Picture for Rachel Greenstadt

Rachel Greenstadt

Large-Scale Analysis of Political Propaganda on Moltbook

Add code
Mar 18, 2026
Viaarxiv icon

When Agents Persuade: Propaganda Generation and Mitigation in LLMs

Add code
Mar 04, 2026
Viaarxiv icon

Are Large Language Models Good at Detecting Propaganda?

Add code
May 19, 2025
Viaarxiv icon

Can deepfakes be created by novice users?

Add code
Apr 28, 2023
Figure 1 for Can deepfakes be created by novice users?
Figure 2 for Can deepfakes be created by novice users?
Figure 3 for Can deepfakes be created by novice users?
Figure 4 for Can deepfakes be created by novice users?
Viaarxiv icon

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Add code
Jan 30, 2020
Figure 1 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 2 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 3 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Figure 4 for Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Viaarxiv icon

Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments

Add code
Mar 16, 2017
Figure 1 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 2 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 3 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Figure 4 for Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments
Viaarxiv icon

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

Add code
Mar 29, 2015
Figure 1 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 2 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 3 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Figure 4 for Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Viaarxiv icon