Knowledge

Talk:Adversarial stylometry

Source 📝

530: 512: 149: 268: 87: 195: 177: 77: 53: 22: 289: 1272:
Bevendorff, Janek; Wenzel, Tobias; Potthast, Martin; Hagen, Matthias; Stein, Benno (2020). "On divergence-based author obfuscation: An attack on the state of the art in statistical authorship verification".
703:
Karadjov, Georgi; Mihaylova, Tsvetomila; Kiprov, Yasen; Georgiev, Georgi; Koychev, Ivan; Nakov, Preslav (2017). "The Case for Being Average: A Mediocrity Approach to Style Masking and Author Obfuscation".
313: 453: 1355: 1202:
Caliskan, Aylin; Greenstadt, Rachel (2012). "Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text".
577: 1340: 235: 370: 308: 583: 241: 1325: 1315: 133: 1345: 1320: 1049:
Faust, Christina; Dozier, Gerry; Xu, Jinsheng; King, Michael C. (2017). "Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III".
553: 139: 882:
Bo, Haohan; Ding, Steven H. H.; Fung, Benjamin C. M.; Iqbal, Farkhund (2019). "ER-AE: Differentially Private Text Generation for Authorship Anonymization".
845:
Stolerman, Ariel; Overdorf, Rebekah; Afroz, Sadia; Greenstadt, Rachel (2014). "Breaking the Closed-World Assumption in Stylometric Authorship Attribution".
1350: 211: 1335: 415: 1330: 158: 63: 549: 540: 517: 389: 254: 202: 182: 109: 884:
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies
1310: 1218: 1185: 1098: 1065: 1032: 939: 867: 734: 655: 478: 361: 995: 966: 850: 709: 638: 342: 100: 58: 1012:
Day, Siobahn; Brown, James; Thomas, Zachery; Gregory, India; Bass, Lowell; Dozier, Gerry (2016). "Adversarial Authorship, Author
434: 1131: 1169:
Khosmood, Foaad; Levinson, Robert (2010). "Automatic Synonym and Phrase Replacement Show Promise for Style Transformation".
1082:
Stuart, Lauren M.; Tazhibayeva, Saltanat; Wagoner, Amy R.; Taylor, Julia M. (2013). "On Identifying Authors with Style".
1237: 399: 280: 33: 788:
Fernandes, Natasha; Dras, Mark; McIver, Annabelle (2018). "Author Obfuscation Using Generalised Differential Privacy".
409: 323: 444: 210:
related articles on Knowledge. If you would like to participate, please visit the project page, where you can join
471: 612:
Mihaylova, Tsvetomila; Karadjov, Georgi; Kiprov, Yasen; Georgiev, Georgi; Koychev, Ivan; Nakov, Preslav (2016).
529: 511: 1115:
Koppel, Moshe; Schler, Jonathan (2004). "Authorship verification as a one-class classification problem".
803: 380: 39: 876:
Tangential; doesn't bring much to bear on the specific question of adversarial stylometry specifically.
606:
FUTON, looked at, could potentially be useful (e.g., if exhaustively reviewing all proposed methods)
21: 923:
Khonji, Mahmoud; Iraqi, Youssesf (2015). "Stylometric Anonymity: Is Imitation the Best Strategy?".
633:
Le, Hoi; Safavi-Naini, Reihaneh; Galib, Asadullah (2015). "Secure Obfuscation of Authoring Style".
108:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1290: 1261: 1254: 1224: 1191: 1148: 1137: 1104: 1071: 1038: 1001: 945: 887: 789: 740: 713: 684: 661: 92: 839:
Looks at existing methods, nothing really interesting, groundbreaking or unique enough to go in.
