Suivre
Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Adresse e-mail validée de nyu.edu
Titre
Citée par
Citée par
Année
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE symposium on security and privacy, 461-475, 2012
4312012
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
3562014
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
2852015
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
272*
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
2502011
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
2432016
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
2242003
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1712014
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Symposium, 2018
1542018
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
1322012
Practical attacks against authorship recognition techniques
MR Brennan, R Greenstadt
Twenty-First IAAI Conference, 2009
1292009
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
1192003
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1132017
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
1072013
Privacy detective: Detecting private information and collective privacy behavior in a large social network
A Caliskan Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35-46, 2014
1052014
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
1052006
Blogs, twitter feeds, and reddit comments: Cross-domain authorship attribution
R Overdorf, R Greenstadt
Proceedings on Privacy Enhancing Technologies, 2016
952016
Use of machine learning in big data analytics for insider threat detection
M Mayhew, M Atighetchi, A Adler, R Greenstadt
MILCOM 2015-2015 IEEE Military Communications Conference, 915-922, 2015
912015
Multi-modal decision fusion for continuous authentication
L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ...
Computers & Electrical Engineering 41, 142-156, 2015
852015
Honor among thieves: A common's analysis of cybercrime economies
S Afroz, V Garg, D McCoy, R Greenstadt
2013 APWG eCrime Researchers Summit, 1-11, 2013
842013
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20