Rachel Greenstadt
New York University
H-index: 33
North America-United States
Top articles of Rachel Greenstadt
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Stoking the Flames: Understanding Escalation in an Online Harassment Community | Proceedings of the ACM on Human-Computer Interaction | Kejsi Take Victoria Zhong Chris Geeng Emmi Bevensee Damon McCoy | 2024/4/23 |
Challenges in Restructuring Community-based Moderation | arXiv preprint arXiv:2402.17880 | Chau Tran Kejsi Take Kaylea Champion Benjamin Mako Hill Rachel Greenstadt | 2024/2/27 |
Can Deepfakes be created on a whim? | Pulak Mehta Gauri Jagatap Kevin Gallagher Brian Timmerman Progga Deb | 2023/4/30 | |
Can deepfakes be created by novice users? | arXiv preprint arXiv:2304.14576 | Pulak Mehta Gauri Jagatap Kevin Gallagher Brian Timmerman Progga Deb | 2023/4/28 |
" I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology | Victoria Zhong Susan McGregor Rachel Greenstadt | 2023 | |
{ How} Library {IT} Staff Navigate Privacy and Security Challenges and Responsibilities | Alan F Luo Noel Warford Samuel Dooley Rachel Greenstadt Michelle L Mazurek | 2023 | |
Studying the Online Deepfake Community | Journal of Online Trust and Safety | Brian Timmerman Pulak Mehta Progga Deb Kevin Gallagher Brendan Dolan-Gavitt | 2023/9/21 |
Intersectional thinking about PETs: A study of library privacy | Proceedings on Privacy Enhancing Technologies | Nora McDonald Rachel Greenstadt Andrea Forte | 2023 |
The risks, benefits, and consequences of prepublication Moderation: Evidence from 17 Wikipedia language editions | Proceedings of the ACM on Human-Computer Interaction | Chau Tran Kaylea Champion Benjamin Mako Hill Rachel Greenstadt | 2022/11/11 |
“it feels like whack-a-mole”: User experiences of data removal from people search websites | Proceedings on Privacy Enhancing Technologies | Kejsi Take Kevin Gallagher Andrea Forte Damon McCoy Rachel Greenstadt | 2022/7 |
Using Authorship Verification to Mitigate Abuse in Online Communities | Proceedings of the International AAAI Conference on Web and Social Media | Janith Weerasinghe Rhia Singh Rachel Greenstadt | 2022/5/31 |
Conspiracy brokers: Understanding the monetization of youtube conspiracy theories | Cameron Ballard Ian Goldstein Pulak Mehta Genesis Smothers Kejsi Take | 2022/4/25 | |
Writing Style Change Detection on Multi-Author Documents. | Rhia Singh Janith Weerasinghe Rachel Greenstadt | 2021/9/23 | |
" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums | Proceedings of the ACM on Human-Computer Interaction | Rosanna Bellini Emily Tseng Nora McDonald Rachel Greenstadt Damon McCoy | 2021/1/5 |
Message from the USENIX security'21 program co-chairs | Rachel Greenstadt Michael Bailey | 2021 | |
Feature Vector Difference based Authorship Verification for Open-World Settings. | Janith Weerasinghe Rhia Singh Rachel Greenstadt | 2021 | |
Supervised Authorship Segmentation of Open Source Code Projects | Proceedings on Privacy Enhancing Technologies | Edwin Dauber Robert Erbacher Gregory Shearer Michael Weisman Frederica Nelson | 2021 |
A large-scale characterization of online incitements to harassment across platforms | Max Aliapoulios Kejsi Take Prashanth Ramakrishna Daniel Borkan Beth Goldberg | 2021/11/2 | |
News article text classification and summary for authors and topics | 9th International Conference on Natural Language Processing (NLP 2020) | Aviel J Stein Janith Weerasinghe Spiros Mancoridis Rachel Greenstadt | 2020/11 |
Are Anonymity-Seekers Just like Everybody Else? An Analysis of Contributions to Wikipedia from Tor | Chau Tran Kaylea Champion Andrea Forte Benjamin Mako Hill Rachel Greenstadt | 2020 |