1215: 1182: 1128: 1095: 1062: 1029: 992: 963: 936: 864: 731: 652: 545: 299: 1282: 1246: 1207: 1174: 1120: 1087: 1054: 1021: 984: 928: 897: 854: 723: 642: 351: 207: 1161: 816: 979:; Vescovi, Darren (2010). "Empirical evaluation of authorship obfuscation using JGAAP". 981:
Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10
425: 267: 902: 290:
Requested articles/Applied arts and sciences/Computer science, computing, and Internet
148: 1304: 1293: 976: 830: 1264: 1194: 1041: 1004: 948: 664: 1227: 1140: 1107: 1074: 743: 847:
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
548:
and mass surveillance-related topics. If you would like to participate, visit the
1018:
2016 25th International Conference on Computer Communication and Networks (ICCCN)
957: 859: 727: 683:. Proceedings of the 27th International Conference on Computational Linguistics. 647: 105: 1025: 773: 86: 1250: 1235:
Somers, Harold; Tweedie, Fiona (2003). "Authorship Attribution and Pastiche".
1058: 932: 832:
On the feasibility and impact of digital fingerprinting for system recognition
82: 1124: 988: 613: 332: 1286: 1178: 194: 176: 757: 1211: 1091: 1257: 1171:
2010 Ninth International Conference on Machine Learning and Applications
76: 52: 706:
Experimental IR Meets Multilinguality, Multimodality, and Interaction
678: 1117:
Twenty-first international conference on Machine learning - ICML '04
1084:
2013 IEEE International Conference on Systems, Man, and Cybernetics
892: 794: 718: 689: 782:
Literature review with some code; review is done better elsewhere.
1051:
2017 IEEE Symposium Series on Computational Intelligence (SSCI)
677:
Emmery, Chris; Manjavacas, Enrique; Chrupała, Grzegorz (2018).
614:"SU@PAN'2016: Author Obfuscation—Notebook for PAN at CLEF 2016" 1204:
2012 IEEE Sixth International Conference on Semantic Computing
823:
Mathematical theorising. Interesting but not worth putting in.
408:
Find pictures for the biographies of computer scientists (see
15: 627:
I think this is superseded by the authors' other paper below.
621:
CLEF 2016 Evaluation Labs and Workshop – Working Notes Papers
147: 956:
Brunton, Finn; Nissenbaum, Helen (11 September 2015).
206:, a collaborative effort to improve the coverage of 104:, a collaborative effort to improve the coverage of 959:
Obfuscation: A User's Guide for Privacy and Protest
759:
Author Obfuscation by Automatically Rewriting Texts
582:This article has not yet received a rating on the 314:Computer science articles needing expert attention 240:This article has not yet received a rating on the 138:This article has not yet received a rating on the 775:Computational Stylometry in Adversarial Settings 544:, which aims to improve Knowledge's coverage of 910:Introduces & evaluates a single new method. 1016:, and Entropy-Based Evolutionary Clustering". 454:WikiProject Computer science/Unreferenced BLPs 1356:Unknown-importance Mass surveillance articles 8: 1341:Unknown-importance Computer science articles 766:Report & evaluation of a single method. 750:Report & evaluation of a single method. 697:Report & evaluation of a single method. 671:Report & evaluation of a single method. 