Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers. However, personal writing style, as a strong indicator of the authorship, is often neglected. Recent studies on writing style anonymization can only output numeric vectors which are difficult for the recipients to interpret. We propose a novel text generation model with the exponential mechanism for authorship anonymization. By augmenting the semantic information through a REINFORCE training reward function, the model can generate differentially-private text that has a close semantic and similar grammatical structure to the original text while removing personal traits of the writing style. It does not assume any conditioned labels or parall...
With the rapid increase in the use and implementation of AI in the journalism industry, the ethical ...
© 2011, SAGE Publications Ltd. All rights reserved. This content analysis of The Washington Post and...
In the previous chapters, the different aspects of the authorship analysis problem were discussed. T...
© 2019 IEEE. Text mining is one of the main and typical tasks of machine learning (ML). Authorship i...
© 2013 IEEE. Authorship analysis (AA) is the study of unveiling the hidden properties of authors fro...
With time, textual data is proliferating, primarily through the publications of articles. With this ...
© 2017, Springer-Verlag London Ltd., part of Springer Nature. Various organizations collect data abo...
This chapter presents a novel approach to frequent-pattern based Writeprint creation, and addresses ...
©2019 Copyright held by the author(s). Computing-intensive experiences in modern sciences have becom...
© 2018 IEEE. Authorship Verification is considered as a topic of growing interest in research, which...
This chapter discusses authorship attribution through a training sample. The focus on authorship att...
This chapter presents an overview of authorship analysis from multiple standpoints. It includes hist...
© 2018 ACM Law enforcement faces problems in tracing the true identity of offenders in cybercrime in...
© 2016 IEEE. In tweet authentication, we are concerned with correctly attributing a tweet to its tru...
© 2016 Elsevier B.V. All rights reserved. Business enterprises adopt cloud integration services to i...
With the rapid increase in the use and implementation of AI in the journalism industry, the ethical ...
© 2011, SAGE Publications Ltd. All rights reserved. This content analysis of The Washington Post and...
In the previous chapters, the different aspects of the authorship analysis problem were discussed. T...
© 2019 IEEE. Text mining is one of the main and typical tasks of machine learning (ML). Authorship i...
© 2013 IEEE. Authorship analysis (AA) is the study of unveiling the hidden properties of authors fro...
With time, textual data is proliferating, primarily through the publications of articles. With this ...
© 2017, Springer-Verlag London Ltd., part of Springer Nature. Various organizations collect data abo...
This chapter presents a novel approach to frequent-pattern based Writeprint creation, and addresses ...
©2019 Copyright held by the author(s). Computing-intensive experiences in modern sciences have becom...
© 2018 IEEE. Authorship Verification is considered as a topic of growing interest in research, which...
This chapter discusses authorship attribution through a training sample. The focus on authorship att...
This chapter presents an overview of authorship analysis from multiple standpoints. It includes hist...
© 2018 ACM Law enforcement faces problems in tracing the true identity of offenders in cybercrime in...
© 2016 IEEE. In tweet authentication, we are concerned with correctly attributing a tweet to its tru...
© 2016 Elsevier B.V. All rights reserved. Business enterprises adopt cloud integration services to i...
With the rapid increase in the use and implementation of AI in the journalism industry, the ethical ...
© 2011, SAGE Publications Ltd. All rights reserved. This content analysis of The Washington Post and...
In the previous chapters, the different aspects of the authorship analysis problem were discussed. T...