- Server-Based Manipulation Attacks Against Machine Learning Models (2018) (4)
- An evolutionary game model for the spread of non-cooperative behavior in online social networks (2015) (4)
- Identifying multi-regime behaviors of memes in Twitter data (2014) (4)
- Policy-Compliant Search Query Routing for Web Service Discovery in Peer to Peer Networks (2013) (4)
- A cooperate-defect model for the spread of deviant behavior in social networks (2014) (4)
- DeCore: Detecting Content Repurposing Attacks on Clients' Systems (2010) (4)
- Rating Mechanisms for Sustainability of Crowdsourcing Platforms (2019) (3)
- A Study of Self-Privacy Violations in Online Public Discourse (2020) (3)
- k-anonymous attribute-based access control (2007) (3)
- Self-disclosure on Twitter During the COVID-19 Pandemic: A Network Perspective (2021) (3)
- Trust Negotiation Systems (2004) (3)
- A Tipping Point? Heightened self-disclosure during the Coronavirus pandemic (2020) (3)
- A Semantics-based Approach to Disclosure Classification in User-Generated Online Content (2020) (3)
- Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users (2016) (3)
- Image Repurposing for Gifar-Based Attacks (2010) (3)
- An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper) (2016) (3)
- Detecting Suspicious File Migration or Replication in the Cloud (2021) (3)
- PrivacyAlert: A Dataset for Image Privacy Prediction (2022) (3)
- DeepTrust (2020) (2)
- An Extended Ultimatum Game for Multi-Party Access Control in Social Networks (2022) (2)
- Vulnerabilities leading to denial of services attacks in grid computing systems: a survey (2010) (2)
- Automated Detection of Doxing on Twitter (2022) (2)
- Information carrying identity proof trees (2007) (2)
- Two Species Evolutionary Game Model of User and Moderator Dynamics (2012) (2)
- Combating Behavioral Deviance via User Behavior Control (2018) (2)
- Discovering reliable evidence of data misuse by exploiting rule redundancy (2019) (2)
- FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree (2019) (2)
- A Unified Theory of Trust and Collaboration (2008) (2)
- Trust Negotiations with Customizable Anonymity (2006) (2)
- IMAGE ANALYSIS OF CYBERBULLYING USING MACHINE LEARNING TECHNIQUES (2016) (2)
- Determining a Discrete Set of Site-Constrained Privacy Options for Users in Social Networks Through Stackelberg Games (2015) (2)
- A Synthetic Prediction Market for Estimating Confidence in Published Work (2021) (2)
- Trust- X : An XML Framework for Trust Negotiations (2003) (2)
- An assessment of accountability policies for large-scale distributed computing systems (2009) (1)
- Epidemic Behavior of Negative Users in Online Social Sites (2015) (1)
- TrafficAdaptor: an adaptive obfuscation strategy for vehicle location privacy against traffic flow aware attacks (2022) (1)
- Policy Driven Node Selection in MapReduce (2014) (1)
- Towards an Analytic Approach to Evaluate Enterprises' Risk Exposure to Social Networks (2009) (1)
- The importance of confidence & trust in complex collaborative systems (2009) (1)
- A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities (2006) (1)
- Access Control for Business Processes (2009) (1)
- PriMa: a comprehensive approach to privacy protection in social network sites (2013) (1)
- Location Privacy Protection in Vehicle-Based Spatial Crowdsourcing via Geo-Indistinguishability (2022) (1)
- Understanding and Predicting Retractions (2021) (1)
- Toward Image Privacy Classification and Spatial Attribution of Private Content (2019) (1)
- Cloud Security Baselines (2016) (1)
- Multi-party Access Control - 10 Years of Successes and Lessons Learned (2020) (1)
- Authorization Strategies for Virtualized Environments in Grid Computing Systems (2006) (1)
- A hybrid epidemic model for antinormative behavior in online social networks (2015) (1)
- Sanctioning Mechanisms in Virtual Communities (2006) (1)
- FriendGuard (2019) (1)
- Increasing Peer Pressure on any Connected Graph Leads to Consensus (2017) (1)
- Privacy and Access Control: How are These Two concepts Related? (2015) (1)
- Agent-based accountable grid computing systems (2013) (1)
- Securing Resource Discovery in Content Hosting Networks (2014) (1)
- Emerging Research Trends (2009) (1)
- RoCourseNet: Distributionally Robust Training of a Prediction Aware Recourse Model (2022) (1)
