Seguir
Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Email confirmado em nyu.edu
Título
Citado por
Citado por
Ano
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE symposium on security and privacy, 461-475, 2012
4412012
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
3872014
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
3092015
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
282*
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
2772011
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
2542016
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
2262003
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1812014
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Symposium, 2018
1612018
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
1322012
Practical attacks against authorship recognition techniques
MR Brennan, R Greenstadt
Twenty-First IAAI Conference, 2009
1302009
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1282017
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
1252003
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
1152013
Privacy detective: Detecting private information and collective privacy behavior in a large social network
A Caliskan Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35-46, 2014
1082014
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
1062006
Use of machine learning in big data analytics for insider threat detection
M Mayhew, M Atighetchi, A Adler, R Greenstadt
MILCOM 2015-2015 IEEE Military Communications Conference, 915-922, 2015
1012015
The tools and tactics used in intimate partner surveillance: An analysis of online infidelity forums
E Tseng, R Bellini, N McDonald, M Danos, R Greenstadt, D McCoy, N Dell, ...
29th USENIX security symposium (USENIX Security 20), 1893-1909, 2020
962020
Blogs, twitter feeds, and reddit comments: Cross-domain authorship attribution
R Overdorf, R Greenstadt
Proceedings on Privacy Enhancing Technologies, 2016
962016
Privacy, anonymity, and perceived risk in open collaboration: A study of Tor users and Wikipedians
A Forte, N Andalibi, R Greenstadt
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative …, 2017
892017
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20