Blogs, twitter feeds, and reddit comments: Cross-domain authorship attribution R Overdorf, R Greenstadt Proceedings on Privacy Enhancing Technologies, 2016 | 96 | 2016 |
POTs: protective optimization technologies B Kulynych, R Overdorf, C Troncoso, S Gürses Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020 | 90 | 2020 |
How unique is your. onion? an analysis of the fingerprintability of tor onion services R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 88 | 2017 |
Ephemeral astroturfing attacks: The case of fake twitter trends T Elmas, R Overdorf, AF Özkalay, K Aberer 2021 IEEE European symposium on security and privacy (EuroS&P), 403-422, 2021 | 65* | 2021 |
Breaking the closed-world assumption in stylometric authorship attribution A Stolerman, R Overdorf, S Afroz, R Greenstadt Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014 | 46 | 2014 |
Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution A Stolerman, R Overdorf, S Afroz, R Greenstadt IFIP Working Group 11, 64, 2013 | 37 | 2013 |
Stylometric authorship attribution of collaborative documents E Dauber, R Overdorf, R Greenstadt Cyber Security Cryptography and Machine Learning: First International …, 2017 | 32 | 2017 |
Computer-supported cooperative crime V Garg, S Afroz, R Overdorf, R Greenstadt Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 28 | 2015 |
Questioning the assumptions behind fairness solutions R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses arXiv preprint arXiv:1811.11293, 2018 | 23 | 2018 |
POTs: The revolution will not be optimized S Gürses, R Overdorf, E Balsa 11th Hot Topics in Privacy Enhancing Technologies (HotPETs) 2, 2018 | 19 | 2018 |
Under the underground: Predicting private interactions in underground forums R Overdorf, C Troncoso, R Greenstadt, D McCoy arXiv preprint arXiv:1805.04494, 2018 | 19 | 2018 |
Tactical reframing of online disinformation campaigns against the Istanbul Convention T Elmas, R Overdorf, K Aberer arXiv preprint arXiv:2105.13398, 2021 | 17 | 2021 |
Misleading repurposing on twitter T Elmas, R Overdorf, K Aberer Proceedings of the International AAAI Conference on Web and Social Media 17 …, 2023 | 16 | 2023 |
Characterizing retweet bots: The case of black market accounts T Elmas, R Overdorf, K Aberer Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022 | 16 | 2022 |
A dataset of state-censored tweets T Elmas, R Overdorf, K Aberer Proceedings of the International AAAI Conference on Web and Social Media 15 …, 2021 | 15 | 2021 |
POTs: Protective optimization technologies R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses arXiv preprint arXiv:1806.02711, 2018 | 15 | 2018 |
Privacy-aware eye tracking: Challenges and future directions C Gressel, R Overdorf, I Hagenstedt, M Karaboga, H Lurtz, M Raschke, ... IEEE Pervasive Computing 22 (1), 95-102, 2023 | 10 | 2023 |
Stirring the POTs: protective optimization technologies S Gürses, R Overdorf, E Balsa Amsterdam University Press, 2018 | 10 | 2018 |
Disinformation from the inside: Combining machine learning and journalism to investigate sockpuppet campaigns C Schwartz, R Overdorf Companion Proceedings of the Web Conference 2020, 623-628, 2020 | 9 | 2020 |
Reaching out to aid in retention: empowering undergraduate women R Overdorf, M Lang Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 8 | 2011 |