Blogs, twitter feeds, and reddit comments: Cross-domain authorship attribution R Overdorf, R Greenstadt Proceedings on Privacy Enhancing Technologies 2016 (3), 155-171, 2016 | 45 | 2016 |
How unique is your. onion? an analysis of the fingerprintability of tor onion services R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 36 | 2017 |
Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution A Stolerman, R Overdorf, S Afroz, R Greenstadt IFIP Working Group 11, 64, 2013 | 25 | 2013 |
Breaking the closed-world assumption in stylometric authorship attribution A Stolerman, R Overdorf, S Afroz, R Greenstadt IFIP International Conference on Digital Forensics, 185-205, 2014 | 21 | 2014 |
Computer-supported cooperative crime V Garg, S Afroz, R Overdorf, R Greenstadt International Conference on Financial Cryptography and Data Security, 32-43, 2015 | 17 | 2015 |
POTs: protective optimization technologies B Kulynych, R Overdorf, C Troncoso, S Gürses Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020 | 13 | 2020 |
Questioning the assumptions behind fairness solutions R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses arXiv preprint arXiv:1811.11293, 2018 | 13 | 2018 |
Stylometric authorship attribution of collaborative documents E Dauber, R Overdorf, R Greenstadt International Conference on Cyber Security Cryptography and Machine Learning …, 2017 | 11 | 2017 |
POTs: Protective optimization technologies R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses arXiv preprint arXiv:1806.02711, 2018 | 10 | 2018 |
POTs: The revolution will not be optimized S Gurses, R Overdorf, E Balsa 11th Hot Topics in Privacy Enhancing Technologies (HotPETs), 2018 | 9 | 2018 |
Under the underground: Predicting private interactions in underground forums R Overdorf, C Troncoso, R Greenstadt, D McCoy arXiv preprint arXiv:1805.04494, 2018 | 8 | 2018 |
Reaching out to aid in retention: empowering undergraduate women R Overdorf, M Lang Proceedings of the 42nd ACM technical symposium on Computer science …, 2011 | 4 | 2011 |
Lateral Astroturfing Attacks on Twitter Trending Topics T Elmas, R Overdorf, AF Özkalay, K Aberer arXiv preprint arXiv:1910.07783, 2019 | 3 | 2019 |
Stirring the POTs: protective optimization technologies S Gürses, R Overdorf, E Balsa Amsterdam University Press, 2018 | 3 | 2018 |
Subtle Censorship via Adversarial Fakeness in Kyrgyzstan C Schwartz, R Overdorf arXiv preprint arXiv:1906.08021, 2019 | 2 | 2019 |
The Power of Deletions: Ephemeral Astroturfing Attacks on Twitter Trends T Elmas, R Overdorf, AF Özkalay, K Aberer arXiv preprint arXiv:1910.07783, 2020 | 1 | 2020 |
Blogs and Twitter Feeds: A Stylometric Environmental Impact Study R Overdorf, T Dutko, R Greenstadt | 1 | 2014 |
Misleading Repurposing on Twitter T Elmas, R Overdorf, ÖF Akgül, K Aberer arXiv preprint arXiv:2010.10600, 2020 | | 2020 |
Thinking Taxonomically about Fake Accounts: Classification, False Dichotomies, and the Need for Nuance R Overdorf, C Schwartz arXiv preprint arXiv:2006.04959, 2020 | | 2020 |
Disinformation from the Inside: Combining Machine Learning and Journalism to Investigate Sockpuppet Campaigns C Schwartz, R Overdorf Companion Proceedings of the Web Conference 2020, 623-628, 2020 | | 2020 |