SlideShare a Scribd company logo
Privacy and Security in Online
Social Media
Course on NPTEL
NOC-CS07
Week 8.2
Ponnurangam Kumaraguru (“PK”)
Associate Professor
ACM Distinguished Speaker
fb/ponnurangam.kumaraguru, @ponguru
Anonymous Networks
⚫4chan
⚫Whisper
⚫Secret
⚫Yik Yak
⚫Wickr
2
Why use Anonymous Networks?
3
⚫Increasing awareness of privacy
⚫Snowden disclosures
⚫PRISM Surveillance program
⚫Bal Thackeray incident
⚫Many other incidents around the world
What is Whisper?
https://whisper.sh
4
What is Whisper?
https://www.youtube.com/watch?v=pX9I9kR2tTc
5
Hearts / Chat
6
Terminology / Claims
⚫Whispers
⚫Replies
⚫Anonymous names
⚫Does not associate any personal information
with user ID
⚫Does not archive any user history
⚫Does not support persistent social links between
users
⚫“Heart” a message anonymously
⚫Private messages
7
Whisper
8
Goals
⚫How do whisper users interact in an
anonymous environment?
⚫Do users form communities similar to those
in traditional social networks?
⚫Does whisper’s lack of identities eliminate
strong ties between users?
⚫Does it eliminate stickiness critical to long
term engagement as in traditional SN?
9
Data collection
⚫Feb 6th
– May 1st
2014
⚫Collected “Latest” list by scrapping
⚫Data include
⚫WhisperID
⚫Timestamp
⚫Plain text of the whisper
⚫Author’s nickname
⚫A location tag
⚫# of replies (marked with the whisper)
⚫Likes
10
Data collection
⚫9,343,590 whispers
⚫15,268,964 replies
⚫1,038,364 GUIDs
⚫Global Universal Identifier
⚫Makes it possible to track user, but was
removed in June 2014
⚫Interacted with Whisper team
11
Data
12
⚫55% of whispers receives no replies
⚫25% have a chain of at least 2 replies
Time between original &
reply
13
⚫ 54% of replies arrive within an hour of the original whisper
⚫ 94% of replies arrives in one day
⚫ 1.3% of replies arrive a week or more
⚫ “If a whisper does not get attention shortly after posting, it is
unlikely to get attention later.”
Posts per user
14
⚫80% users post less than 10 total whispers or
replies
⚫15% of users only post replies but no original
whispers
⚫30% of users only post whispers but no replies
Network analysis
15
⚫ High average Degree. Users interact with large sample of other
users.
⚫ Whisper users are likely to interact with complete strangers who
are highly unlikely to interact with each other (low clustering
coef.)
⚫ 100 random nodes. Avg. path length calculated. Shortest
average path among 3.
⚫ Above 3 used to infer that graph is random than “small world”
Network analysis
16
⚫Assortativity measures the probability for
nodes in a graph to link to other nodes of
similar degrees.
⚫Close to zero → random graph
Content moderation
⚫1.7 million whispers have been deleted in 3
months
⚫18% of content deleted compared to 4% in
Twitter
17
Content moderation:
Process
⚫Extracted keywords from all whispers
⚫Removed common stop-words
⚫Removed words that appear in less than
0.05% of whispers
⚫Compute deletion ratio for each word
⚫# of deleted whispers with this word / all
whispers with this keyword
⚫Rank the words with deletion ratio
⚫Top and bottom keywords
18
Content moderation:
Process
⚫Run on all 9 million original whispers
⚫1.7 M were deleted
⚫2,324 keywords ranked by deletion ratio
⚫Manually put them in categories
19
Content moderation
20
Deletion delay
21
⚫70% of deleted whispers are “deleted” within
one week after posting
⚫2% of the whispers stay for more than a month
⚫ Done by moderators
Deletion delay
22
⚫ Fine grained analysis
⚫ Recrawled for 200K latest whispers
⚫ 32,153 was deleted
⚫ Peak deletion 3 – 9 hrs
⚫ Majority deletes within 24 hrs
User interactions
23
⚫503K user pairs
⚫90% of the two users co-located in the same
“State”
⚫75% have their distance < 40 miles
User interactions
24
⚫Smaller user population in same nearby area,
higher chance of encounter
⚫More whispers 2 users post, more likely they
encounter each other
User engagement
25
⚫Roughly 80K users per week
⚫Daily new posts in the entire network remain
stable, despite new users (earlier conclusion)
⚫Shows users “disengage”
User engagement
26
⚫ # of whispers and replies by both new and old users
⚫ New users make 20% contribution in the content
⚫ Content by new users does not grow significantly
Conclusions
⚫Clearly different from traditional social
networks
⚫Without strong user identities or persistent
social links, users interact with strangers
⚫Moderation is necessary
27
References
⚫http://www.cs.ucsb.edu/~ravenben/publicat
ions/pdf/whisper-imc14.pdf
28
Thank you
pk@iiitd.ac.in
precog.iiitd.edu.in
fb/ponnurangam.kumaraguru

