theme image

data mining

data mining
profile
RETSim: Resilient and Efficient Text Similarity
AI

RETSim: Resilient and Efficient Text Similarity

ICLR 2024

Malicious Documents Emerging Trends: A Gmail Perspective
security

Malicious Documents Emerging Trends: A Gmail Perspective

RSA 2020

Targeted Attack Against Corporate Inboxes A Gmail Perspective
security

Targeted Attack Against Corporate Inboxes A Gmail Perspective

RSA 2017

Picasso: Lightweight Device Class Fingerprinting for Web Clients
anti-abuse

Picasso: Lightweight Device Class Fingerprinting for Web Clients

SPSM 2016

Predicting Hearthstone game outcome with machine learning
video game

Predicting Hearthstone game outcome with machine learning

Oct 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
anti-abuse

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

RAID 2016

Remedying web hijacking notification effectiveness and webmaster comprehension
web security

Remedying web hijacking notification effectiveness and webmaster comprehension

WWW 2016

The dark side of online poker or the commoditization and weaponization of big data and espionage
hacking

The dark side of online poker or the commoditization and weaponization of big data and espionage

Feb 2016

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
network security

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security

IMC 2015

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
anti-abuse

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google

WWW 2015

Ad injection at scale: assessing deceptive advertisement modifications
anti-abuse

Ad injection at scale: assessing deceptive advertisement modifications

S&P 2015

Handcrafted fraud and extortion: manual account hijacking in the wild
anti-abuse

Handcrafted fraud and extortion: manual account hijacking in the wild

IMC 2014

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up
video game

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up

Sep 2014

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake
video game

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake

Aug 2014

How to find undervalued Hearthstone cards automatically
video game

How to find undervalued Hearthstone cards automatically

Jul 2014

How to appraise Hearthstone card values
video game

How to appraise Hearthstone card values

Jul 2014

Using big data to understand users' privacy concerns
privacy

Using big data to understand users' privacy concerns

May 2014

Cloak and swagger: understanding data sensitivity through the lens of user anonymity
privacy

Cloak and swagger: understanding data sensitivity through the lens of user anonymity

S&P 2014

Easy does it: more usable captchas
user experience

Easy does it: more usable captchas

CHI 2014

Some insights about password shapes
security

Some insights about password shapes

Feb 2011

Kartograph
video game

Kartograph

Defcon 2010

How good are humans at solving captchas a large scale evaluation
web security

How good are humans at solving captchas a large scale evaluation

S&P 2010

State of the art automated black-box web application vulnerability testing
web security

State of the art automated black-box web application vulnerability testing

S&P 2010

Trackback spam abuse and prevention
web security

Trackback spam abuse and prevention

CCSW 2009

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.