Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Bestätigte E-Mail-Adresse bei nyu.edu
TitelZitiert vonJahr
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
International Workshop on Privacy Enhancing Technologies, 194-208, 2002
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 255-270, 2015
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
Practical attacks against authorship recognition techniques
MR Brennan, R Greenstadt
Twenty-First IAAI Conference, 2009
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment
SE Schechter, RA Greenstadt, MD Smith
Proceedings of The Second Annual Workshop on Economics and Information …, 2003
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
Myconet: A fungi-inspired model for superpeer-based peer-to-peer overlay topologies
PL Snyder, R Greenstadt, G Valetto
2009 Third IEEE International Conference on Self-Adaptive and Self …, 2009
SSDPOP: improving the privacy of DCOP with secret sharing
R Greenstadt, B Grosz, MD Smith
Proceedings of the 6th international joint conference on Autonomous agents …, 2007
Honor among thieves: A common's analysis of cybercrime economies
S Afroz, V Garg, D McCoy, R Greenstadt
2013 APWG eCrime Researchers Summit, 1-11, 2013
Cognitive security for personal devices
R Greenstadt, J Beal
Proceedings of the 1st ACM workshop on Workshop on AISec, 27-30, 2008
Multi-modal decision fusion for continuous authentication
L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ...
Computers & Electrical Engineering 41, 142-156, 2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20