More Related Content

What's hot

Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
Sucuri
 
How I Hacked The Government And Got Away With It
How I Hacked The Government And Got Away With ItHow I Hacked The Government And Got Away With It
How I Hacked The Government And Got Away With It
Steven Hatfield
 
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven HatfieldNTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
North Texas Chapter of the ISSA
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014
Timothy Resnik
 
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
IIIT Hyderabad
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Paubox, Inc.
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Network
guest38a088
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Paubox, Inc.
 
A little bird told me
A little bird told meA little bird told me
A little bird told me
Brendan Ihmig
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Cybersecurity Education and Research Centre
 
DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
Stu Hirst
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
Stu Hirst
 
Facebook business
Facebook businessFacebook business
Facebook business
seung hyun Seo
 
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoIf You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
Punchkick Interactive
 
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
John Anderson
 

What's hot (15)

Webinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPRWebinar: eCommerce Compliance - PCI meets GDPR
Webinar: eCommerce Compliance - PCI meets GDPR
 
How I Hacked The Government And Got Away With It
How I Hacked The Government And Got Away With ItHow I Hacked The Government And Got Away With It
How I Hacked The Government And Got Away With It
 
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven HatfieldNTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
NTXISSACSC3 - How I hacked the Government and Got Away with It by Seven Hatfield
 
Google Analytics in the age of not provided Search Fest 2014
Google Analytics in the age of not provided   Search Fest 2014Google Analytics in the age of not provided   Search Fest 2014
Google Analytics in the age of not provided Search Fest 2014
 
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
 
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 ConferenceEffective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
Effective Anti-Phishing Strategies and Exercises - FISSEA 2017 Conference
 
Digital Editors Network
Digital Editors NetworkDigital Editors Network
Digital Editors Network
 
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
Anatomy of a Ransomware Attack - Paubox SECURE Conference 2017
 
A little bird told me
A little bird told meA little bird told me
A little bird told me
 
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing PageEmerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
 
DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 
Facebook business
Facebook businessFacebook business
Facebook business
 
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 ChicagoIf You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
If You Like Big Data & Getting Caught in the Rain... -- Techweek 2013 Chicago
 
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
Friends Don't Let Friends Browse Unencrypted: Running a VPN for friends and f...
 

Viewers also liked

Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
IIIT Hyderabad
 
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsPrivacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
IIIT Hyderabad
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
IIIT Hyderabad
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
IIIT Hyderabad
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
IIIT Hyderabad
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
Tughral Yamin
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 

Viewers also liked (8)

Privacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSMPrivacy and Security in Online Social Media : Intro to OSM
Privacy and Security in Online Social Media : Intro to OSM
 
Privacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : IncidentsPrivacy and Security in Online Social Media : Incidents
Privacy and Security in Online Social Media : Incidents
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1Privacy and Security in Online Social Media : Policing and Social Media - Part 1
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 

Similar to Week 8.2 Anonymous Networks

Week 7.2 Nudges
Week 7.2 NudgesWeek 7.2 Nudges
Week 7.2 Nudges
IIIT Hyderabad
 
Graph Gurus Episode 6: Community Detection
Graph Gurus Episode 6: Community DetectionGraph Gurus Episode 6: Community Detection
Graph Gurus Episode 6: Community Detection
TigerGraph
 
Fessup Investor Deck
Fessup Investor DeckFessup Investor Deck
Fessup Investor Deck
Herbert Eng
 
User Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge BaseUser Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge Base
Artificial Intelligence Institute at UofSC
 
Slide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
Slide deck: High Speed and Secure: The Future of Cryptocurrency ExchangesSlide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
Slide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
Tova Dvorin
 
Management and analysis of social media data
Management and analysis of social media dataManagement and analysis of social media data
Management and analysis of social media data
Weining Qian
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
IIIT Hyderabad
 
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
George Protonotarios
 
Ethereum Sentiment Research Spotlight Study
Ethereum Sentiment Research Spotlight StudyEthereum Sentiment Research Spotlight Study
Ethereum Sentiment Research Spotlight Study
CoinDesk
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014
Christie Wilcox
 
