Publications
.
2018. .
2018.
Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
.
2017. Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
.
2017. Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
.
2017. Do You See What I See? Differential Treatment of Anonymous Users Proceedings of the Network and Distributed System Security Symposium (NDSS).
.
2016. Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
.
2016. Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
.
2016. SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
.
2016. Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338
.
2015. Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. :45–56.
.
2015. Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
.
2015. Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). :3–14.
.
2014. On Modeling the Costs of Censorship. CoRR. abs/1409.3211
.
2014.