Publications
2006. Understanding the network-level behavior of spammers. Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. :291-302.
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
2002. Interacting with identification technology: can it make us more secure? CHI '02 extended abstracts on Human factors in computing systems. :564-565.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2011. Simulating Audiences: Automating Analysis of Values, Attitudes, and Sentiment. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :734-737.
2003. Anti-collusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on. 51(4):1069-1087.
2011. Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :760-765.
2003. Resistance of orthogonal Gaussian fingerprints to collusion attacks. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-617-20vol.1-I-617-20vol.1.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2003. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
2003. A secure service discovery protocol for MANET. 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 1:502-506Vol.1-502-506Vol.1.