Follow
Rebekah Overdorf
Rebekah Overdorf
Verified email at unil.ch
Title
Cited by
Cited by
Year
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
R Overdorf, R Greenstadt
Proc. Priv. Enhancing Technol. 2016 (3), 155-171, 2016
942016
How unique is your. onion? an analysis of the fingerprintability of tor onion services
R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
782017
POTs: protective optimization technologies
B Kulynych, R Overdorf, C Troncoso, S Gürses
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
642020
Ephemeral astroturfing attacks: The case of fake twitter trends
T Elmas, R Overdorf, AF Özkalay, K Aberer
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 403-422, 2021
49*2021
Breaking the closed-world assumption in stylometric authorship attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X: 10th IFIP WG 11.9 International Conference …, 2014
402014
Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
IFIP Working Group 11, 64, 2013
352013
Computer-supported cooperative crime
V Garg, S Afroz, R Overdorf, R Greenstadt
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
252015
Stylometric authorship attribution of collaborative documents
E Dauber, R Overdorf, R Greenstadt
Cyber Security Cryptography and Machine Learning: First International …, 2017
242017
Questioning the assumptions behind fairness solutions
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1811.11293, 2018
202018
POTs: The revolution will not be optimized
S Gürses, R Overdorf, E Balsa
arXiv preprint arXiv:1806.02711, 2018
162018
Under the underground: Predicting private interactions in underground forums
R Overdorf, C Troncoso, R Greenstadt, D McCoy
arXiv preprint arXiv:1805.04494, 2018
162018
POTs: Protective optimization technologies
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1806.02711, 2018
142018
Misleading repurposing on twitter
T Elmas, R Overdorf, K Aberer
Proceedings of the International AAAI Conference on Web and Social Media 17 …, 2023
122023
Tactical reframing of online disinformation campaigns against the istanbul convention
T Elmas, R Overdorf, K Aberer
arXiv preprint arXiv:2105.13398, 2021
122021
A dataset of state-censored tweets
T Elmas, R Overdorf, K Aberer
Proceedings of the International AAAI Conference on Web and Social Media 15 …, 2021
122021
Characterizing retweet bots: The case of black market accounts
T Elmas, R Overdorf, K Aberer
Proceedings of the International AAAI Conference on Web and Social Media 16 …, 2022
102022
Stirring the pots: protective optimization technologies
S Gürses, R Overdorf, E Balsa
Amsterdam University Press, 2018
92018
Reaching out to aid in retention: empowering undergraduate women
R Overdorf, M Lang
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
82011
Disinformation from the inside: Combining machine learning and journalism to investigate sockpuppet campaigns
C Schwartz, R Overdorf
Companion Proceedings of the Web Conference 2020, 623-628, 2020
72020
Can Celebrities Burst Your Bubble?
T Elmas, K Hardi, R Overdorf, K Aberer
arXiv preprint arXiv:2003.06857, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20