371:Computer science articles without infoboxes 309:Computer science articles needing attention 506: 275:Here are some tasks awaiting attention: 249: 171: 47: 901: 891: 858: 793: 717: 688: 646: 635:Information Security Theory and Practice 1326:Applied Linguistics Task Force articles 1316:Unknown-importance Linguistics articles 562:Knowledge:WikiProject Mass surveillance 508: 173: 49: 19: 1157: 1146: 812: 801: 565:Template:WikiProject Mass surveillance 220:Knowledge:WikiProject Computer science 1346:WikiProject Computer science articles 223:Template:WikiProject Computer science 7: 1321:B-Class applied linguistics articles 829:Hupperich, Thomas (23 August 2017). 200:This article is within the scope of 98:This article is within the scope of 38:It is of interest to the following 1351:B-Class Mass surveillance articles 390:Timeline of computing 2020–present 14: 1336:B-Class Computer science articles 925:2015 IEEE Trustcom/BigDataSE/ISPA 851:Lecture Notes in Computer Science 710:Lecture Notes in Computer Science 639:Lecture Notes in Computer Science 416:Computing articles needing images 118:Knowledge:WikiProject Linguistics 1331:WikiProject Linguistics articles 528: 510: 266: 193: 175: 121:Template:WikiProject Linguistics 85: 75: 51: 20: 903:10.18653/v1/2021.naacl-main.314 680:Style Obfuscation by Invariance 159:Applied Linguistics Task Force 1: 917:Non-FUTON, not even looked at 541:WikiProject Mass surveillance 470:Tag all relevant articles in 214:and see a list of open tasks. 156:This article is supported by 112:and see a list of open tasks. 1311:B-Class Linguistics articles 1238:Computers and the Humanities 860:10.1007/978-3-662-44952-3_13 728:10.1007/978-3-319-65813-1_18 479:WikiProject Computer science 255:WikiProject Computer science 203:WikiProject Computer science 1275:It - Information Technology 756:Oele, Martijn (July 2018). 712:. Vol. 10456. pp. 173–185. 648:10.1007/978-3-319-24018-3_6 410:List of computer scientists 1372: 1026:10.1109/ICCCN.2016.7568489 853:. Vol. 8827. pp. 185–205. 584:project's importance scale 568:Mass surveillance articles 242:project's importance scale 140:project's importance scale 1059:10.1109/SSCI.2017.8285355 933:10.1109/Trustcom.2015.472 641:. Vol. 9311. pp. 88–103. 581: 523: 472:Category:Computer science 248: 239: 226:Computer science articles 188: 155: 137: 70: 46: 772:de Zoeten, Rémi (2015). 474:and sub-categories with 1251:10.1023/A:1025786724466 1125:10.1145/1015330.1015448 989:10.1145/1866423.1866427 552:, or contribute to the 538:is within the scope of 101:WikiProject Linguistics 1287:10.1515/itit-2019-0046 1179:10.1109/ICMLA.2010.153 811:Cite journal requires 536:Adversarial stylometry 435:Computer science stubs 152: 28:This article is rated 151: 1212:10.1109/ICSC.2012.46 1092:10.1109/SMC.2013.520 253:Things you can help 124:Linguistics articles 64:Applied Linguistics 153: 93:Linguistics portal 34:content assessment 1220:978-1-4673-4433-3 1187:978-1-4244-9211-4 1160:value: checksum ( 1100:978-1-4799-0652-9 1086:. pp. 3048–3053. 1067:978-1-5386-2726-6 1034:978-1-5090-2279-3 941:978-1-4673-7952-6 886:. pp. 3997–4007. 