Shirin Nilizadeh

Orcid: 0000-0002-0539-3742

According to our database1, Shirin Nilizadeh authored at least 43 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Vulnerabilities Unveiled: Adversarially Attacking a Multimodal Vision Language Model for Pathology Imaging.
CoRR, 2024

2023
Examining StyleGAN as a Utility-Preserving Face De-identification Method.
Proc. Priv. Enhancing Technol., October, 2023

Street Rep: A Privacy-Preserving Reputation Aggregation System.
IACR Cryptol. ePrint Arch., 2023

From Chatbots to PhishBots? - Preventing Phishing scams created using ChatGPT, Google Bard and Claude.
CoRR, 2023

Sadness, Anger, or Anxiety: Twitter Users' Emotional Responses to Toxicity in Public Conversations.
CoRR, 2023

Impact of Stricter Content Moderation on Parler's Users' Discourse.
CoRR, 2023

Exploring Gender-Based Toxic Speech on Twitter in Context of the #MeToo movement: A Mixed Methods Approach.
CoRR, 2023

Auditing Yelp's Business Ranking and Review Recommendation Through the Lens of Fairness.
CoRR, 2023

Analyzing the Stance of Facebook Posts on Abortion Considering State-level Health and Social Compositions.
CoRR, 2023

Generating Phishing Attacks using ChatGPT.
CoRR, 2023

Demystifying NFT Promotion and Phishing Scams.
CoRR, 2023

Facebook Post Credibility as a Predictor of Vaccine Hesitancy in the US.
Proceedings of the MEDINFO 2023 - The Future Is Accessible, 2023

Phishing in the Free Waters: A Study of Phishing Attacks Created using Free Website Building Services.
Proceedings of the 2023 ACM on Internet Measurement Conference, 2023

Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom's Threat.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023

SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Adaptive Matrix Pattern Steganography on RGB Images.
J. Cyber Secur. Mobil., 2022

StyleGAN as a Utility-Preserving Face De-identification Method.
CoRR, 2022

A Large-Scale Analysis of Phishing Websites Hosted on Free Web Hosting Domains.
CoRR, 2022

Understanding the Bystander Effect on Toxic Twitter Conversations.
CoRR, 2022

User Engagement and the Toxicity of Tweets.
CoRR, 2022

Twitter Users' Behavioral Response to Toxic Replies.
CoRR, 2022

Spanish Facebook Posts as an Indicator of COVID-19 Vaccine Hesitancy in Texas.
CoRR, 2022

SoK: Content Moderation in Social Media, from Guidelines to Enforcement, and Research to Practice.
CoRR, 2022

Your Tweets Matter: How Social Media Sentiments Associate with COVID-19 Vaccination Rates in the US.
CoRR, 2022

2021
The Prevalence of Cybersecurity Misinformation on Social Media: Case Studies on Phishing Reports and Zoom's Threats.
CoRR, 2021

Audio Attacks and Defenses against AED Systems - A Practical Study.
CoRR, 2021

Attacking Audio Event Detection Deep Learning Classifiers with White Noise.
Proceedings of the PETRA '21: The 14th PErvasive Technologies Related to Assistive Environments Conference, Virtual Event, Greece, 29 June, 2021

Evaluating the Effectiveness of Phishing Reports on Twitter.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

Attacks against Ranking Algorithms with Text Embeddings: A Case Study on Recruitment Algorithms.
Proceedings of the Fourth BlackboxNLP Workshop on Analyzing and Interpreting Neural Networks for NLP, 2021

2020
Measuring and Characterizing Hate Speech on News Websites.
Proceedings of the WebSci '20: 12th ACM Conference on Web Science, 2020

DifFuzz: Differential Fuzzing for Side-Channel Analysis.
Proceedings of the Software Engineering 2020, 2020

2019
Lightning Talk - Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis.
Proceedings of the World Wide Web Conference, 2019

2018
Detecting Deceptive Reviews Using Generative Adversarial Networks.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Peer to Peer Hate: Hate Speech Instigators and Their Targets.
Proceedings of the Twelfth International Conference on Web and Social Media, 2018

2017
POISED: Spotting Twitter Spam Off the Beaten Paths.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Twitter's Glass Ceiling: The Effect of Perceived Gender on Online Visibility.
Proceedings of the Tenth International Conference on Web and Social Media, 2016

2014
Community-Enhanced De-anonymization of Online Social Networks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Craigslist Scams and Community Composition: Investigating Online Fraud Victimization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

2012
DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

2011
A Decentralized Architecture for Enforcing Privacy in Online Social Networks
CoRR, 2011

Pythia: a privacy aware, peer-to-peer network for social search.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011


  Loading...