The fragility of twitter social networks against suspended users
The fragility of twitter  social networks against suspended users The fragility of twitter  social networks against suspended users
The fragility of twitter social networks against suspended users
Kadriye Doğan
 
Inner Source: Enterprise Lessons from the Open Source Community.
Inner Source: Enterprise Lessons from the Open Source Community.Inner Source: Enterprise Lessons from the Open Source Community.
Inner Source: Enterprise Lessons from the Open Source Community.
Jim Jagielski
 
How to create social media accounts
How to create social media accountsHow to create social media accounts
How to create social media accounts
Kelley Dennings when at NC DENR
 
A Look Into Blockchain: Koombea TechTalks
A Look Into Blockchain: Koombea TechTalks A Look Into Blockchain: Koombea TechTalks
A Look Into Blockchain: Koombea TechTalks
Koombea
 
Human Centering Your Association and the Rise of Microinteractions
Human Centering Your Association and the Rise of MicrointeractionsHuman Centering Your Association and the Rise of Microinteractions
Human Centering Your Association and the Rise of Microinteractions
Matt Curtin
 
2014 social media ins out pt 2 denis masseni
2014 social media ins out pt 2 denis masseni2014 social media ins out pt 2 denis masseni
2014 social media ins out pt 2 denis masseni
Denis Masseni
 
presentation
presentationpresentation
presentation
Abduljaleel Al Rubaye
 
ICWE 2017: Recruiting from the network
ICWE 2017: Recruiting from the networkICWE 2017: Recruiting from the network
ICWE 2017: Recruiting from the network
Jonathan Carlton
 
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, BrazilAAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
Charith Perera
 
InnerSource: Enterprise Lessons from Open Source
InnerSource: Enterprise Lessons from Open SourceInnerSource: Enterprise Lessons from Open Source
InnerSource: Enterprise Lessons from Open Source
Jim Jagielski
 

Similar to Week 8.2 Anonymous Networks (20)

Week 7.2 Nudges
Week 7.2 NudgesWeek 7.2 Nudges
Week 7.2 Nudges
 
Graph Gurus Episode 6: Community Detection
Graph Gurus Episode 6: Community DetectionGraph Gurus Episode 6: Community Detection
Graph Gurus Episode 6: Community Detection
 
Fessup Investor Deck
Fessup Investor DeckFessup Investor Deck
Fessup Investor Deck
 
User Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge BaseUser Interests Identification From Twitter using Hierarchical Knowledge Base
User Interests Identification From Twitter using Hierarchical Knowledge Base
 
Slide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
Slide deck: High Speed and Secure: The Future of Cryptocurrency ExchangesSlide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
Slide deck: High Speed and Secure: The Future of Cryptocurrency Exchanges
 
Management and analysis of social media data
Management and analysis of social media dataManagement and analysis of social media data
Management and analysis of social media data
 
Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...Modeling Online User Interactions and their Offline effects on Socio-Technica...
Modeling Online User Interactions and their Offline effects on Socio-Technica...
 
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
Cryptocurrency Trading Guide: "Trading the Decentralization of the Financial ...
 
Ethereum Sentiment Research Spotlight Study
Ethereum Sentiment Research Spotlight StudyEthereum Sentiment Research Spotlight Study
Ethereum Sentiment Research Spotlight Study
 
Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014Outreach Through Social Media | Ocean Sciences 2014
Outreach Through Social Media | Ocean Sciences 2014
 
The fragility of twitter social networks against suspended users
The fragility of twitter  social networks against suspended users The fragility of twitter  social networks against suspended users
The fragility of twitter social networks against suspended users
 
Inner Source: Enterprise Lessons from the Open Source Community.
Inner Source: Enterprise Lessons from the Open Source Community.Inner Source: Enterprise Lessons from the Open Source Community.
Inner Source: Enterprise Lessons from the Open Source Community.
 
