Skip to main content

Showing 1–16 of 16 results for author: Afroz, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.04710  [pdf

    cs.HC cs.SE

    Measuring SES-related traits relating to technology usage: Two validated surveys

    Authors: Chimdi Chikezie, Pannapat Chenpaiseng, Puja Agarwal, Sadia Afroz, Bhavika Madhwani, Rudrajit Choudhuri, Andrew Anderson, Prisha Velhal, Patricia Morreale, Christopher Bogart, Anita Sarma, Margaret Burnett

    Abstract: Software producers are now recognizing the importance of improving their products' suitability for diverse populations, but little attention has been given to measurements to shed light on products' suitability to individuals below the median socioeconomic status (SES) -- who, by definition, make up half the population. To enable software practitioners to attend to both lower- and higher-SES indiv… ▽ More

    Submitted 7 February, 2025; originally announced February 2025.

  2. arXiv:2210.00160  [pdf, other

    cs.SI cs.CR cs.CY cs.HC

    Explaining Website Reliability by Visualizing Hyperlink Connectivity

    Authors: Seongmin Lee, Sadia Afroz, Haekyu Park, Zijie J. Wang, Omar Shaikh, Vibhor Sehgal, Ankit Peshin, Duen Horng Chau

    Abstract: As the information on the Internet continues growing exponentially, understanding and assessing the reliability of a website is becoming increasingly important. Misinformation has far-ranging repercussions, from sowing mistrust in media to undermining democratic elections. While some research investigates how to alert people to misinformation on the web, much less research has been conducted on ex… ▽ More

    Submitted 30 September, 2022; originally announced October 2022.

    Comments: Accepted at IEEE VIS 2022, 5 pages, 4 figures, For a live demo, visit https://poloclub.github.io/MisVis

  3. arXiv:2209.00844  [pdf, other

    cs.SE

    Developer Discussion Topics on the Adoption and Barriers of Low Code Software Development Platforms

    Authors: Md Abdullah Al Alamin, Gias Uddin, Sanjay Malakar, Sadia Afroz, Tameem Bin Haider, Anindya Iqbal

    Abstract: Low-code software development (LCSD) is an emerging approach to democratize application development for software practitioners from diverse backgrounds. LCSD platforms promote rapid application development with a drag-and-drop interface and minimal programming by hand. As it is a relatively new paradigm, it is vital to study developers' difficulties when adopting LCSD platforms. Software engineers… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  4. arXiv:2205.03338  [pdf, other

    cs.CY

    Domain-Level Detection and Disruption of Disinformation

    Authors: Elliott Waissbluth, Hany Farid, Vibhor Sehgal, Ankit Peshin, Sadia Afroz

    Abstract: How, in 20 short years, did we go from the promise of the internet to democratize access to knowledge and make the world more understanding and enlightened, to the litany of daily horrors that is today's internet? We are awash in disinformation consisting of lies, conspiracies, and general nonsense, all with real-world implications ranging from horrific humans rights violations to threats to our d… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

  5. MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment

    Authors: Shoumik Saha, Sadia Afroz, Atif Rahman

    Abstract: For a long time, malware classification and analysis have been an arms-race between antivirus systems and malware authors. Though static analysis is vulnerable to evasion techniques, it is still popular as the first line of defense in antivirus systems. But most of the static analyzers failed to gain the trust of practitioners due to their black-box nature. We propose MAlign, a novel static malwar… ▽ More

    Submitted 12 January, 2024; v1 submitted 28 November, 2021; originally announced November 2021.

  6. arXiv:2104.11694  [pdf, other

    cs.SI

    Mutual Hyperlinking Among Misinformation Peddlers

    Authors: Vibhor Sehgal, Ankit Peshin, Sadia Afroz, Hany Farid

    Abstract: The internet promised to democratize access to knowledge and make the world more open and understanding. The reality of today's internet, however, is far from this ideal. Misinformation, lies, and conspiracies dominate many social media platforms. This toxic online world has had real-world implications ranging from genocide to, election interference, and threats to global public health. A frustrat… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

  7. An Empirical Study of Developer Discussions on Low-Code Software Development Challenges

    Authors: Md Abdullah Al Alamin, Sanjay Malakar, Gias Uddin, Sadia Afroz, Tameem Bin Haider, Anindya Iqbal

    Abstract: Low-code software development (LCSD) is an emerging paradigm that combines minimal source code with interactive graphical interfaces to promote rapid application development. LCSD aims to democratize application development to software practitioners with diverse backgrounds. Given that LCSD is relatively a new paradigm, it is vital to learn about the challenges developers face during their adoptio… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Journal ref: 2021 IEEE/ACM 18th International Conference on Mining Software Repositories (MSR)

  8. arXiv:2003.03100  [pdf, other

    cs.CR

    MAB-Malware: A Reinforcement Learning Framework for Attacking Static Malware Classifiers

    Authors: Wei Song, Xuezixiang Li, Sadia Afroz, Deepali Garg, Dmitry Kuznetsov, Heng Yin

    Abstract: Modern commercial antivirus systems increasingly rely on machine learning to keep up with the rampant inflation of new malware. However, it is well-known that machine learning models are vulnerable to adversarial examples (AEs). Previous works have shown that ML malware classifiers are fragile to the white-box adversarial attacks. However, ML models used in commercial antivirus products are usuall… ▽ More

    Submitted 29 April, 2021; v1 submitted 6 March, 2020; originally announced March 2020.

