Skip to main content

Showing 1–13 of 13 results for author: Greenstadt, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.17880  [pdf, other

    cs.HC

    Challenges in Restructuring Community-based Moderation

    Authors: Chau Tran, Kejsi Take, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: Content moderation practices and technologies need to change over time as requirements and community expectations shift. However, attempts to restructure existing moderation practices can be difficult, especially for platforms that rely on their communities to conduct moderation activities, because changes can transform the workflow and workload of moderators and contributors' reward systems. Thro… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

  2. arXiv:2304.14576  [pdf, other

    cs.CR cs.AI cs.HC

    Can deepfakes be created by novice users?

    Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt

    Abstract: Recent advancements in machine learning and computer vision have led to the proliferation of Deepfakes. As technology democratizes over time, there is an increasing fear that novice users can create Deepfakes, to discredit others and undermine public discourse. In this paper, we conduct user studies to understand whether participants with advanced computer skills and varying levels of computer sci… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

  3. Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories

    Authors: Cameron Ballard, Ian Goldstein, Pulak Mehta, Genesis Smothers, Kejsi Take, Victoria Zhong, Rachel Greenstadt, Tobias Lauinger, Damon McCoy

    Abstract: Conspiracy theories are increasingly a subject of research interest as society grapples with their rapid growth in areas such as politics or public health. Previous work has established YouTube as one of the most popular sites for people to host and discuss different theories. In this paper, we present an analysis of monetization methods of conspiracy theorist YouTube creators and the types of adv… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

    Journal ref: WWW 2022 Proceedings of the ACM Web Conference, April 2022, Pages 2707-2718

  4. The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions

    Authors: Chau Tran, Kaylea Champion, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: Many online communities rely on postpublication moderation where contributors, even those that are perceived as being risky, are allowed to publish material immediately and where moderation takes place after the fact. An alternative arrangement involves moderating content before publication. A range of communities have argued against prepublication moderation by suggesting that it makes contributi… ▽ More

    Submitted 26 August, 2022; v1 submitted 11 February, 2022; originally announced February 2022.

    Comments: This paper was submitted to CSCW2 (November 2022)

  5. arXiv:2005.14341  [pdf, other

    cs.CR cs.SI

    The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums

    Authors: Emily Tseng, Rosanna Bellini, Nora McDonald, Matan Danos, Rachel Greenstadt, Damon McCoy, Nicola Dell, Thomas Ristenpart

    Abstract: Abusers increasingly use spyware apps, account compromise, and social engineering to surveil their intimate partners, causing substantial harms that can culminate in violence. This form of privacy violation, termed intimate partner surveillance (IPS), is a profoundly challenging problem to address due to the physical access and trust present in the relationship between the target and attacker. Whi… ▽ More

    Submitted 28 May, 2020; originally announced May 2020.

  6. arXiv:2001.11137  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

    Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt

    Abstract: Numerous recent studies have demonstrated how Deep Neural Network (DNN) classifiers can be fooled by adversarial examples, in which an attacker adds perturbations to an original sample, causing the classifier to misclassify the sample. Adversarial attacks that render DNNs vulnerable in real life represent a serious threat in autonomous vehicles, malware filters, or biometric authentication systems… ▽ More

    Submitted 8 February, 2021; v1 submitted 29 January, 2020; originally announced January 2020.

    Comments: 18 pages, 8 figures, fixed typos, replotted figures, restyled the plots and tables

    ACM Class: I.5.1; I.5.4; I.5.5

  7. A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users

    Authors: Kaylea Champion, Nora McDonald, Stephanie Bankes, Joseph Zhang, Rachel Greenstadt, Andrea Forte, Benjamin Mako Hill

    Abstract: By choice or by necessity, some contributors to commons-based peer production sites use privacy-protecting services to remain anonymous. As anonymity seekers, users of the Tor network have been cast both as ill-intentioned vandals and as vulnerable populations concerned with their privacy. In this study, we use a dataset drawn from a corpus of Tor edits to Wikipedia to uncover the character of Tor… ▽ More

    Submitted 17 September, 2019; originally announced September 2019.

    Journal ref: Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 53 (November 2019)

  8. Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor

    Authors: Chau Tran, Kaylea Champion, Andrea Forte, Benjamin Mako Hill, Rachel Greenstadt

    Abstract: User-generated content sites routinely block contributions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content site… ▽ More

    Submitted 15 February, 2020; v1 submitted 8 April, 2019; originally announced April 2019.

    Comments: To appear in the IEEE Symposium on Security & Privacy, May 2020

  9. arXiv:1805.04494  [pdf, other

    cs.CR

    Under the Underground: Predicting Private Interactions in Underground Forums

    Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy

    Abstract: Underground forums where users discuss, buy, and sell illicit services and goods facilitate a better understanding of the economy and organization of cybercriminals. Prior work has shown that in particular private interactions provide a wealth of information about the cybercriminal ecosystem. Yet, those messages are seldom available to analysts, except when there is a leak. To address this problem… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

  10. How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services

    Authors: Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz

    Abstract: Recent studies have shown that Tor onion (hidden) service websites are particularly vulnerable to website fingerprinting attacks due to their limited number and sensitive nature. In this work we present a multi-level feature analysis of onion site fingerprintability, considering three state-of-the-art website fingerprinting methods and 482 Tor onion services, making this the largest analysis of th… ▽ More

    Submitted 20 September, 2017; v1 submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted by ACM CCS 2017

  11. Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

    Authors: Edwin Dauber, Aylin Caliskan, Richard Harang, Gregory Shearer, Michael Weisman, Frederica Nelson, Rachel Greenstadt

    Abstract: Program authorship attribution has implications for the privacy of programmers who wish to contribute code anonymously. While previous work has shown that complete files that are individually authored can be attributed, we show here for the first time that accounts belonging to open source contributors containing short, incomplete, and typically uncompilable fragments can also be effectively attri… ▽ More

    Submitted 25 July, 2019; v1 submitted 19 January, 2017; originally announced January 2017.

    Journal ref: Dauber, E., Caliskan, A., Harang, R., et al. (2019). Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments. Proceedings on Privacy Enhancing Technologies, 2019(3), pp. 389-408

  12. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

    Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan

    Abstract: The ability to identify authors of computer programs based on their coding style is a direct threat to the privacy and anonymity of programmers. While recent work found that source code can be attributed to authors with high accuracy, attribution of executable binaries appears to be much more difficult. Many distinguishing features present in source code, e.g. variable names, are removed in the co… ▽ More

    Submitted 17 December, 2017; v1 submitted 28 December, 2015; originally announced December 2015.

    Comments: 15 pages

  13. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

    Authors: Lex Fridman, Steven Weber, Rachel Greenstadt, Moshe Kam

    Abstract: Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device. In this study, we collect and analyze behavioral biometrics data from 200subjects, each using their personal Android mobile device for a period of at least 30 days. This dataset is novel in the context of active authentication due to its… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: Accepted for Publication in the IEEE Systems Journal