Personal information

No personal information available

Activities

Works (24)

Misleading Repurposing on Twitter

International AAAI Conference on Web and Social Media (ICWSM)
2023 | Conference paper
Contributors: Elmas, Tuğrulcan; Overdorf, Rebekah; Akgül, Ömer Faruk; Aberer, Karl
Source: Self-asserted source
Rebekah Overdorf

Privacy-Aware Eye Tracking: Challenges and Future Directions

IEEE Pervasive Computing
2023-01-01 | Journal article
Part of ISSN: 1536-1268
Part of ISSN: 1558-2590
Contributors: Céline Gressel; Rebekah Overdorf; Inken Hagenstedt; Murat Karaboga; Helmut Lurtz; Michael Raschke; Andreas Bulling
Source: Self-asserted source
Rebekah Overdorf

WayPop Machine: A Wayback Machine to Investigate Popularity and Root Out Trolls

Foundations of Open Source Intelligence and Security Informatics
2022 | Conference paper
Contributors: Tugrulcan Elmas; Thomas Romain Ibanez; Alex; re Hutter; Rebekah Overdorf; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

Characterizing Retweet Bots: The Case of Black Market Accounts

Proceedings of the International AAAI Conference on Web and Social Media
2022-05-31 | Journal article
Part of ISSN: 2334-0770
Part of ISSN: 2162-3449
Contributors: Tuğrulcan Elmas; Rebekah Overdorf; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

A Dataset of State-Censored Tweets

Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, ICWSM 2021
2021 | Conference paper
Contributors: Tugrulcan Elmas; Rebekah Overdorf; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

Ephemeral Astroturfing Attacks: The Case of Fake Twitter Trends

IEEE European Symposium on Security and Privacy, EuroS&P
2021 | Conference paper
Contributors: Tugrulcan Elmas; Rebekah Overdorf; Ahmed Furkan Özkalay; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

Tactical Reframing of Online Disinformation Campaigns Against The Istanbul Convention

Workshop on Data for the Wellbeing of Most Vulnerable (ICWSM Workshop)
2021 | Journal article
Contributors: Tugrulcan Elmas; Rebekah Overdorf; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

Can Celebrities Burst Your Bubble?

Innovative Ideas in Data Science (The Web Conference Workshop)
2020 | Journal article
Contributors: Tuğrulcan Elmas; Kristina Hardi; Rebekah Overdorf; Karl Aberer
Source: Self-asserted source
Rebekah Overdorf

Disinformation from the Inside: Combining Machine Learning and Journalism to Investigate Sockpuppet Campaigns

CyberSafety (The Web Conference Workshopp
2020 | Journal article
Contributors: Christopher Schwartz; Rebekah Overdorf
Source: Self-asserted source
Rebekah Overdorf

POTs: protective optimization technologies

FAT* '20: Conference on Fairness, Accountability, and Transparency
2020 | Conference paper
Contributors: Bogdan Kulynych; Rebekah Overdorf; Carmela Troncoso; Seda F. Gürses
Source: Self-asserted source
Rebekah Overdorf

A guide to revolutionary counter-optimization

Internet Freedom Festival (IFF)
2019 | Other
Contributors: Rebekah Overdorf; Bogdan Kulynych; Seda Gürses
Source: Self-asserted source
Rebekah Overdorf

Subtle Censorship via Adversarial Fakeness in Kyrgyzstan

In Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs)
2019 | Other
Contributors: Christopher Schwartz; Rebekah Overdorf
Source: Self-asserted source
Rebekah Overdorf

POTs: The revolution will not be optimized?

Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs)
2018 | Journal article
Contributors: Seda Gürses; Rebekah Overdorf; Ero Balsa
Source: Self-asserted source
Rebekah Overdorf

Questioning the assumptions behind fairness solutions

Critiquing and Correcting Trends in Machine Learning (NeurIPS Workshop)
2018 | Journal article
Contributors: Rebekah Overdorf; Bogdan Kulynych; Ero Balsa; Carmela Troncoso; Seda Gürses
Source: Self-asserted source
Rebekah Overdorf

Under the Underground: Predicting Private Interactions in Underground Forums

2018 | Other
Contributors: Rebekah Overdorf; Carmela Troncoso; Rachel Greenstadt; Damon McCoy
Source: Self-asserted source
Rebekah Overdorf

How Unique is Your .onion?: An Analysis of the Fingerprintability of Tor Onion Services

ACM SIGSAC Conference on Computer and Communications Security, CCS
2017 | Conference paper
Contributors: Rebekah Overdorf; Marc Juárez; Gunes Acar; Rachel Greenstadt; Claudia Díaz
Source: Self-asserted source
Rebekah Overdorf

Stylometric authorship Attribution of Collaborative Documents

Cyber Security Cryptography and Machine Learning, (CSCML)
2017 | Conference paper
Contributors: Edwin Dauber; Rebekah Overdorf; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Blogs, Twitter Feeds, and Reddit Comments: Cross-domain authorship Attribution

Proceedings on Privacy Enhancing Technologies (PoPETs)
2016 | Conference paper
Contributors: Rebekah Overdorf; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Computer-Supported Cooperative Crime

Financial Cryptography and Data Security (FC)
2015 | Conference paper
Contributors: Vaibhav Garg; Sadia Afroz; Rebekah Overdorf; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Blogs and Twitter Feeds: A Stylometric Environmental Impact Study

Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs)
2014 | Journal article
Contributors: Rebekah Overdorf; Travis Dutko; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Breaking the Closed-World Assumption in Stylometric authorship Attribution

Advances in Digital Forensics X (IFIP WG)
2014 | Conference paper
Contributors: Ariel Stolerman; Rebekah Overdorf; Sadia Afroz; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Source Code and Cross Domain Stylometry. Role of Stylometry in Privacy

Chaos Communication Congress (CCC)
2014 | Journal article
Contributors: Rebekah Overdorf; Aylin Caliskan Islam; Rachel Greenstadt
Source: Self-asserted source
Rebekah Overdorf

Reaching out to aid in retention

Proceedings of the 42nd ACM technical symposium on Computer science education - SIGCSE '11
2011 | Conference paper
Contributors: Rebekah Overdorf
Source: Self-asserted source
Rebekah Overdorf

Reaching out to aid in retention: empowering undergraduate women

ACM Technical Symposium on Computer science Education (SIGCSE)
2011 | Conference paper
Contributors: Rebekah Overdorf; Matthew Lang
Source: Self-asserted source
Rebekah Overdorf

Peer review (1 review for 1 publication/grant)

Review activity for Forensic science international. (1)