Sadia Afroz

Orcid: 0000-0002-8427-0635

Affiliations:
  • University of California Berkeley, ICSI, USA
  • Avast Software, USA


According to our database1, Sadia Afroz authored at least 46 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Art of Cybercrime Community Research.
ACM Comput. Surv., June, 2024

2022
Explaining Website Reliability by Visualizing Hyperlink Connectivity.
CoRR, 2022

Domain-Level Detection and Disruption of Disinformation.
CoRR, 2022

PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies.
IEEE Access, 2022

Explaining Website Reliability by Visualizing Hyperlink Connectivity.
Proceedings of the 2022 IEEE Visualization and Visual Analytics (VIS), 2022

MisVis: Explaining Web Misinformation Connections via Visual Summary.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Mutual Hyperlinking Among Misinformation Peddlers.
CoRR, 2021

2020
Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers.
CoRR, 2020

Quantifying the Impact of Blocklisting in the Age of Address Reuse.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

AISec'20: 13th Workshop on Artificial Intelligence and Security.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
A Benchmark Study on Machine Learning Methods for Fake News Detection.
CoRR, 2019

Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains.
Proceedings of the 2019 APWG Symposium on Electronic Crime Research, 2019

AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Towards Automatic Discovery of Cybercrime Supply Chains.
CoRR, 2018

Exploring Server-side Blocking of Regions.
CoRR, 2018

A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Adversarially Robust Malware Detection Using Monotonic Classification.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018

11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Session details: Keynote Address.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

2017
Tools for Automated Analysis of Cybercriminal Markets.
Proceedings of the 26th International Conference on World Wide Web, 2017

Characterizing the Nature and Dynamics of Tor Exit Blocking.
Proceedings of the 26th USENIX Security Symposium, 2017

Backpage and Bitcoin: Uncovering Human Traffickers.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation.
Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, 2017

2016
SoK: Towards Grounding Censorship Circumvention in Empiricism.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Do You See What I See? Differential Treatment of Anonymous Users.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Profiling underground merchants based on network behavior.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Reviewer Integration and Performance Measurement for Malware Detection.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR, 2015

Computer-Supported Cooperative Crime.
Proceedings of the Financial Cryptography and Data Security, 2015

Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, 2015

2014
On Modeling the Costs of Censorship.
CoRR, 2014

Doppelgänger Finder: Taking Stylometry to the Underground.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Breaking the Closed-World Assumption in Stylometric Authorship Attribution.
Proceedings of the Advances in Digital Forensics X, 2014

Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop, 2014

A Critical Evaluation of Website Fingerprinting Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
How Privacy Flaws Affect Consumer Perception.
Proceedings of the Third Workshop on Socio-Technical Aspects in Security and Trust, 2013

Honor among thieves: A common's analysis of cybercrime economies.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013


2012
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity.
ACM Trans. Inf. Syst. Secur., 2012

Detecting Hoaxes, Frauds, and Deception in Writing Style Online.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Robust detection of comment spam using entropy rate.
Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, 2012

LexOnt: A Semi-Automatic Ontology Creation Tool for Programmable Web.
Proceedings of the Intelligent Web Services Meet Social Computing, 2012

2011
PhishZoo: Detecting Phishing Websites by Looking at Them.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

2009
Mixed-initiative security agents.
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, 2009


  Loading...