Sadia Afroz
Sadia Afroz
Avast, ICSI
Verified email at icsi.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
2342012
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012
1662012
A Critical Evaluation of Website Fingerprinting Attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1632014
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
1292011
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 212--226, 2014
982014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
PETS'12, 299--318, 2012
842012
Approaches to Adversarial Drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
AISec, 2013
642013
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ...
612015
Do You See What I See?: Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Network and Distributed System Security Symposium (NDSS) 2016, 2016
592016
Honor Among Thieves: A Common's Analysis of Cybercrime Economics
S Afroz, G Vaibhav, D McCoy, R Greenstadt
eCrime Research Summit 2013, 2013
482013
Tools for Automated Analysis of Cybercriminal Markets
VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ...
26th International World Wide Web Conference, 2017, 2017
43*2017
Adversarial Active Learning
B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ...
AISec, 2014
432014
Robust detection of comment spam using entropy rate
A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
422012
Breaking the Closed-World Assumption in Stylometric Authorship Attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X, 185-205, 2014
41*2014
SoK: Towards Grounding Censorship Circumvention in Empiricism
MC Tschantz, S Afroz, Anonymous, V Paxson
IEEE Security and Privacy, 2016
402016
Phishzoo: An automated web phishing detection approach based on profiling and fuzzy matching
S Afroz, R Greenstadt
Technical Report DU-CS-09-03, Drexel University, 2009
372009
Reviewer Integration and Performance Measurement for Malware Detection
B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ...
DIMVA, 2016
342016
Backpage and Bitcoin: Uncovering Human Traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
322017
Characterizing the Nature and Dynamics of Tor Exit Blocking
R Singh, R Nithyanand, S Afroz, P Pearce, MC Tschantz, P Gill, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 2017
232017
Lexont: A semi-automatic ontology creation tool for programmable web
K Arabshian, P Danielsen, S Afroz
2012 AAAI Spring Symposium Series, 2012
212012
The system can't perform the operation now. Try again later.
Articles 1–20