Follow
Rebekah Overdorf
Rebekah Overdorf
Verified email at unil.ch
Title
Cited by
Cited by
Year
Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution.
R Overdorf, R Greenstadt
Proc. Priv. Enhancing Technol. 2016 (3), 155-171, 2016
762016
How unique is your. onion? an analysis of the fingerprintability of tor onion services
R Overdorf, M Juarez, G Acar, R Greenstadt, C Diaz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
602017
POTs: protective optimization technologies
B Kulynych, R Overdorf, C Troncoso, S Gürses
Proceedings of the 2020 Conference on Fairness, Accountability, and …, 2020
492020
Breaking the closed-world assumption in stylometric authorship attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
IFIP International Conference on Digital Forensics, 185-205, 2014
342014
Classify, but verify: Breaking the closed-world assumption in stylometric authorship attribution
A Stolerman, R Overdorf, S Afroz, R Greenstadt
IFIP Working Group 11, 64, 2013
312013
Computer-supported cooperative crime
V Garg, S Afroz, R Overdorf, R Greenstadt
International Conference on Financial Cryptography and Data Security, 32-43, 2015
202015
Questioning the assumptions behind fairness solutions
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1811.11293, 2018
192018
Stylometric authorship attribution of collaborative documents
E Dauber, R Overdorf, R Greenstadt
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
192017
Ephemeral astroturfing attacks: The case of fake twitter trends
T Elmas, R Overdorf, AF Özkalay, K Aberer
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 403-422, 2021
152021
POTs: The revolution will not be optimized
S Gürses, R Overdorf, E Balsa
arXiv preprint arXiv:1806.02711, 2018
152018
POTs: Protective optimization technologies
R Overdorf, B Kulynych, E Balsa, C Troncoso, S Gürses
arXiv preprint arXiv:1806.02711, 2018
142018
Under the underground: Predicting private interactions in underground forums
R Overdorf, C Troncoso, R Greenstadt, D McCoy
arXiv preprint arXiv:1805.04494, 2018
142018
The power of deletions: Ephemeral astroturfing attacks on twitter trends
T Elmas, R Overdorf, AF Ozkalay, K Aberer
arXiv preprint arXiv:1910.07783, 2020
9*2020
Stirring the POTs: protective optimization technologies
S Gürses, R Overdorf, E Balsa
Amsterdam University Press, 2018
92018
Reaching out to aid in retention: empowering undergraduate women
R Overdorf, M Lang
Proceedings of the 42nd ACM technical symposium on Computer science …, 2011
62011
Misleading repurposing on twitter
T Elmas, R Overdorf, ÖF Akgül, K Aberer
arXiv preprint arXiv:2010.10600, 2020
42020
Tactical Reframing of Online Disinformation Campaigns Against The Istanbul Convention
T Elmas, R Overdorf, K Aberer
arXiv preprint arXiv:2105.13398, 2021
22021
A Dataset of State-Censored Tweets.
T Elmas, R Overdorf, K Aberer
ICWSM, 1009-1015, 2021
22021
Disinformation from the Inside: Combining Machine Learning and Journalism to Investigate Sockpuppet Campaigns
C Schwartz, R Overdorf
Companion Proceedings of the Web Conference 2020, 623-628, 2020
22020
Subtle Censorship via Adversarial Fakeness in Kyrgyzstan
C Schwartz, R Overdorf
arXiv preprint arXiv:1906.08021, 2019
22019
The system can't perform the operation now. Try again later.
Articles 1–20