Rachel Greenstadt
Orcid: 0000-0002-1831-1785
According to our database1,
Rachel Greenstadt
authored at least 90 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites.
Proc. Priv. Enhancing Technol., 2024
Proc. ACM Hum. Comput. Interact., 2024
From User Insights to Actionable Metrics: A User-Focused Evaluation of Privacy-Preserving Browser Extensions.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Proc. Priv. Enhancing Technol., April, 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
"I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
"It Feels Like Whack-a-mole": User Experiences of Data Removal from People Search Websites.
Proc. Priv. Enhancing Technol., 2022
The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions.
Proc. ACM Hum. Comput. Interact., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
2021
Proc. Priv. Enhancing Technol., 2021
Proceedings of the IMC '21: ACM Internet Measurement Conference, 2021
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021
Proceedings of the Working Notes of CLEF 2021 - Conference and Labs of the Evaluation Forum, Bucharest, Romania, September 21st - to, 2021
2020
"So-called privacy breeds evil": Narrative Justifications for Intimate Partner Surveillance in Online Forums.
Proc. ACM Hum. Comput. Interact., 2020
CoRR, 2020
The Pod People: Understanding Manipulation of Social Media Popularity via Reciprocity Abuse.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Proceedings of the 29th USENIX Security Symposium, 2020
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Exploring Paraphrasing Techniques on Formal Language for Generating Semantics Preserving Source Code Transformations.
Proceedings of the IEEE 14th International Conference on Semantic Computing, 2020
Feature Vector Difference based Neural Network and Logistic Regression Models for Authorship Verification.
Proceedings of the Working Notes of CLEF 2020, 2020
2019
"Because... I was told... so much": Linguistic Indicators of Mental Health Status on Twitter.
Proc. Priv. Enhancing Technol., 2019
Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments.
Proc. Priv. Enhancing Technol., 2019
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users.
Proc. ACM Hum. Comput. Interact., 2019
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Service Providers.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
CoRR, 2018
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Git blame who?: stylistic authorship attribution of small, incomplete source code fragments.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
2017
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location.
IEEE Syst. J., 2017
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians.
Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proc. Priv. Enhancing Technol., 2016
2015
Comput. Electr. Eng., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
2014
Privacy Detective: Detecting Private Information and Collective Privacy Behavior in a Large Social Network.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Advances in Digital Forensics X, 2014
Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion.
Proceedings of the Advances in Digital Forensics X, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 9th International Symposium on Open Collaboration, Hong Kong, China, August 05, 2013
Proceedings of the 78th IEEE Vehicular Technology Conference, 2013
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013
From Language to Family and Back: Native Language and Language Family Identification from English Text.
Proceedings of the Human Language Technologies: Conference of the North American Chapter of the Association of Computational Linguistics, 2013
Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the Advances in Digital Forensics IX, 2013
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the 47th Annual Conference on Information Sciences and Systems, 2013
2012
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity.
ACM Trans. Inf. Syst. Secur., 2012
Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text.
Proceedings of the Sixth IEEE International Conference on Semantic Computing, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
2011
Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011
2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the Bridging the Gap Between Task and Motion Planning, 2010
Proceedings of the Collaboratively-Built Knowledge Sources and Artificial Intelligence, 2010
2009
Proceedings of the Third IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2009
Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, 2009
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009
Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, 2008
2007
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007
2006
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
Proceedings of the Proceedings, 2006
2005
Proceedings of the 4th Annual Workshop on the Economics of Information Security, 2005
2004
Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market.
Proceedings of the Economics of Information Security, 2004
Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment.
Proceedings of the Economics of Information Security, 2004
2003
Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
Proceedings of the 5th International Conference on Electronic Commerce, 2003
2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002