Follow
Shahryar Baki
Title
Cited by
Cited by
Year
SoK: a comprehensive reexamination of phishing research from the security perspective
A Das, S Baki, A El Aassal, R Verma, A Dunbar
IEEE Communications Surveys & Tutorials 22 (1), 671-708, 2019
1362019
An in-depth benchmarking and evaluation of phishing detection research for security needs
A El Aassal, S Baki, A Das, RM Verma
Ieee Access 8, 22170-22192, 2020
1072020
Scaling and effectiveness of email masquerade attacks: Exploiting natural language generation
S Baki, R Verma, A Mukherjee, O Gnawali
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
502017
Sixteen years of phishing user studies: What have we learned?
S Baki, RM Verma
IEEE Transactions on Dependable and Secure Computing 20 (2), 1200-1212, 2022
272022
University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity
L Moraes, S Baki, R Verma, D Lee
proceedings of the joint workshop on bibliometric-enhanced information …, 2016
272016
Anti-Phishing Pilot at ACM IWSPA 2018 Evaluating Performance with New Metrics for Unbalanced Datasets
A El Aassal, L Moraes, S Baki, A Das, R Verma
Proceedings of the 1st AntiPhishing Shared Pilot at 4th ACM International …, 2018
252018
Diverse datasets and a customizable benchmarking framework for phishing
V Zeng, S Baki, AE Aassal, R Verma, LFT De Moraes, A Das
Proceedings of the Sixth International Workshop on Security and Privacy …, 2020
152020
Avisha Das, and Rakesh M
A El Aassal, S Baki
Verma." An in-depth benchmarking and evaluation of phishing detection …, 2020
122020
IWSPA-AP: Anti-phising Shared Task at ACM International Workshop on Security and Privacy Analytics
A Elaassal, A Das, S Baki, L De Moraes, R Verma
In Proceedings of the 1st IWSPA Anti-Phishing Shared Task. CEUR, 2018
10*2018
Scam augmentation and customization: Identifying vulnerable users and arming defenders
S Baki, RM Verma, O Gnawali
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
72020
PhishBench 2.0: a versatile and extendable benchmarking framework for phishing
V Zeng, X Zhou, S Baki, RM Verma
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
62020
Identifying reference spans: topic modeling and word embeddings help IR
L Moraes, S Baki, R Verma, D Lee
International Journal on Digital Libraries 19, 191-202, 2018
62018
Mining the Web for Collocations: IR Models of Term Associations
R Verma, V Vuppuluri, A Nguyen, A Mukherjee, G Mammar, S Baki, ...
International Conference on Intelligent Text Processing and Computational …, 2016
52016
Less is more: Exploiting social trust to increase the effectiveness of a deception attack
S Baki, RM Verma, A Mukherjee, O Gnawali
arXiv preprint arXiv:2006.13499, 2020
32020
ICE: Idiom and collocation extractor for research and education
V Vuppuluri, S Baki, A Nguyen, R Verma
Proceedings of the Software Demonstrations of the 15th Conference of the …, 2017
32017
You Are Not Alone: Helping Users Not to Fall For Phishing
S Baki
2020
The system can't perform the operation now. Try again later.
Articles 1–16