Sadia Afroz
Sadia Afroz
Avast, ICSI
Verified email at icsi.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
2882012
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012
2022012
A Critical Evaluation of Website Fingerprinting Attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2002014
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
1582011
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 212--226, 2014
1172014
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
PETS'12, 299--318, 2012
962012
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ...
802015
Do You See What I See?: Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Network and Distributed System Security Symposium (NDSS) 2016, 2016
792016
Approaches to Adversarial Drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
AISec, 2013
692013
Tools for Automated Analysis of Cybercriminal Markets
VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ...
26th International World Wide Web Conference, 2017, 2017
59*2017
Honor Among Thieves: A Common's Analysis of Cybercrime Economics
S Afroz, G Vaibhav, D McCoy, R Greenstadt
eCrime Research Summit 2013, 2013
552013
Adversarial Active Learning
B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ...
AISec, 2014
532014
SoK: Towards Grounding Censorship Circumvention in Empiricism
MC Tschantz, S Afroz, Anonymous, V Paxson
IEEE Security and Privacy, 2016
492016
Breaking the Closed-World Assumption in Stylometric Authorship Attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X, 185-205, 2014
49*2014
Backpage and Bitcoin: Uncovering Human Traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
482017
Robust detection of comment spam using entropy rate
A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
462012
Reviewer Integration and Performance Measurement for Malware Detection
B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ...
DIMVA, 2016
442016
Phishzoo: An automated web phishing detection approach based on profiling and fuzzy matching
S Afroz, R Greenstadt
Technical Report DU-CS-09-03, Drexel University, 2009
392009
A Benchmark Study on Machine Learning Methods for Fake News Detection
JY Khan, M Khondaker, T Islam, A Iqbal, S Afroz
arXiv preprint arXiv:1905.04749, 2019
352019
Characterizing the Nature and Dynamics of Tor Exit Blocking
R Singh, R Nithyanand, S Afroz, P Pearce, MC Tschantz, P Gill, V Paxson
26th USENIX Security Symposium (USENIX Security 17), 2017
322017
The system can't perform the operation now. Try again later.
Articles 1–20