Semantic Scholar uses AI to extract papers important to this topic.
This document describes the aggregation and anonymization process applied to the initial version of Google COVID-19 Community… Expand Mobile devices are increasingly the dominant Internet access technology. Nevertheless, high costs, data caps, and throttling are… Expand Phishing is an online identity theft, which aims to steal confidential information such as username, password and online banking… Expand Web browsers show HTTPS authentication warnings (i.e., SSL warnings) when the integrity and confidentiality of users… Expand Abstract
The amount of personal information involuntarily exposed by users on online social networks is staggering, as shown in… Expand We contribute 5-gram counts and language models trained on the Common Crawl corpus, a collection over 9 billion web pages. This… Expand Third-party applications (apps) drive the attractiveness of web and mobile application platforms. Many of these platforms adopt a… Expand With the advent of online social media, phishers have started using social networks like Twitter, Facebook, and Foursquare to… Expand Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can… Expand The Web has become one of the primary ways people interact with their computers, connecting people with a diverse landscape of… Expand