关注
Sadia Afroz
Sadia Afroz
Avast, ICSI
在 icsi.berkeley.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
4362012
A Critical Evaluation of Website Fingerprinting Attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3732014
A benchmark study of machine learning models for online fake news detection
JY Khan, MTI Khondaker, S Afroz, G Uddin, A Iqbal
Machine Learning with Applications 4, 100032, 2021
3112021
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
305*2011
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012
2742012
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 212--226, 2014
1752014
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ...
1342015
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
PETS'12, 299--318, 2012
1302012
Approaches to Adversarial Drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
AISec, 2013
1112013
Tools for Automated Analysis of Cybercriminal Markets
VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ...
26th International World Wide Web Conference, 2017, 2017
108*2017
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W Song, X Li, S Afroz, D Garg, D Kuznetsov, H Yin
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
101*2022
Do You See What I See?: Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Network and Distributed System Security Symposium (NDSS) 2016, 2016
962016
Reviewer Integration and Performance Measurement for Malware Detection
B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ...
DIMVA, 2016
942016
Backpage and Bitcoin: Uncovering Human Traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
922017
SoK: Towards Grounding Censorship Circumvention in Empiricism
MC Tschantz, S Afroz, Anonymous, V Paxson
IEEE Security and Privacy, 2016
872016
Honor Among Thieves: A Common's Analysis of Cybercrime Economics
S Afroz, G Vaibhav, D McCoy, R Greenstadt
eCrime Research Summit 2013, 2013
852013
Adversarial Active Learning
B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ...
AISec, 2014
842014
Breaking the Closed-World Assumption in Stylometric Authorship Attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X, 185-205, 2014
76*2014
Adversarially robust malware detection using monotonic classification
Í Íncer Romeo, M Theodorides, S Afroz, D Wagner
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
672018
Robust detection of comment spam using entropy rate
A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
552012
系统目前无法执行此操作,请稍后再试。
文章 1–20