  9. arXiv:1905.04749  [pdf, other

    cs.CL cs.IR cs.LG stat.ML

    A Benchmark Study of Machine Learning Models for Online Fake News Detection

    Authors: Junaed Younus Khan, Md. Tawkat Islam Khondaker, Sadia Afroz, Gias Uddin, Anindya Iqbal

    Abstract: The proliferation of fake news and its propagation on social media has become a major concern due to its ability to create devastating impacts. Different machine learning approaches have been suggested to detect fake news. However, most of those focused on a specific type of news (such as political) which leads us to the question of dataset-bias of the models used. In this research, we conducted a… ▽ More

    Submitted 26 March, 2021; v1 submitted 12 May, 2019; originally announced May 2019.

    Comments: 22 pages, 5 figures, to be published in Machine Learning with Applications journal

    Journal ref: Machine Learning with Applications: 4(2021).100032

  10. Center Emphasized Visual Saliency and a Contrast-based Full Reference Image Quality Index

    Authors: Md Abu Layek, Sanjida Afroz, TaeChoong Chung, Eui-Nam Huh

    Abstract: Objective image quality assessment (IQA) is imperative in the current multimedia-intensive world, in order to assess the visual quality of an image at close to a human level of ability. Many~parameters such as color intensity, structure, sharpness, contrast, presence of an object, etc., draw human attention to an image. Psychological vision research suggests that human vision is biased to the cent… ▽ More

    Submitted 26 February, 2019; v1 submitted 28 December, 2018; originally announced December 2018.

    Comments: This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT) (No.2017-0-00294, Service mobility support distributed cloud technology)

    Journal ref: Symmetry 2019, 11, 296. Online: https://www.mdpi.com/2073-8994/11/3/296

  11. arXiv:1812.00381  [pdf, other

    cs.CR cs.CL cs.LG

    Towards Automatic Discovery of Cybercrime Supply Chains

    Authors: Rasika Bhalerao, Maxwell Aliapoulios, Ilia Shumailov, Sadia Afroz, Damon McCoy

    Abstract: Cybercrime forums enable modern criminal entrepreneurs to collaborate with other criminals into increasingly efficient and sophisticated criminal endeavors. Understanding the connections between different products and services can often illuminate effective interventions. However, generating this understanding of supply chains currently requires time-consuming manual effort. In this paper, we pr… ▽ More

    Submitted 4 December, 2018; v1 submitted 2 December, 2018; originally announced December 2018.

  12. arXiv:1806.00459  [pdf, other

    cs.NI

    A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability

    Authors: Sadia Afroz, Mobin Javed, Vern Paxson, Shoaib Asif Qazi, Shaarif Sajid, Michael Carl Tschantz

    Abstract: This paper examines different reasons the websites may vary in their availability by location. Prior works on availability mostly focus on censorship by nation states. We look at three forms of server-side blocking: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor's country, and blocking due to security concerns. We argue that these and other forms of blockin… ▽ More

    Submitted 1 June, 2018; originally announced June 2018.

  13. arXiv:1805.11606  [pdf, other

    cs.NI

    Exploring Server-side Blocking of Regions

    Authors: Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson

    Abstract: One of the Internet's greatest strengths is the degree to which it facilitates access to any of its resources from users anywhere in the world. However, users in the developing world have complained of websites blocking their countries. We explore this phenomenon using a measurement study. With a combination of automated page loads, manual checking, and traceroutes, we can say, with high confidenc… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

  14. Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation

    Authors: Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson

    Abstract: One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging cross-domain effects. We formulate a task that represents a hybrid of slot-filling information extraction and named entity recognition and annotate d… ▽ More

    Submitted 31 August, 2017; originally announced August 2017.

    Comments: To appear at EMNLP 2017

    ACM Class: I.2.7

    Journal ref: EMNLP (2017) 2598-2607

  15. arXiv:1510.07338  [pdf, other

    cs.CR

    Reviewer Integration and Performance Measurement for Malware Detection

    Authors: Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar

    Abstract: We present and evaluate a large-scale malware detection system integrating machine learning with expert reviewers, treating reviewers as a limited labeling resource. We demonstrate that even in small numbers, reviewers can vastly improve the system's ability to keep pace with evolving threats. We conduct our evaluation on a sample of VirusTotal submissions spanning 2.5 years and containing 1.1 mil… ▽ More

    Submitted 26 May, 2016; v1 submitted 25 October, 2015; originally announced October 2015.

    Comments: 20 papers, 11 figures, accepted at the 13th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2016)

  16. arXiv:1409.3211  [pdf, other

    cs.CR

    On Modeling the Costs of Censorship

    Authors: Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. D. Tygar

    Abstract: We argue that the evaluation of censorship evasion tools should depend upon economic models of censorship. We illustrate our position with a simple model of the costs of censorship. We show how this model makes suggestions for how to evade censorship. In particular, from it, we develop evaluation criteria. We examine how our criteria compare to the traditional methods of evaluation employed in pri… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.