Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shahryar Baki
@article{DBLP:journals/tdsc/BakiV23, author = {Shahryar Baki and Rakesh M. Verma}, title = {Sixteen Years of Phishing User Studies: What Have We Learned?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1200--1212}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3151103}, doi = {10.1109/TDSC.2022.3151103}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BakiV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-04661, author = {Shahryar Baki and Rakesh M. Verma}, title = {Sixteen Years of Phishing User Studies: What Have We Learned?}, journal = {CoRR}, volume = {abs/2109.04661}, year = {2021}, url = {https://arxiv.org/abs/2109.04661}, eprinttype = {arXiv}, eprint = {2109.04661}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-04661.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AassalBDV20, author = {Ayman El Aassal and Shahryar Baki and Avisha Das and Rakesh M. Verma}, title = {An In-Depth Benchmarking and Evaluation of Phishing Detection Research for Security Needs}, journal = {{IEEE} Access}, volume = {8}, pages = {22170--22192}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2969780}, doi = {10.1109/ACCESS.2020.2969780}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AassalBDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/DasBAVD20, author = {Avisha Das and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Arthur Dunbar}, title = {SoK: {A} Comprehensive Reexamination of Phishing Research From the Security Perspective}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {671--708}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2957750}, doi = {10.1109/COMST.2019.2957750}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/DasBAVD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BakiVG20, author = {Shahryar Baki and Rakesh M. Verma and Omprakash Gnawali}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {Scam Augmentation and Customization: Identifying Vulnerable Users and Arming Defenders}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {236--247}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384753}, doi = {10.1145/3320269.3384753}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BakiVG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZengZBV20, author = {Victor Zeng and Xin Zhou and Shahryar Baki and Rakesh M. Verma}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {PhishBench 2.0: {A} Versatile and Extendable Benchmarking Framework for Phishing}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2077--2079}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3420017}, doi = {10.1145/3372297.3420017}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZengZBV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZengBAVMD20, author = {Victor Zeng and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Luis Felipe Teixeira De Moraes and Avisha Das}, editor = {Rakesh M. Verma and Latifur Khan and Chilukuri K. Mohan}, title = {Diverse Datasets and a Customizable Benchmarking Framework for Phishing}, booktitle = {IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, New Orleans, LA, USA, March 18, 2020}, pages = {35--41}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3375708.3380313}, doi = {10.1145/3375708.3380313}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ZengBAVMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-13499, author = {Shahryar Baki and Rakesh M. Verma and Arjun Mukherjee and Omprakash Gnawali}, title = {Less is More: Exploiting Social Trust to Increase the Effectiveness of a Deception Attack}, journal = {CoRR}, volume = {abs/2006.13499}, year = {2020}, url = {https://arxiv.org/abs/2006.13499}, eprinttype = {arXiv}, eprint = {2006.13499}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-13499.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-00953, author = {Avisha Das and Shahryar Baki and Ayman El Aassal and Rakesh M. Verma and Arthur Dunbar}, title = {{SOK:} {A} Comprehensive Reexamination of Phishing Research from the Security Perspective}, journal = {CoRR}, volume = {abs/1911.00953}, year = {2019}, url = {http://arxiv.org/abs/1911.00953}, eprinttype = {arXiv}, eprint = {1911.00953}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-00953.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/MoraesBVL18, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, title = {Identifying reference spans: topic modeling and word embeddings help {IR}}, journal = {Int. J. Digit. Libr.}, volume = {19}, number = {2-3}, pages = {191--202}, year = {2018}, url = {https://doi.org/10.1007/s00799-017-0220-z}, doi = {10.1007/S00799-017-0220-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/MoraesBVL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BakiVMG17, author = {Shahryar Baki and Rakesh M. Verma and Arjun Mukherjee and Omprakash Gnawali}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Scaling and Effectiveness of Email Masquerade Attacks: Exploiting Natural Language Generation}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {469--482}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053037}, doi = {10.1145/3052973.3053037}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BakiVMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eacl/VuppuluriBNV17, author = {Vasanthi Vuppuluri and Shahryar Baki and An Nguyen and Rakesh M. Verma}, editor = {Andre Martins and Anselmo Pe{\~{n}}as}, title = {{ICE:} Idiom and Collocation Extractor for Research and Education}, booktitle = {Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics, {EACL} 2017, Valencia, Spain, April 3-7, 2017, Software Demonstrations}, pages = {108--111}, publisher = {Association for Computational Linguistics}, year = {2017}, url = {https://doi.org/10.18653/v1/e17-3027}, doi = {10.18653/V1/E17-3027}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eacl/VuppuluriBNV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-02989, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, title = {Identifying Reference Spans: Topic Modeling and Word Embeddings help {IR}}, journal = {CoRR}, volume = {abs/1708.02989}, year = {2017}, url = {http://arxiv.org/abs/1708.02989}, eprinttype = {arXiv}, eprint = {1708.02989}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-02989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicling/VermaVNMMBA16, author = {Rakesh M. Verma and Vasanthi Vuppuluri and An Nguyen and Arjun Mukherjee and Ghita Mammar and Shahryar Baki and Reed Armstrong}, editor = {Alexander F. Gelbukh}, title = {Mining the Web for Collocations: {IR} Models of Term Associations}, booktitle = {Computational Linguistics and Intelligent Text Processing - 17th International Conference, CICLing 2016, Konya, Turkey, April 3-9, 2016, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9623}, pages = {177--194}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-75477-2\_11}, doi = {10.1007/978-3-319-75477-2\_11}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/cicling/VermaVNMMBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/jcdl/MoraesBVL16, author = {Luis F. T. Moraes and Shahryar Baki and Rakesh M. Verma and Daniel Lee}, editor = {Guillaume Cabanac and Muthu Kumar Chandrasekaran and Ingo Frommholz and Kokil Jaidka and Min{-}Yen Kan and Philipp Mayr and Dietmar Wolfram}, title = {University of Houston at CL-SciSumm 2016: SVMs with tree kernels and Sentence Similarity}, booktitle = {Proceedings of the Joint Workshop on Bibliometric-enhanced Information Retrieval and Natural Language Processing for Digital Libraries {(BIRNDL)} co-located with the Joint Conference on Digital Libraries 2016 {(JCDL} 2016), Newark, NJ, USA, June 23, 2016}, series = {{CEUR} Workshop Proceedings}, volume = {1610}, pages = {113--121}, publisher = {CEUR-WS.org}, year = {2016}, url = {https://ceur-ws.org/Vol-1610/paper13.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/jcdl/MoraesBVL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.