Recent advances in computational stylometry have demonstrated that automatically inferring quite an extensive set of personal attributes from text alone (e.g. gender, age, education, socio-economic status, mental health issues) is not only feasible, but can often rely on little supervision. This application opens up potential for both industry and academia to uncover 'hidden' demographics for a large volume of social media accounts. It can be safely assumed that the majority of users of these media are not aware the latent information they are sharing, creating a false sense of privacy that can be easily abused by third parties. Even if they we aware, they would have no countermeasures at their disposal other than self-censorship. One of th...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...
Abstract Attribute inference—the process of analyzing publicly available data in order to uncover hi...
Stylometric authorship attribution aims to identify an anonymous or disputed document’s author by ex...
Text-based analysis methods allow to reveal privacy relevant author attributes such as gender, age a...
Theoretical thesis.Bibliography: pages 53-56.1. Introduction -- 2. Literature review -- 3. Replicati...
For those who write anonymously, particularly for safety reasons, authorship attribution poses a thr...
In this paper, we propose a new privacy solution for the data used to train a recommender system, i....
For those who write anonymously, particularly for safety reasons, authorship attribution poses a thr...
We study techniques for identifying an anonymous author via linguistic stylometry, i.e., comparing t...
Part 2: FORENSIC TECHNIQUESInternational audienceAuthorship attribution is an important and emerging...
Abstract—In digital forensics, questions often arise about the authors of documents: their identity,...
Contextual word representations generated by language models learn spurious associations present in ...
© 2020 Association for Computational Linguistics. Recent developments in neural language models (LMs...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...
Abstract Attribute inference—the process of analyzing publicly available data in order to uncover hi...
Stylometric authorship attribution aims to identify an anonymous or disputed document’s author by ex...
Text-based analysis methods allow to reveal privacy relevant author attributes such as gender, age a...
Theoretical thesis.Bibliography: pages 53-56.1. Introduction -- 2. Literature review -- 3. Replicati...
For those who write anonymously, particularly for safety reasons, authorship attribution poses a thr...
In this paper, we propose a new privacy solution for the data used to train a recommender system, i....
For those who write anonymously, particularly for safety reasons, authorship attribution poses a thr...
We study techniques for identifying an anonymous author via linguistic stylometry, i.e., comparing t...
Part 2: FORENSIC TECHNIQUESInternational audienceAuthorship attribution is an important and emerging...
Abstract—In digital forensics, questions often arise about the authors of documents: their identity,...
Contextual word representations generated by language models learn spurious associations present in ...
© 2020 Association for Computational Linguistics. Recent developments in neural language models (LMs...
Social media platforms allow billions of individuals to share their thoughts, likes and dislikes in ...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...
Textual deception constitutes a major problem for online security. Many studies have argued that dec...