Rachel Greenstadt
Rachel Greenstadt
Computer Science and Engineering Department, New York University
Verified email at nyu.edu
TitleCited byYear
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
Covert messaging through TCP timestamps
J Giffin, R Greenstadt, P Litwack, R Tibbetts
International Workshop on Privacy Enhancing Technologies, 194-208, 2002
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
ACM Transactions on Information and System Security (TISSEC) 15 (3), 0
A critical evaluation of website fingerprinting attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location
L Fridman, S Weber, R Greenstadt, M Kam
IEEE Systems Journal 11 (2), 513-521, 2016
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE Fifth International Conference on Semantic Computing, 368-375, 2011
De-anonymizing programmers via code stylometry
A Caliskan-Islam, R Harang, A Liu, A Narayanan, C Voss, F Yamaguchi, ...
24th {USENIX} Security Symposium ({USENIX} Security 15), 255-270, 2015
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market
T Vila, R Greenstadt, D Molnar
Proceedings of the 5th international conference on Electronic commerce, 403-407, 2003
Practical attacks against authorship recognition techniques
MR Brennan, R Greenstadt
Twenty-First IAAI Conference, 2009
Analysis of privacy loss in distributed constraint optimization
R Greenstadt, JP Pearce, M Tambe
AAAI 6, 647-653, 2006
Doppelgänger finder: Taking stylometry to the underground
S Afroz, AC Islam, A Stolerman, R Greenstadt, D McCoy
2014 IEEE Symposium on Security and Privacy, 212-226, 2014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
A McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
Privacy Enhancing Technologies, 299-318, 2012
Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment
SE Schechter, RA Greenstadt, MD Smith
Proceedings of The Second Annual Workshop on Economics and Information …, 2003
Approaches to adversarial drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
When coding style survives compilation: De-anonymizing programmers from executable binaries
A Caliskan, F Yamaguchi, E Dauber, R Harang, K Rieck, R Greenstadt, ...
arXiv preprint arXiv:1512.08546, 2015
Myconet: A fungi-inspired model for superpeer-based peer-to-peer overlay topologies
PL Snyder, R Greenstadt, G Valetto
2009 Third IEEE International Conference on Self-Adaptive and Self …, 2009
Cognitive security for personal devices
R Greenstadt, J Beal
Proceedings of the 1st ACM workshop on Workshop on AISec, 27-30, 2008
SSDPOP: improving the privacy of DCOP with secret sharing
R Greenstadt, B Grosz, MD Smith
Proceedings of the 6th international joint conference on Autonomous agents …, 2007
Honor among thieves: A common's analysis of cybercrime economies
S Afroz, V Garg, D McCoy, R Greenstadt
2013 APWG eCrime Researchers Summit, 1-11, 2013
Multi-modal decision fusion for continuous authentication
L Fridman, A Stolerman, S Acharya, P Brennan, P Juola, R Greenstadt, ...
Computers & Electrical Engineering 41, 142-156, 2015
The system can't perform the operation now. Try again later.
Articles 1–20