default search action
Sadia Afroz 0001
Person information
- affiliation: University of California Berkeley, ICSI, USA
- affiliation: Avast Software, USA
Other persons with the same name
- Sadia Afroz — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Jack Hughes, Sergio Pastrana, Alice Hutchings, Sadia Afroz, Sagar Samtani, Weifeng Li, Ericsson Santana Marin:
The Art of Cybercrime Community Research. ACM Comput. Surv. 56(6): 155:1-155:26 (2024) - 2022
- [j2]Muhammad Sajidur Rahman, Pirouz Naghavi, Blas Kojusner, Sadia Afroz, Byron Williams, Sara Rampazzi, Vincent Bindschaedler:
PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies. IEEE Access 10: 89248-89269 (2022) - [c35]Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
MAB-Malware: A Reinforcement Learning Framework for Blackbox Generation of Adversarial Malware. AsiaCCS 2022: 990-1003 - [c34]Seongmin Lee, Sadia Afroz, Haekyu Park, Zijie J. Wang, Omar Shaikh, Vibhor Sehgal, Ankit Peshin, Duen Horng Chau:
MisVis: Explaining Web Misinformation Connections via Visual Summary. CHI Extended Abstracts 2022: 228:1-228:6 - [c33]Seongmin Lee, Sadia Afroz, Haekyu Park, Zijie J. Wang, Omar Shaikh, Vibhor Sehqal, Ankit Peshin, Duen Horng Chau:
Explaining Website Reliability by Visualizing Hyperlink Connectivity. IEEE VIS (Short Papers) 2022: 26-30 - [i11]Elliott Waissbluth, Hany Farid, Vibhor Sehgal, Ankit Peshin, Sadia Afroz:
Domain-Level Detection and Disruption of Disinformation. CoRR abs/2205.03338 (2022) - [i10]Seongmin Lee, Sadia Afroz, Haekyu Park, Zijie J. Wang, Omar Shaikh, Vibhor Sehgal, Ankit Peshin, Duen Horng Chau:
Explaining Website Reliability by Visualizing Hyperlink Connectivity. CoRR abs/2210.00160 (2022) - 2021
- [i9]Vibhor Sehgal, Ankit Peshin, Sadia Afroz, Hany Farid:
Mutual Hyperlinking Among Misinformation Peddlers. CoRR abs/2104.11694 (2021) - 2020
- [c32]Sadia Afroz, Nicholas Carlini, Ambra Demontis:
AISec'20: 13th Workshop on Artificial Intelligence and Security. CCS 2020: 2143-2144 - [c31]Sivaramakrishnan Ramanathan, Anushah Hossain, Jelena Mirkovic, Minlan Yu, Sadia Afroz:
Quantifying the Impact of Blocklisting in the Age of Address Reuse. Internet Measurement Conference 2020: 360-369 - [i8]Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin:
Automatic Generation of Adversarial Examples for Interpreting Malware Classifiers. CoRR abs/2003.03100 (2020)
2010 – 2019
- 2019
- [c30]Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. CCS 2019: 2707-2708 - [c29]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Mapping the Underground: Supervised Discovery of Cybercrime Supply Chains. eCrime 2019: 1-16 - [e2]Lorenzo Cavallaro, Johannes Kinder, Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6833-9 [contents] - [i7]Junaed Younus Khan, Md. Tawkat Islam Khondaker, Anindya Iqbal, Sadia Afroz:
A Benchmark Study on Machine Learning Methods for Fake News Detection. CoRR abs/1905.04749 (2019) - 2018
- [c28]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. ANRW 2018: 23 - [c27]Sadia Afroz:
Session details: Keynote Address. AISec@CCS 2018 - [c26]Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai:
11th International Workshop on Artificial Intelligence and Security (AISec 2018). CCS 2018: 2166-2167 - [c25]Inigo Incer, Michael Theodorides, Sadia Afroz, David A. Wagner:
Adversarially Robust Malware Detection Using Monotonic Classification. IWSPA@CODASPY 2018: 54-63 - [c24]Michael Carl Tschantz, Sadia Afroz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. FOCI @ USENIX Security Symposium 2018 - [e1]Sadia Afroz, Battista Biggio, Yuval Elovici, David Freeman, Asaf Shabtai:
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, CCS 2018, Toronto, ON, Canada, October 19, 2018. ACM 2018, ISBN 978-1-4503-6004-3 [contents] - [i6]Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson:
Exploring Server-side Blocking of Regions. CoRR abs/1805.11606 (2018) - [i5]Sadia Afroz, Mobin Javed, Vern Paxson, Shoaib Asif Qazi, Shaarif Sajid, Michael Carl Tschantz:
A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability. CoRR abs/1806.00459 (2018) - [i4]Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy:
Towards Automatic Discovery of Cybercrime Supply Chains. CoRR abs/1812.00381 (2018) - 2017
- [c23]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. EMNLP 2017: 2598-2607 - [c22]Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, Damon McCoy:
Backpage and Bitcoin: Uncovering Human Traffickers. KDD 2017: 1595-1604 - [c21]Rachee Singh, Rishab Nithyanand, Sadia Afroz, Paul Pearce, Michael Carl Tschantz, Phillipa Gill, Vern Paxson:
Characterizing the Nature and Dynamics of Tor Exit Blocking. USENIX Security Symposium 2017: 325-341 - [c20]Rebecca S. Portnoff, Sadia Afroz, Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Damon McCoy, Kirill Levchenko, Vern Paxson:
Tools for Automated Analysis of Cybercriminal Markets. WWW 2017: 657-666 - [i3]Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson:
Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation. CoRR abs/1708.09609 (2017) - 2016
- [c19]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Reviewer Integration and Performance Measurement for Malware Detection. DIMVA 2016: 122-141 - [c18]Srikanth Sundaresan, Damon McCoy, Sadia Afroz, Vern Paxson:
Profiling underground merchants based on network behavior. eCrime 2016: 62-70 - [c17]Sheharbano Khattak, David Fifield, Sadia Afroz, Mobin Javed, Srikanth Sundaresan, Damon McCoy, Vern Paxson, Steven J. Murdoch:
Do You See What I See? Differential Treatment of Anonymous Users. NDSS 2016 - [c16]Michael Carl Tschantz, Sadia Afroz, anonymous, Vern Paxson:
SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy 2016: 914-933 - 2015
- [c15]Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Brad Miller, Vaishaal Shankar, Rekha Bachwani, Anthony D. Joseph, J. Doug Tygar:
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. AISec@CCS 2015: 45-56 - [c14]Vaibhav Garg, Sadia Afroz, Rebekah Overdorf, Rachel Greenstadt:
Computer-Supported Cooperative Crime. Financial Cryptography 2015: 32-43 - [i2]Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar:
Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR abs/1510.07338 (2015) - 2014
- [c13]Brad Miller, Alex Kantchelian, Sadia Afroz, Rekha Bachwani, Edwin Dauber, Ling Huang, Michael Carl Tschantz, Anthony D. Joseph, J. Doug Tygar:
Adversarial Active Learning. AISec@CCS 2014: 3-14 - [c12]Marc Juarez, Sadia Afroz, Gunes Acar, Claudia Díaz, Rachel Greenstadt:
A Critical Evaluation of Website Fingerprinting Attacks. CCS 2014: 263-274 - [c11]Ariel Stolerman, Rebekah Overdorf, Sadia Afroz, Rachel Greenstadt:
Breaking the Closed-World Assumption in Stylometric Authorship Attribution. IFIP Int. Conf. Digital Forensics 2014: 185-205 - [c10]Sadia Afroz, Aylin Caliskan Islam, Ariel Stolerman, Rachel Greenstadt, Damon McCoy:
Doppelgänger Finder: Taking Stylometry to the Underground. IEEE Symposium on Security and Privacy 2014: 212-226 - [i1]Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. Doug Tygar:
On Modeling the Costs of Censorship. CoRR abs/1409.3211 (2014) - 2013
- [c9]Alex Kantchelian, Sadia Afroz, Ling Huang, Aylin Caliskan Islam, Brad Miller, Michael Carl Tschantz, Rachel Greenstadt, Anthony D. Joseph, J. D. Tygar:
Approaches to adversarial drift. AISec 2013: 99-110 - [c8]Sadia Afroz, Vaibhav Garg, Damon McCoy, Rachel Greenstadt:
Honor among thieves: A common's analysis of cybercrime economies. eCrime 2013: 1-11 - [c7]Sadia Afroz, Aylin Caliskan Islam, Jordan Santell, Aaron Chapin, Rachel Greenstadt:
How Privacy Flaws Affect Consumer Perception. STAST 2013: 10-17 - 2012
- [j1]Michael Brennan, Sadia Afroz, Rachel Greenstadt:
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15(3): 12:1-12:22 (2012) - [c6]Knarig Arabshian, Peter J. Danielsen, Sadia Afroz:
LexOnt: A Semi-Automatic Ontology Creation Tool for Programmable Web. AAAI Spring Symposium: Intelligent Web Services Meet Social Computing 2012 - [c5]Alex Kantchelian, Justin Ma, Ling Huang, Sadia Afroz, Anthony D. Joseph, J. D. Tygar:
Robust detection of comment spam using entropy rate. AISec 2012: 59-70 - [c4]Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman, Rachel Greenstadt:
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. Privacy Enhancing Technologies 2012: 299-318 - [c3]Sadia Afroz, Michael Brennan, Rachel Greenstadt:
Detecting Hoaxes, Frauds, and Deception in Writing Style Online. IEEE Symposium on Security and Privacy 2012: 461-475 - 2011
- [c2]Sadia Afroz, Rachel Greenstadt:
PhishZoo: Detecting Phishing Websites by Looking at Them. ICSC 2011: 368-375
2000 – 2009
- 2009
- [c1]Rachel Greenstadt, Sadia Afroz, Michael Brennan:
Mixed-initiative security agents. AISec 2009: 35-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint