Suivre
Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Adresse e-mail validée de nyu.edu
Titre
Citée par
Citée par
Année
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
4242012
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3572014
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th USENIX security symposium (USENIX Security 15), 255-270, 2015
2792015
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
262*
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
2482011
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
2422016
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
Privacy Enhancing Technologies: Second International Workshop, PET 2002 San …, 2003
2262003
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
1672014
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
Network and Distributed System Symposium, 2018
1512018
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
1322012
Practical attacks against authorship recognition techniques.
MR Brennan, R Greenstadt
IAAI, 2009
1272009
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
1202003
Source code authorship attribution using long short-term memory based networks
B Alsulami, E Dauber, R Harang, S Mancoridis, R Greenstadt
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
1082017
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
1052013
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
1042006
Privacy detective: Detecting private information and collective privacy behavior in a large social network
A Caliskan Islam, J Walsh, R Greenstadt
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 35-46, 2014
1012014
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
R Overdorf, R Greenstadt
Proc. Priv. Enhancing Technol. 2016 (3), 155-171, 2016
952016
Use of machine learning in big data analytics for insider threat detection
M Mayhew, M Atighetchi, A Adler, R Greenstadt
MILCOM 2015-2015 IEEE Military Communications Conference, 915-922, 2015
902015
Honor among thieves: A common's analysis of cybercrime economies
S Afroz, V Garg, D McCoy, R Greenstadt
2013 APWG eCrime Researchers Summit, 1-11, 2013
852013
Multi-modal decision fusion for continuous authentication
L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ...
Computers & Electrical Engineering 41, 142-156, 2015
842015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20