Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography
暂无分享,去创建一个
[1] A. Beale,et al. Cyberbullying: What School Administrators (and Parents) Can Do , 2007 .
[2] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[3] Maged Hamada Ibrahim,et al. A Method for Obtaining Deniable Public-Key Encryption , 2009, Int. J. Netw. Secur..
[4] Justin W. Patchin,et al. Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization , 2008 .
[5] Polina Panicheva,et al. Dark personalities on Facebook: Harmful online behaviors and language , 2018, Comput. Hum. Behav..
[6] Liusheng Huang,et al. Hiding Information by Context-Based Synonym Substitution , 2009, IWDW.
[7] Alessandro Acquisti,et al. Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.
[8] M.H. Shirali-Shahreza,et al. Text Steganography in chat , 2007, 2007 3rd IEEE/IFIP International Conference in Central Asia on Internet.
[9] R. Kelly Garrett,et al. Driving a Wedge Between Evidence and Beliefs: How Online Ideological News Exposure Promotes Political Misperceptions , 2016, J. Comput. Mediat. Commun..
[10] Hong Yan,et al. Interword distance changes represented by sine waves for watermarking text images , 2001, IEEE Trans. Circuits Syst. Video Technol..
[11] Per Carlbring,et al. A review of cyberbullying and suggestions for online psychological therapy , 2015 .
[12] Girish J. Gulati,et al. Gulati elections of 2006 and 2008 Social networks in political campaigns : Facebook and the congressional , 2013 .
[13] Sangita Roy,et al. A novel approach to format based text steganography , 2011, ICCCS '11.
[14] Ran Canetti,et al. Fully Bideniable Interactive Encryption , 2018, IACR Cryptol. ePrint Arch..
[15] Linna Zhou,et al. Text Steganography Based on Online Chat , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[16] Hsin-Chen Lin,et al. How Political Candidates' Use of Facebook Relates to the Election Outcomes , 2017 .
[17] Kyu S. Hahn,et al. Red Media, Blue Media: Evidence of Ideological Selectivity in Media Use , 2009 .
[18] Lawrence O'Gorman,et al. Document marking and identification using both line and word shifting , 1995, Proceedings of INFOCOM'95.
[19] Zongkui Zhou,et al. Cyberbullying and its risk factors among Chinese high school students , 2013 .
[20] Chin-Laung Lei,et al. Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan , 2017, Comput. J..
[21] Yang Zhang,et al. Human Flesh Search Engine and Online Privacy , 2016, Sci. Eng. Ethics.
[22] Brent Waters,et al. Bi-Deniable Public-Key Encryption , 2011, CRYPTO.
[23] James M. Snyder,et al. Empirical Studies of Media Bias , 2015 .
[24] Kyung-Ae Moon,et al. A text watermarking algorithm based on word classification and inter-word space statistics , 2003, Seventh International Conference on Document Analysis and Recognition, 2003. Proceedings..
[25] Juan Enrique Ramos,et al. Using TF-IDF to Determine Word Relevance in Document Queries , 2003 .
[26] Peter Waiganjo Wagacha,et al. Genetic Algorithm Based Model in Text Steganography , 2013 .
[27] Girish J. Gulati,et al. Social Media and Campaign 2012 , 2013 .
[28] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[29] E. Noelle-Neumann. The Spiral of Silence A Theory of Public Opinion , 1974 .
[30] Marina Blanton,et al. Deniable cloud storage: sharing files via public-key deniability , 2010, WPES '10.
[31] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[32] Homero Gil de Zúñiga,et al. Effects of Editorial Media Bias Perception and Media Trust on the Use of Traditional, Citizen, and Social Media News , 2017 .
[33] J. Cappella,et al. Echo Chamber: Rush Limbaugh and the Conservative Media Establishment , 2008 .
[34] M. Strohmaier,et al. When populists become popular: comparing Facebook use by the right-wing movement Pegida and German political parties , 2017 .
[35] Markus Dürmuth,et al. Deniable Encryption with Negligible Detection Probability: An Interactive Construction , 2011, EUROCRYPT.
[36] Marek Klonowski,et al. Practical Deniable Encryption , 2008, SOFSEM.
[37] G. Prashanth. Audit-Free Cloud Storage via Deniable Attribute based Encryption , 2017 .
[38] Weiwu Zhang,et al. Gay Bullying and Online Opinion Expression , 2014 .
[39] L. Gao. The emergence of the Human Flesh Search Engine and political protest in China: exploring the Internet and online collective action , 2016 .