869:978-3-319-12567-1 736:978-3-319-65812-4 657:978-3-319-24017-6 598: 597: 594: 593: 590: 589: 559:Mass surveillance 546:mass surveillance 518:Mass surveillance 505: 504: 501: 500: 497: 496: 493: 492: 170: 169: 166: 165: 1363: 1297: 1268: 1231: 1198: 1165: 1159: 1154: 1152: 1144: 1111: 1078: 1045: 1008: 972: 952: 907: 905: 895: 873: 862: 836: 820: 814: 809: 807: 799: 797: 779: 763: 747: 721: 694: 692: 668: 650: 624: 618: 570: 569: 566: 563: 560: 532: 525: 524: 514: 507: 483: 477: 352:Computer science 281:Article requests 270: 263: 262: 250: 228: 227: 224: 221: 218: 217:Computer science 208:Computer science 197: 190: 189: 183:Computer science 179: 172: 126: 125: 122: 119: 116: 95: 90: 89: 79: 72: 71: 66: 55: 48: 31: 25: 24: 16: 1371: 1370: 1366: 1365: 1364: 1362: 1361: 1360: 1301: 1300: 1271: 1234: 1221: 1206:. pp. 121–125. 1201: 1188: 1173:. pp. 958–961. 1168: 1155: 1145: 1134: 1114: 1101: 1081: 1068: 1048: 1035: 1011: 998: 975: 969: 955: 942: 927:. pp. 974–982. 922: 919: 881: 870: 844: 828: 810: 800: 787: 771: 755: 737: 702: 676: 658: 632: 616: 611: 608: 603: 567: 564: 561: 558: 557: 489: 486: 481: 475: 463:Project-related 458: 439: 420: 394: 375: 356: 337: 318: 294: 225: 222: 219: 216: 215: 123: 120: 117: 114: 113: 91: 84: 61: 32:on Knowledge's 29: 12: 11: 5: 1369: 1367: 1359: 1358: 1353: 1348: 1343: 1338: 1333: 1328: 1323: 1318: 1313: 1303: 1302: 1299: 1298: 1269: 1245:(4): 407–429. 1232: 1219: 1199: 1186: 1166: 1132: 1112: 1099: 1079: 1066: 1046: 1033: 1009: 996: 977:Juola, Patrick 973: 967: 953: 940: 918: 915: 914: 913: 912: 911: 879: 878: 877: 868: 842: 841: 840: 826: 825: 824: 785: 784: 783: 769: 768: 767: 753: 752: 751: 735: 700: 699: 698: 674: 673: 672: 656: 630: 629: 628: 607: 604: 602: 601:Unused sources 599: 596: 595: 592: 591: 588: 587: 580: 574: 573: 571: 533: 521: 520: 515: 503: 502: 499: 498: 495: 494: 491: 490: 488: 487: 485: 484: 467: 459: 457: 456: 450: 440: 438: 437: 431: 421: 419: 418: 413: 405: 395: 393: 392: 386: 376: 374: 373: 367: 357: 355: 354: 348: 338: 336: 335: 329: 319: 317: 316: 311: 305: 295: 293: 292: 286: 274: 272: 271: 259: 258: 246: 245: 238: 232: 231: 229: 212:the discussion 198: 186: 185: 180: 168: 167: 164: 163: 154: 144: 143: 136: 130: 129: 127: 110:the discussion 97: 96: 80: 68: 67: 56: 44: 43: 37: 26: 13: 10: 9: 6: 4: 3: 2: 1368: 1357: 1354: 1352: 1349: 1347: 1344: 1342: 1339: 1337: 1334: 1332: 1329: 1327: 1324: 1322: 1319: 1317: 1314: 1312: 1309: 1308: 1306: 1295: 1292: 1288: 1284: 1281:(2): 99–115. 1280: 1276: 1270: 1266: 1263: 1259: 1256: 1252: 1248: 1244: 1240: 1239: 1233: 1229: 1226: 1222: 1217: 1213: 1209: 1205: 1200: 1196: 1193: 1189: 1184: 1180: 1176: 1172: 1167: 1163: 1150: 1142: 1139: 1135: 1130: 1126: 1122: 1118: 1113: 1109: 1106: 1102: 1097: 1093: 1089: 1085: 1080: 1076: 1073: 1069: 1064: 1060: 1056: 1052: 1047: 1043: 1040: 1036: 1031: 1027: 1023: 1019: 1015: 1010: 1006: 1003: 999: 997:9781450300889 994: 990: 986: 982: 978: 974: 970: 968:9780262331326 965: 961: 960: 954: 950: 947: 943: 938: 934: 930: 926: 921: 920: 916: 909: 908: 904: 899: 894: 889: 885: 880: 875: 874: 871: 866: 861: 856: 852: 848: 843: 838: 837: 834: 833: 827: 822: 821: 818: 805: 796: 791: 786: 781: 780: 777: 776: 770: 765: 764: 761: 760: 754: 749: 748: 745: 742: 738: 733: 729: 725: 720: 715: 711: 707: 701: 696: 695: 691: 686: 682: 681: 675: 670: 669: 666: 663: 659: 654: 649: 644: 640: 636: 631: 626: 625: 622: 615: 610: 609: 605: 600: 585: 579: 576: 575: 572: 555: 551: 547: 543: 542: 537: 534: 531: 527: 526: 522: 519: 516: 513: 509: 480: 473: 469: 468: 466: 464: 460: 455: 452: 451: 449: 447: 446: 441: 436: 433: 432: 430: 428: 427: 422: 417: 414: 411: 407: 406: 404: 402: 401: 396: 391: 388: 387: 385: 383: 382: 377: 372: 369: 368: 366: 364: 363: 358: 353: 350: 349: 347: 345: 344: 339: 334: 331: 330: 328: 326: 325: 320: 315: 312: 310: 307: 306: 304: 302: 301: 296: 291: 288: 287: 285: 283: 282: 277: 276: 273: 269: 265: 264: 261: 260: 256: 252: 251: 247: 243: 237: 234: 233: 230: 213: 209: 205: 204: 199: 196: 192: 191: 187: 184: 181: 178: 174: 161: 160: 150: 146: 145: 141: 135: 132: 131: 128: 111: 107: 103: 102: 94: 88: 83: 81: 78: 74: 73: 69: 65: 60: 57: 54: 50: 45: 41: 35: 27: 23: 18: 17: 1278: 1274: 1242: 1236: 1203: 1170: 1116: 1083: 1050: 1017: 1013: 980: 958: 924: 883: 846: 831: 804:cite journal 774: 758: 705: 679: 634: 620: 550:project page 539: 535: 462: 461: 445:Unreferenced 443: 442: 424: 423: 398: 397: 379: 378: 360: 359: 341: 340: 322: 321: 298: 297: 279: 278: 201: 157: 99: 40:WikiProjects 1053:. pp. 1–8. 1020:. pp. 1–6. 115:Linguistics 106:linguistics 59:Linguistics 1305:Categories 1133:1581138285 893:1907.08736 795:1805.08866 719:1707.03736 690:1805.07143 554:discussion 1294:214625252 1149:cite book 1119:. p. 62. 983:. p. 14. 835:(Thesis). 813:|journal= 778:(Thesis). 762:(Thesis). 333:Computing 1265:40870902 1258:30204914 1195:16811193 1042:17584987 1005:14394643 949:39014446 665:19355829 381:Maintain 324:Copyedit 1228:8766224 1141:2545890 1108:9969606 1075:3313052 744:6456195 362:Infobox 300:Cleanup 30:B-class 1158:|isbn= 1156:Check 343:Expand 36:scale. 1291:S2CID 1262:S2CID 1255:JSTOR 1225:S2CID 1192:S2CID 1138:S2CID 1105:S2CID 1072:S2CID 1039:S2CID 1002:S2CID 946:S2CID 888:arXiv 790:arXiv 741:S2CID 714:arXiv 685:arXiv 662:S2CID 617:(PDF) 426:Stubs 400:Photo 257:with: 1216:ISBN 1183:ISBN 1162:help 1129:ISBN 1096:ISBN 1063:ISBN 1030:ISBN 1014:Webs 993:ISBN 964:ISBN 937:ISBN 865:ISBN 817:help 732:ISBN 653:ISBN 1283:doi 1247:doi 1208:doi 1175:doi 1121:doi 1088:doi 1055:doi 1022:doi 985:doi 929:doi 898:doi 855:doi 724:doi 643:doi 578:??? 236:??? 134:??? 1307:: 1289:. 1279:62 1277:. 1260:. 1253:. 1243:37 1241:. 1223:. 1214:. 1190:. 1181:. 1153:: 1151:}} 1147:{{ 1136:. 1127:. 1103:. 1094:. 1070:. 1061:. 1037:. 1028:. 1000:. 991:. 962:. 944:. 935:. 896:. 863:. 849:. 808:: 806:}} 802:{{ 739:. 730:. 722:. 708:. 660:. 651:. 637:. 619:. 482:}} 476:{{ 62:: 1296:. 1285:: 1267:. 1249:: 1230:. 1210:: 1197:. 1177:: 1164:) 1143:. 1123:: 1110:. 1090:: 1077:. 1057:: 1044:. 1024:: 1007:. 987:: 971:. 951:. 931:: 906:. 900:: 890:: 872:. 857:: 819:) 815:( 798:. 792:: 746:. 726:: 716:: 693:. 687:: 667:. 645:: 623:. 586:. 556:. 465:: 448:: 429:: 412:) 403:: 384:: 365:: 346:: 327:: 303:: 284:: 244:. 162:. 142:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Linguistics
Applied Linguistics
WikiProject icon
icon
Linguistics portal
WikiProject Linguistics
linguistics
the discussion
???
project's importance scale
Taskforce icon
Applied Linguistics Task Force
WikiProject icon
Computer science
WikiProject icon
WikiProject Computer science
Computer science
the discussion
???
project's importance scale
WikiProject Computer science

Article requests
Requested articles/Applied arts and sciences/Computer science, computing, and Internet
Cleanup
Computer science articles needing attention

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.