Follow
Sadia Afroz
Sadia Afroz
Avast, ICSI
Verified email at icsi.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Detecting hoaxes, frauds, and deception in writing style online
S Afroz, M Brennan, R Greenstadt
2012 IEEE Symposium on Security and Privacy, 461-475, 2012
4392012
A Critical Evaluation of Website Fingerprinting Attacks
M Juarez, S Afroz, G Acar, C Diaz, R Greenstadt
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3662014
A benchmark study of machine learning models for online fake news detection
JY Khan, MTI Khondaker, S Afroz, G Uddin, A Iqbal
Machine Learning with Applications 4, 100032, 2021
3052021
Phishzoo: Detecting phishing websites by looking at them
S Afroz, R Greenstadt
2011 IEEE fifth international conference on semantic computing, 368-375, 2011
299*2011
Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity
M BRENNAN, S AFROZ, R GREENSTADT
ACM Transactions on Information and System Security (TISSEC) 15 (3), 12:1--12:22, 2012
2752012
Doppelgänger Finder: Taking Stylometry To The Underground
S Afroz, A Caliskan-Islam, A Stolerman, R Greenstadt, D McCoy
IEEE Symposium on Security and Privacy, 212--226, 2014
1732014
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
A Kantchelian, MC Tschantz, S Afroz, B Miller, V Shankar, R Bachwani, ...
1362015
Use Fewer Instances of the Letter “i”: Toward Writing Style Anonymization
AWE McDonald, S Afroz, A Caliskan, A Stolerman, R Greenstadt
PETS'12, 299--318, 2012
1342012
Approaches to Adversarial Drift
A Kantchelian, S Afroz, L Huang, AC Islam, B Miller, MC Tschantz, ...
AISec, 2013
1112013
Tools for Automated Analysis of Cybercriminal Markets
VP Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld ...
26th International World Wide Web Conference, 2017, 2017
108*2017
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware
W Song, X Li, S Afroz, D Garg, D Kuznetsov, H Yin
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
101*2022
Do You See What I See?: Differential Treatment of Anonymous Users
S Khattak, D Fifield, S Afroz, M Javed, S Sundaresan, V Paxson, ...
Network and Distributed System Security Symposium (NDSS) 2016, 2016
992016
Reviewer Integration and Performance Measurement for Malware Detection
B Miller, A Kantchelian, MC Tschantz, S Afroz, R Bachwani, ...
DIMVA, 2016
922016
Backpage and Bitcoin: Uncovering Human Traffickers
RS Portnoff, DY Huang, P Doerfler, S Afroz, D McCoy
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2017
912017
SoK: Towards Grounding Censorship Circumvention in Empiricism
MC Tschantz, S Afroz, Anonymous, V Paxson
IEEE Security and Privacy, 2016
872016
Honor Among Thieves: A Common's Analysis of Cybercrime Economics
S Afroz, G Vaibhav, D McCoy, R Greenstadt
eCrime Research Summit 2013, 2013
842013
Adversarial Active Learning
B Miller, A Kantchelian, S Afroz, R Bachwani, E Dauber, L Huang, ...
AISec, 2014
822014
Breaking the Closed-World Assumption in Stylometric Authorship Attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
Advances in Digital Forensics X, 185-205, 2014
74*2014
Adversarially robust malware detection using monotonic classification
Í Íncer Romeo, M Theodorides, S Afroz, D Wagner
Proceedings of the Fourth ACM International Workshop on Security and Privacy …, 2018
642018
Robust detection of comment spam using entropy rate
A Kantchelian, J Ma, L Huang, S Afroz, A Joseph, JD Tygar
Proceedings of the 5th ACM workshop on Security and artificial intelligence …, 2012
552012
The system can't perform the operation now. Try again later.
Articles 1–20