How to create social media accounts
How to create social media accountsHow to create social media accounts
How to create social media accounts
 
A Look Into Blockchain: Koombea TechTalks
A Look Into Blockchain: Koombea TechTalks A Look Into Blockchain: Koombea TechTalks
A Look Into Blockchain: Koombea TechTalks
 
Human Centering Your Association and the Rise of Microinteractions
Human Centering Your Association and the Rise of MicrointeractionsHuman Centering Your Association and the Rise of Microinteractions
Human Centering Your Association and the Rise of Microinteractions
 
2014 social media ins out pt 2 denis masseni
2014 social media ins out pt 2 denis masseni2014 social media ins out pt 2 denis masseni
2014 social media ins out pt 2 denis masseni
 
presentation
presentationpresentation
presentation
 
ICWE 2017: Recruiting from the network
ICWE 2017: Recruiting from the networkICWE 2017: Recruiting from the network
ICWE 2017: Recruiting from the network
 
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, BrazilAAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
AAMAS-2017 8-12 May, 2017, Sao Paulo, Brazil
 
InnerSource: Enterprise Lessons from Open Source
InnerSource: Enterprise Lessons from Open SourceInnerSource: Enterprise Lessons from Open Source
InnerSource: Enterprise Lessons from Open Source
 

More from IIIT Hyderabad

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
IIIT Hyderabad
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
IIIT Hyderabad
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
IIIT Hyderabad
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
IIIT Hyderabad
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
IIIT Hyderabad
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
IIIT Hyderabad
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
IIIT Hyderabad
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
IIIT Hyderabad
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
IIIT Hyderabad
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
IIIT Hyderabad
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
IIIT Hyderabad
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
IIIT Hyderabad
 
A Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
IIIT Hyderabad
 

More from IIIT Hyderabad (20)

Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT BombayResponsible & Safe AI Systems at ACM India ROCS at IIT Bombay
Responsible & Safe AI Systems at ACM India ROCS at IIT Bombay
 
International Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success storiesInternational Collaboration: Experiences, Challenges, Success stories
International Collaboration: Experiences, Challenges, Success stories
 
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBiasResponsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
Responsible & Safe AI: #LegalBias #Inconsistency #BiasinLLMs #MultiModalBias
 
Identify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake NewsIdentify, Inspect and Intervene Multimodal Fake News
Identify, Inspect and Intervene Multimodal Fake News
 
#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI#ChatGPT #ResponsibleAI
#ChatGPT #ResponsibleAI
 
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafetyData Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
Data Science for Social Good: #MentalHealth #CodeMix #LegalNLP #AISafety
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic AmbiguityBeyond the Surface: A Computational Exploration of Linguistic Ambiguity
Beyond the Surface: A Computational Exploration of Linguistic Ambiguity
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...Data Science for Social Good:                      #LegalNLP #AlgorithmicBias...
Data Science for Social Good: #LegalNLP #AlgorithmicBias...
 
How to Write a (Good) Research Paper
How to Write a (Good) Research Paper How to Write a (Good) Research Paper
How to Write a (Good) Research Paper
 
Data Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBiasData Science for Social Good: #LegalNLP #AlgorithmicBias
Data Science for Social Good: #LegalNLP #AlgorithmicBias
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Social Computing Research in India
Social Computing Research in IndiaSocial Computing Research in India
Social Computing Research in India
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...It is our choices, Harry, that show what we truly are, far more than our abil...
It is our choices, Harry, that show what we truly are, far more than our abil...
 
Leveraging Social Media for Financial Advice
Leveraging Social Media for Financial AdviceLeveraging Social Media for Financial Advice
Leveraging Social Media for Financial Advice
 
Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...Development of Stress Induction and Detection System to Study its Effect on B...
Development of Stress Induction and Detection System to Study its Effect on B...
 
A Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian LanguagesA Framework for Automatic Question Answering in Indian Languages
A Framework for Automatic Question Answering in Indian Languages
 
A Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian LanguagesA Framework For Automatic Question Answering in Indian Languages
A Framework For Automatic Question Answering in Indian Languages
 

Recently uploaded

一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Building a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdfBuilding a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdf
cjimenez2581
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
NABLAS株式会社
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
nyfuhyz
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
Social Samosa
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
v7oacc3l
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
jitskeb
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
ytypuem
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
nuttdpt
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
nyvan3
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
hqfek
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 

Recently uploaded (20)

一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Building a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdfBuilding a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdf
 
社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .社内勉強会資料_Hallucination of LLMs               .
社内勉強会資料_Hallucination of LLMs               .
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
一比一原版(UMN文凭证书)明尼苏达大学毕业证如何办理
 
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
在线办理(英国UCA毕业证书)创意艺术大学毕业证在读证明一模一样
 
Experts live - Improving user adoption with AI
Experts live - Improving user adoption with AIExperts live - Improving user adoption with AI
Experts live - Improving user adoption with AI
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
一比一原版(曼大毕业证书)曼尼托巴大学毕业证如何办理
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
一比一原版(UCSB文凭证书)圣芭芭拉分校毕业证如何办理
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
 
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
一比一原版爱尔兰都柏林大学毕业证(本硕)ucd学位证书如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 

Week 8.2 Anonymous Networks