Folgen
Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Bestätigte E-Mail-Adresse bei nyu.edu
Titel
Zitiert von
Zitiert von
Jahr
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
3322012
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2612014
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
231*
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
2262016
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
2192015
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
International Workshop on Privacy Enhancing Technologies, 194-208, 2002
1992002
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
1862011
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1392014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
1172012
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Symposium, 2018
1162018
Practical attacks against authorship recognition techniques
MR Brennan, R Greenstadt
Twenty-First IAAI Conference, 2009
1142009
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
1062003
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
1022006
Privacy detective: Detecting private information and collective privacy behavior in a large social network
A Caliskan Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35-46, 2014
842014
Honor among thieves: A common's analysis of cybercrime economies
S Afroz, V Garg, D McCoy, R Greenstadt
2013 APWG eCrime Researchers Summit, 1-11, 2013
772013
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
762013
Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment
SE Schechter, RA Greenstadt, MD Smith
Economics of Information Security, 59-69, 2004
742004
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
R Overdorf, R Greenstadt
Proc. Priv. Enhancing Technol. 2016 (3), 155-171, 2016
732016
Use of machine learning in big data analytics for insider threat detection
M Mayhew, M Atighetchi, A Adler, R Greenstadt
MILCOM 2015-2015 IEEE Military Communications Conference, 915-922, 2015
712015
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
European Symposium on Research in Computer Security, 65-82, 2017
702017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20