Detecting hoaxes, frauds, and deception in writing style online S Afroz, M Brennan, R Greenstadt 2012 IEEE Symposium on Security and Privacy, 461-475, 2012 | 436 | 2012 |
A Critical Evaluation of Website Fingerprinting Attacks M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 373 | 2014 |
A benchmark study of machine learning models for online fake news detection JY Khan, MTI Khondaker, S Afroz, G Uddin, A Iqbal Machine Learning with Applications 4, 100032, 2021 | 311 | 2021 |
Phishzoo: Detecting phishing websites by looking at them S Afroz, R Greenstadt 2011 IEEE fifth international conference on semantic computing, 368-375, 2011 | 305* | 2011 |
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity M BRENNAN, S AFROZ, R GREENSTADT ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012 | 274 | 2012 |
Doppelgänger Finder: Taking Stylometry To The Underground S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy IEEE Symposium on Security and Privacy, 212--226, 2014 | 175 | 2014 |
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ... | 134 | 2015 |
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt PETS'12, 299--318, 2012 | 130 | 2012 |
Approaches to Adversarial Drift A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ... AISec, 2013 | 111 | 2013 |
Tools for Automated Analysis of Cybercriminal Markets VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ... 26th International World Wide Web Conference, 2017, 2017 | 108* | 2017 |
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware W Song, X Li, S Afroz, D Garg, D Kuznetsov, H Yin Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 101* | 2022 |
Do You See What I See?: Differential Treatment of Anonymous Users S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ... Network and Distributed System Security Symposium (NDSS) 2016, 2016 | 96 | 2016 |
Reviewer Integration and Performance Measurement for Malware Detection B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ... DIMVA, 2016 | 94 | 2016 |
Backpage and Bitcoin: Uncovering Human Traffickers RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017 | 92 | 2017 |
SoK: Towards Grounding Censorship Circumvention in Empiricism MC Tschantz, S Afroz, Anonymous, V Paxson IEEE Security and Privacy, 2016 | 87 | 2016 |
Honor Among Thieves: A Common's Analysis of Cybercrime Economics S Afroz, G Vaibhav, D McCoy, R Greenstadt eCrime Research Summit 2013, 2013 | 85 | 2013 |
Adversarial Active Learning B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ... AISec, 2014 | 84 | 2014 |
Breaking the Closed-World Assumption in Stylometric Authorship Attribution A Stolerman, R Overdorf, S Afroz, R Greenstadt Advances in Digital Forensics X, 185-205, 2014 | 76* | 2014 |
Adversarially robust malware detection using monotonic classification Í Íncer Romeo, M Theodorides, S Afroz, D Wagner Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018 | 67 | 2018 |
Robust detection of comment spam using entropy rate A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012 | 55 | 2012 |