Follow
Sadia Afroz
Sadia Afroz
Avast, ICSI
Verified email at icsi.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
3282012
A Critical Evaluation of Website Fingerprinting Attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2552014
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012
2302012
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
1812011
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 212--226, 2014
1372014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
PETS'12, 299--318, 2012
1172012
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ...
1082015
Do You See What I See?: Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Network and Distributed System Security Symposium (NDSS) 2016, 2016
872016
Tools for Automated Analysis of Cybercriminal Markets
VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ...
26th International World Wide Web Conference, 2017, 2017
77*2017
Honor Among Thieves: A Common's Analysis of Cybercrime Economics
S Afroz, G Vaibhav, D McCoy, R Greenstadt
eCrime Research Summit 2013, 2013
762013
A Benchmark Study on Machine Learning Methods for Fake News Detection
JY Khan, M Khondaker, T Islam, A Iqbal, S Afroz
arXiv preprint arXiv:1905.04749, 2019
742019
Approaches to Adversarial Drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
AISec, 2013
742013
SoK: Towards Grounding Censorship Circumvention in Empiricism
MC Tschantz, S Afroz, Anonymous, V Paxson
IEEE Security and Privacy, 2016
612016
Reviewer Integration and Performance Measurement for Malware Detection
B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ...
DIMVA, 2016
612016
Breaking the Closed-World Assumption in Stylometric Authorship Attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X, 185-205, 2014
60*2014
Backpage and Bitcoin: Uncovering Human Traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
592017
Adversarial Active Learning
B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ...
AISec, 2014
592014
Robust detection of comment spam using entropy rate
A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
492012
Phishzoo: An automated web phishing detection approach based on profiling and fuzzy matching
S Afroz, R Greenstadt
Technical Report DU-CS-09-03, Drexel University, 2009
442009
Adversarially robust malware detection using monotonic classification
Í Íncer Romeo, M Theodorides, S Afroz, D Wagner
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
392018
The system can't perform the operation now. Try again later.
Articles 1–20