Rachel Greenstadt

Orcid: 0000-0002-1831-1785

According to our database1, Rachel Greenstadt authored at least 87 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Challenges in Restructuring Community-based Moderation.
CoRR, 2024

2023
Intersectional Thinking about PETs: A Study of Library Privacy.
Proc. Priv. Enhancing Technol., April, 2023

Can deepfakes be created by novice users?
CoRR, 2023

Can Deepfakes be created on a whim?
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology.
Proceedings of the 32nd USENIX Security Symposium, 2023

How Library IT Staff Navigate Privacy and Security Challenges and Responsibilities.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Proc. Priv. Enhancing Technol., 2022

The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions.
Proc. ACM Hum. Comput. Interact., 2022

Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Using Authorship Verification to Mitigate Abuse in Online Communities.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

2021
Supervised Authorship Segmentation of Open Source Code Projects.
Proc. Priv. Enhancing Technol., 2021

A large-scale characterization of online incitements to harassment across platforms.
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021

Feature Vector Difference based Authorship Verification for Open-World Settings.
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021

Writing Style Change Detection on Multi-Author Documents.
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021

2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain.
CoRR, 2020

The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020

Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations.
Proceedings of the IEEE 14th International Conference on Semantic Computing, 2020

Feature Vector Difference based Neural Network and Logistic Regression Models for Authorship Verification.
Proceedings of the Working Notes of CLEF 2020, 2020

2019
"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter.
Proc. Priv. Enhancing Technol., 2019

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments.
Proc. Priv. Enhancing Technol., 2019

A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users.
Proc. ACM Hum. Comput. Interact., 2019

Tor Users Contributing to Wikipedia: Just Like Everybody Else?
CoRR, 2019

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
Editors' Introduction.
Proc. Priv. Enhancing Technol., 2018

Under the Underground: Predicting Private Interactions in Underground Forums.
CoRR, 2018

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Git blame who?: stylistic authorship attribution of small, incomplete source code fragments.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

2017
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location.
IEEE Syst. J., 2017

Editors' Introduction.
Proc. Priv. Enhancing Technol., 2017

Using Stylometry to Attribute Programmers and Writers.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.
Proceedings of the Computer Security - ESORICS 2017, 2017

Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017

Stylometric Authorship Attribution of Collaborative Documents.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
Proc. Priv. Enhancing Technol., 2016

2015
Multi-modal decision fusion for continuous authentication.
Comput. Electr. Eng., 2015

De-anonymizing Programmers via Code Stylometry.
Proceedings of the 24th USENIX Security Symposium, 2015

Use of machine learning in big data analytics for insider threat detection.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Computer-Supported Cooperative Crime.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Doppelgänger Finder: Taking Stylometry to the Underground.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Breaking the Closed-World Assumption in Stylometric Authorship Attribution.
Proceedings of the Advances in Digital Forensics X, 2014

Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion.
Proceedings of the Advances in Digital Forensics X, 2014

A Critical Evaluation of Website Fingerprinting Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Keyboard-Behavior-Based Authentication.
IT Prof., 2013

Decision Fusion for Multimodal Active Authentication.
IT Prof., 2013

Reconfigurable Antenna Assisted Intrusion Detection in Wireless Networks.
Int. J. Distributed Sens. Networks, 2013

The illiterate editor: metadata-driven revert detection in Wikipedia.
Proceedings of the 9th International Symposium on Open Collaboration, Hong Kong, China, August 05, 2013

GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme.
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013

How Privacy Flaws Affect Consumer Perception.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

From Language to Family and Back: Native Language and Language Family Identification from English Text.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2013

Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Towards Active Linguistic Authentication.
Proceedings of the Advances in Digital Forensics IX, 2013

Honor among thieves: A common's analysis of cybercrime economies.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Assessing trustworthiness in collaborative environments.
Proceedings of the Cyber Security and Information Intelligence, 2013

User authentication through biometric sensors and decision fusion.
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013


2012
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity.
ACM Trans. Inf. Syst. Secur., 2012

Privacy in Online Review Sites.
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012

Detecting Hoaxes, Frauds, and Deception in Writing Style Online.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text.
Proceedings of the Sixth IEEE International Conference on Semantic Computing, 2012

Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

PhishZoo: Detecting Phishing Websites by Looking at Them.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

2010
Using machine learning to augment collaborative filtering of community discussions.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

A Travel-Time Optimizing Edge Weighting Scheme for Dynamic Re-Planning.
Proceedings of the Bridging the Gap Between Task and Motion Planning, 2010

Learning to Extract Quality Discourse in Online Communities.
Proceedings of the Collaboratively-Built Knowledge Sources and Artificial Intelligence, 2010

2009
Myconet: A Fungi-Inspired Model for Superpeer-Based Peer-to-Peer Overlay Topologies.
Proceedings of the Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2009

Practical Attacks Against Authorship Recognition Techniques.
Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, 2009

Mixed-initiative security agents.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009

An overview of privacy improvements to k-optimal DCOP algorithms.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

Reinterpreting the Disclosure Debate for Web Infections.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
Reinterpreting the Disclosure Debate for Web Infections.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Cognitive security for personal devices.
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008

2007
SSDPOP: improving the privacy of DCOP with secret sharing.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007

2006
Collaborative Scheduling: Threats and Promises.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Experimental analysis of privacy loss in DCOP algorithms.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Analysis of Privacy Loss in Distributed Constraint Optimization.
Proceedings of the Proceedings, 2006

Privatizing Constraint Optimization.
Proceedings of the Proceedings, 2006

2005
Protecting Personal Information: Obstacles and Directions.
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005

2004
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market.
Proceedings of the Economics of Information Security, 2004

Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.
Proceedings of the Economics of Information Security, 2004

2003
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
Proceedings of the 5th International Conference on Electronic Commerce, 2003

2002
Covert Messaging through TCP Timestamps.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002


  Loading...