Follow
Jeremiah Onaolapo
Title
Cited by
Cited by
Year
Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web
G Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
Proceedings of the International AAAI Conference on Web and Social Media 11 …, 2017
3212017
What Happens After You Are Pwnd: Understanding The Use Of Leaked Webmail Credentials In The Wild
J Onaolapo, E Mariconti, G Stringhini
ACM SIGCOMM Internet Measurement Conference 2016, 2016
1052016
All your cards are belong to us: Understanding online carding forums
A Haslebacher, J Onaolapo, G Stringhini
2017 APWG Symposium on Electronic Crime Research (eCrime), 41-51, 2017
412017
What's in a Name?: Understanding Profile Name Reuse on Twitter
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 26th International Conference on World Wide Web, 1161-1170, 2017
372017
Honey Sheets: What Happens To Leaked Google Spreadsheets?
M Lazarov, J Onaolapo, G Stringhini
USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2016
362016
Flipping 419 Cybercrime Scams: Targeting the Weak and the Vulnerable
G Mba, J Onaolapo, G Stringhini, L Cavallaro
Proceedings of the 26th International Conference on World Wide Web Companion …, 2017
182017
Under and over the surface: a comparison of the use of leaked account credentials in the Dark and Surface Web
DAB Villalva, J Onaolapo, G Stringhini, M Musolesi
Crime Science 7 (1), 17, 2018
172018
SocialHEISTing: Understanding Stolen Facebook Accounts
J Onaolapo, N Leontiadis, D Magka, G Stringhini
30th USENIX Security Symposium (USENIX Security 21), 2021
102021
Limits of individual consent and models of distributed consent in online social networks
JL Lovato, A Allard, R Harp, J Onaolapo, L Hébert-Dufresne
2022 ACM Conference on Fairness, Accountability, and Transparency, 2251-2262, 2022
92022
Why allowing profile name reuse is a bad idea
E Mariconti, J Onaolapo, SS Ahmad, N Nikiforou, M Egele, N Nikiforakis, ...
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
82016
The cause of all evils: Assessing causality between user actions and malware activity
E Mariconti, J Onaolapo, G Ross, G Stringhini
10th {USENIX} Workshop on Cyber Security Experimentation and Test ({CSET} 17), 2017
72017
What's your major threat? On the differences between the network behavior of targeted and commodity malware
E Mariconti, J Onaolapo, G Ross, G Stringhini
2016 11th International Conference on Availability, Reliability and Security …, 2016
72016
BABELTOWER: How Language Affects Criminal Activity in Stolen Webmail Accounts
E Bernard-Jones, J Onaolapo, G Stringhini
The Third Workshop on Computational Methods in CyberSafety, Online …, 2018
5*2018
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks
J Lovato, L Hébert-Dufresne, J St-Onge, R Harp, GS Lopez, SP Rogers, ...
arXiv preprint arXiv:2210.10026, 2022
32022
Master of sheets: a tale of compromised cloud documents
J Onaolapo, M Lazarov, G Stringhini
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
32019
Harvesting wild honey from webmail beehives
J Onaolapo, E Mariconti, G Stringhini
Engineering Secure Software and Systems (ESSoS), 2016
22016
Game of FAME: Automatic Detection of FAke MEmes
B Jabiyev, J Onaolapo, G Stringhini, E Kirda
2*
A Methodology To Assess Malware Causality In Network Activities
E Mariconti, J Onaolapo, G Ross, G Stringhini
Engineering Secure Software and Systems (ESSoS) 190, 2016
12016
Human Dimensions of Animal Exploitation: Towards Understanding the International Wildlife Trade and Selfie-Tourism on Twitter
S Rogers, J Onaolapo
Companion Proceedings of the ACM Web Conference 2023, 578-580, 2023
2023
Lifelikeness is in the eye of the beholder: demographics of deepfake detection and their impacts on online social networks
J Lovato, L Hébert-Dufresne, J St-Onge, GS Lopez, SP Rogers, R Harp, ...
2022
The system can't perform the operation now. Try again later.
Articles 1–20