- Efficient Network Path Verification for Policy-routedQueries (2016) (1)
- A secure framework for publishing virtual community contracts (2006) (1)
- A Longitudinal Dataset of Twitter ISIS Users (2022) (0)
- User Customizable and Robust Geo-Indistinguishability for Location Privacy (2022) (0)
- Contagion of Offensive Behavior for Transient Interactions in Online Commenting Platforms (2021) (0)
- Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems (2017) (0)
- Bio-Key : Privacy Preserving Biometric Authentication (2007) (0)
- WS-Rec: Web services recommendations using heterogeneous criteria (2013) (0)
- Consensus in complex networks with noisy agents and peer pressure (2022) (0)
- Monitoring Contract Enforcement within Virtual Organizations (2008) (0)
- The Pennsylvania State University The Graduate School College of Information Sciences and Technology DETECTION AND DYNAMICS OF CYBERBULLYING IN ONLINE SOCIAL NETWORKS A Thesis in Information Sciences and Technology by (2015) (0)
- Privacy-aware access control for message exchange in vehicular ad hoc networks (2014) (0)
- The Contribution of Verified Accounts to Self-Disclosure in COVID-Related Twitter Conversations (2022) (0)
- Consensus on Social Graphs under Increasing Peer Pressure (2017) (0)
- Proceedings of the 4th ACM International Workshop on Security in Cloud Computing (2016) (0)
- Agent-based accountable grid computing systems (2013) (0)
- Secure Publishing Techniques (2009) (0)
- Cloud Computing Essentials (2016) (0)
- Collective Attention Threats: Models and Deterrence (2018) (0)
- Trust negotiations for collaborative environments: Principles, concepts and systems (2009) (0)
- Session details: Session 7: IoT (2020) (0)
- COVID-19 and Haters — A User Model Perspective (2022) (0)
- TrafficAdaptor (2022) (0)
- Editor's Note (2016) (0)
- Access Control for Web Services (2009) (0)
- Privacy through web-traveler policies in social network environments (2011) (0)
- Distributed Data-Sharing Consensus in Cooperative Perception of Autonomous Vehicles (2022) (0)
- SPOSN 2009 Organizing and Program Committees (2009) (0)
- IPS/UMS/WNGS/MUS 2008 workshop message from the workshop organizers MUE 2008 (2008) (0)
- Advancing Trust Negotiations for Collaborative Tasks-Position Paper - (2009) (0)
- Session details: Keynote Address 1 (2015) (0)
- 2019 Cybersecurity Research Transition to Practice Workshop Slides (2019) (0)
- A Few Shot Transfer Learning Approach Identifying Private Images With Fast User Personalization (2021) (0)
- Session details: Short papers: users and security economics (2013) (0)
- Attribute-Based Access Control ? (2007) (0)
- UNDERSTANDING AND DETECTING ONLINE MISINFORMATION WITH AUXILIARY DATA (2022) (0)
- Privacy Pitfalls and Solutions in Trust Negotiations (2005) (0)
- TACO: A Tree-based Approach to Customizing Location Obfuscation based on User Policies (2022) (0)
- Purdue University Trust Negotiation in Identity Management (2005) (0)
- Session details: Mobile Security (2018) (0)
- Modeling Longitudinal Behavior Dynamics Among Extremist Users in Twitter Data (2021) (0)
- ReasONets: a fuzzy-based approach for reasoning on network incidents (2012) (0)
- Power Law Public Goods Game for Personal Information Sharing in News Comments (2019) (0)
- The Pennsylvania State University The Graduate School ANALYZING IMAGE PRIVACY FOR THE MODERN WEB A Thesis in COMPUTER SCIENCE AND ENGINEERING by RAHUL BALAKAVI (2014) (0)
- Erratum to: Web-Traveler Policies for Images on Social Networks (2010) (0)
- Real-Time Detection of Illegal File Transfers in the Cloud (2017) (0)
- 2007 Annual Index IEEE Security & Privacy, Volume 6 (2007) (0)
- Understanding and Predicting Retractions of Published Work (2021) (0)
- Why and how to deceive: game results with sociological evidence (2014) (0)
- Distributed Java-Based Content Protection (2011) (0)
- Trust-X: a trust negotiation proposal (2004) (0)
- Session details: Web security (2014) (0)
- A hybrid epidemic model for deindividuation and antinormative behavior in online social networks (2016) (0)
This paper list is powered by the following services:
Other Resources About Anna Squicciarini
What Schools Are Affiliated With Anna Squicciarini?
Anna Squicciarini is affiliated with the following schools: