Difference between revisions of "Research"

Jump to navigationJump to search
m (Protected "Research" ([edit=autoconfirmed] (indefinite) [move=autoconfirmed] (indefinite)))
(No difference)

Revision as of 19:33, 12 June 2012

Research Publications


Adversarial Stylometry. Michael Brennan, Sadia Afroz, and Rachel Greenstadt. To appear in ACM Transactions on Information and System Security (TISSEC).

Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. Andrew McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman and Rachel Greenstadt. Privacy Enhancing Technologies Symposium (PETS 2012)

Detecting Hoaxes, Frauds, and Deception in Writing Style Online. Sadia Afroz, Michael Brennan, and Rachel Greenstadt. IEEE Symposium on Security and Privacy (Oakland 2012)

Privacy in Online Review Sites. Matthew Burkholder and Rachel Greenstadt. IEEE Workshop on Semantic Computing and Security (SPW 2012)

Perspectives on Academic Impact from Inside the Federal Trade Commission. Michael Brennan. Hot Topics in Privacy Enhancing Technologies (HotPETS).

LexOnt: A Semi-automatic Ontology Creation Tool for Programmable Web. Knarig Arabshian, Peter Danielsen and Sadia Afroz. AAAI Spring Symposia 2012.


Coalescing Twitter Trends: The Under-Utilization of Machine Learning in Social Media. Michael Brennan and Rachel Greenstadt. IEEE Conference on Social Computing (SocialCom 2011)

PhishZoo: Detecting Phishing Websites by Looking at Them. Sadia Afroz and Rachel Greenstadt. IEEE Conference on Semantic Computing (ICSC 2011)


Using Machine Learning to Augment Collaborative Filtering of Community Discussions (Poster). Michael Brennan, Stacey Wrazien, and Rachel Greenstadt. Autonomous Agents and Multiagent Systems (AAMAS 2010)

Learning to Extract Quality Discourse in Online Communities. Michael Brennan, Stacey Wrazien, and Rachel Greenstadt. AAAI Workshop on Collaboratively Built Knowledge Sources and Artificial Intelligence (Wiki-AI 2011)

A Travel-Time Optimizing Edge Weighting Scheme for Dynamic Re-planning, Andrew Feit, Lenrik Toval, Raffi Hovagimian, and Rachel Greenstadt. AAAI 2010 Workshop on Bridging The Gap Between Task And Motion Planning (BTAMP)


Practical Attacks Against Authorship Recognition Techniques. Michael Brennan and Rachel Greenstadt. Innovative Applications of Artificial Intelligence (IAAI 2009)

Mixed-Initiative Security Agents. Rachel Greenstadt, Sadia Afroz, and Michael Brennan. Workshop on Security and Artificial Intelligence (AISec 2009)

Phishzoo: An automated web phishing detection approach based on profiling and fuzzy matching. Sadia Afroz and Rachel Greenstadt. ACM Student Research Competition

Myconet: A Fungi-inspired Model for Superpeer-based Peer-to-Peer Overlay Topologies. Paul Snyder, Rachel Greenstadt, and Giuseppe Valetto. Self-Adaptive and Self-Organizing Systems (SASO 2009)

An Overview of Privacy Improvements to k-Optimal DCOP Algorithms. Rachel Greenstadt. Autonomous Agents and Multiagent Systems (AAMAS 2009).

Robust Distributed Constraint Reasoning, Robert Lass, Evan Sultanik, Rachel Greenstadt and William Regli. IJCAI-09 Workshop on Distributed Constraint Reasoning (DCR), July 2009