publications
publications by categories in reversed chronological order.
2025
- USENIXThe Conspiracy Money Machine: Uncovering Telegram’s Conspiracy Channels and their Profit Model.In 34th USENIX security symposium (USENIX Security 25), 2025
2024
- TIFSDARD: Deceptive Approaches for Robust Defense Against IP TheftIEEE Transactions on Information Forensics and Security, 2024
2023
- ICDCSA Game of NFTs: Characterizing NFT Wash Trading in the Ethereum BlockchainIn 2023 IEEE 43th International Conference on Distributed Computing Systems (ICDCS), 2023
- WWW / CAAWReady, Aim, Snipe! Analysis of Sniper Bots and their Impact on the DeFi EcosystemIn Companion Proceedings of the Web Conference, 2023
- ICWSIt’s a Trap! Detection and Analysis of Fake Channels on TelegramIn 2023 IEEE International Conference on Web Services (ICWS), 2023
- TUSTArtificial Intelligence for Tunnel Boring Machine Penetration Rate PredictionTunnelling and Underground Space Technology, 2023
- USENIXToken Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB)In 32nd USENIX security symposium (USENIX Security 23), 2023
- IDATranslated Texts Under the Lens: From Machine Translation Detection to Source Language IdentificationIn International Symposium on Intelligent Data Analysis, 2023
- EOSDOpenSeesPy-based web application for pushover curve computation of RC Bridge piers subject to arbitrarily non-uniform corrosion patternsIn Proceedings of the 2022 Eurasian OpenSees Days, 2023
2022
- TOITThe Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency ManipulationsACM Transactions on Internet Technology, 2022
2021
- IMCThe parallel lives of autonomous systems: ASN allocations vs. BGPIn Proceedings of the 21st ACM Internet Measurement Conference, 2021
2020
- ICDCSA Light in the Dark Web: Linking Dark Web Aliases to Real Internet IdentitiesIn 2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS), 2020
- ICWSGDPR: When the Right to Access Personal Data Becomes a ThreatIn 2020 IEEE International Conference on Web Services (ICWS), 2020
- ICCCNPump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market ManipulationsIn 2020 29th International Conference on Computer Communications and Networks (ICCCN), 2020
2019
- CLEFCross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.In CLEF (Working Notes), 2019
- CLEFBot and Gender Detection of Twitter Accounts Using Distortion and LSA notebook for PAN at CLEF 2019In CLEF (Working Notes), 2019
- TSCNationality and Geolocation-Based Profiling in the Dark (Web)IEEE Transactions on Services Computing, 2019
2018
- ICDCSTime-Zone Geolocation of Crowds in the Dark WebIn 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 2018
2013
- Mobile ticketing with NFC management for transport companies. Problems and solutionsIn 2013 5th International Workshop on Near Field Communication (NFC), 2013