Rachel Greenstadt

Rachel Greenstadt

New York University

H-index: 33

North America-United States

About Rachel Greenstadt

Rachel Greenstadt, With an exceptional h-index of 33 and a recent h-index of 25 (since 2020), a distinguished researcher at New York University, specializes in the field of Computer Science, Artificial Intelligence, Computer Security, Privacy.

His recent articles reflect a diverse array of research interests and contributions to the field:

Stoking the Flames: Understanding Escalation in an Online Harassment Community

Challenges in Restructuring Community-based Moderation

Can Deepfakes be created on a whim?

Can deepfakes be created by novice users?

" I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology

{​​ How} Library {IT} Staff Navigate Privacy and Security Challenges and Responsibilities

Studying the Online Deepfake Community

Intersectional thinking about PETs: A study of library privacy

Rachel Greenstadt Information

University

Position

Computer Science and Engineering Department

Citations(all)

4902

Citations(since 2020)

2754

Cited By

3280

hIndex(all)

33

hIndex(since 2020)

25

i10Index(all)

62

i10Index(since 2020)

48

Email

University Profile Page

New York University

Google Scholar

View Google Scholar Profile

Rachel Greenstadt Skills & Research Interests

Computer Science

Artificial Intelligence

Computer Security

Privacy

Top articles of Rachel Greenstadt

Title

Journal

Author(s)

Publication Date

Stoking the Flames: Understanding Escalation in an Online Harassment Community

Proceedings of the ACM on Human-Computer Interaction

Kejsi Take

Victoria Zhong

Chris Geeng

Emmi Bevensee

Damon McCoy

...

2024/4/23

Challenges in Restructuring Community-based Moderation

arXiv preprint arXiv:2402.17880

Chau Tran

Kejsi Take

Kaylea Champion

Benjamin Mako Hill

Rachel Greenstadt

2024/2/27

Can Deepfakes be created on a whim?

Pulak Mehta

Gauri Jagatap

Kevin Gallagher

Brian Timmerman

Progga Deb

...

2023/4/30

Can deepfakes be created by novice users?

arXiv preprint arXiv:2304.14576

Pulak Mehta

Gauri Jagatap

Kevin Gallagher

Brian Timmerman

Progga Deb

...

2023/4/28

" I'm going to trust this until it burns me" Parents' Privacy Concerns and Delegation of Trust in K-8 Educational Technology

Victoria Zhong

Susan McGregor

Rachel Greenstadt

2023

{​​ How} Library {IT} Staff Navigate Privacy and Security Challenges and Responsibilities

Alan F Luo

Noel Warford

Samuel Dooley

Rachel Greenstadt

Michelle L Mazurek

...

2023

Studying the Online Deepfake Community

Journal of Online Trust and Safety

Brian Timmerman

Pulak Mehta

Progga Deb

Kevin Gallagher

Brendan Dolan-Gavitt

...

2023/9/21

Intersectional thinking about PETs: A study of library privacy

Proceedings on Privacy Enhancing Technologies

Nora McDonald

Rachel Greenstadt

Andrea Forte

2023

The risks, benefits, and consequences of prepublication Moderation: Evidence from 17 Wikipedia language editions

Proceedings of the ACM on Human-Computer Interaction

Chau Tran

Kaylea Champion

Benjamin Mako Hill

Rachel Greenstadt

2022/11/11

“it feels like whack-a-mole”: User experiences of data removal from people search websites

Proceedings on Privacy Enhancing Technologies

Kejsi Take

Kevin Gallagher

Andrea Forte

Damon McCoy

Rachel Greenstadt

2022/7

Using Authorship Verification to Mitigate Abuse in Online Communities

Proceedings of the International AAAI Conference on Web and Social Media

Janith Weerasinghe

Rhia Singh

Rachel Greenstadt

2022/5/31

Conspiracy brokers: Understanding the monetization of youtube conspiracy theories

Cameron Ballard

Ian Goldstein

Pulak Mehta

Genesis Smothers

Kejsi Take

...

2022/4/25

Writing Style Change Detection on Multi-Author Documents.

Rhia Singh

Janith Weerasinghe

Rachel Greenstadt

2021/9/23

" So-called privacy breeds evil" Narrative Justifications for Intimate Partner Surveillance in Online Forums

Proceedings of the ACM on Human-Computer Interaction

Rosanna Bellini

Emily Tseng

Nora McDonald

Rachel Greenstadt

Damon McCoy

...

2021/1/5

Message from the USENIX security'21 program co-chairs

Rachel Greenstadt

Michael Bailey

2021

Feature Vector Difference based Authorship Verification for Open-World Settings.

Janith Weerasinghe

Rhia Singh

Rachel Greenstadt

2021

Supervised Authorship Segmentation of Open Source Code Projects

Proceedings on Privacy Enhancing Technologies

Edwin Dauber

Robert Erbacher

Gregory Shearer

Michael Weisman

Frederica Nelson

...

2021

A large-scale characterization of online incitements to harassment across platforms

Max Aliapoulios

Kejsi Take

Prashanth Ramakrishna

Daniel Borkan

Beth Goldberg

...

2021/11/2

News article text classification and summary for authors and topics

9th International Conference on Natural Language Processing (NLP 2020)

Aviel J Stein

Janith Weerasinghe

Spiros Mancoridis

Rachel Greenstadt

2020/11

Are Anonymity-Seekers Just like Everybody Else? An Analysis of Contributions to Wikipedia from Tor

Chau Tran

Kaylea Champion

Andrea Forte

Benjamin Mako Hill

Rachel Greenstadt

2020

See List of Professors in Rachel Greenstadt University(New York University)

Co-Authors

H-index: 58
Arvind Narayanan

Arvind Narayanan

Princeton University

H-index: 53
Damon McCoy

Damon McCoy

New York University

H-index: 48
Michael D. Smith

Michael D. Smith

Harvard University

H-index: 37
Moshe Kam

Moshe Kam

New Jersey Institute of Technology

H-index: 37
Claudia Diaz

Claudia Diaz

Katholieke Universiteit Leuven

H-index: 33
Patrick Juola

Patrick Juola

Duquesne University

academic-engine