This article is rated B-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | |||||||||||||||||||||||||||||||||||||||||
|
Unused sources
editFUTON, looked at, could potentially be useful (e.g., if exhaustively reviewing all proposed methods)
edit- Mihaylova, Tsvetomila; Karadjov, Georgi; Kiprov, Yasen; Georgiev, Georgi; Koychev, Ivan; Nakov, Preslav (2016). "SU@PAN'2016: Author Obfuscation—Notebook for PAN at CLEF 2016" (PDF). CLEF 2016 Evaluation Labs and Workshop – Working Notes Papers.
- I think this is superseded by the authors' other paper below.
- Le, Hoi; Safavi-Naini, Reihaneh; Galib, Asadullah (2015). "Secure Obfuscation of Authoring Style". Information Security Theory and Practice. Lecture Notes in Computer Science. Vol. 9311. pp. 88–103. doi:10.1007/978-3-319-24018-3_6. ISBN 978-3-319-24017-6. S2CID 19355829.
- Report & evaluation of a single method.
- Emmery, Chris; Manjavacas, Enrique; Chrupała, Grzegorz (2018). Style Obfuscation by Invariance. Proceedings of the 27th International Conference on Computational Linguistics. arXiv:1805.07143.
- Report & evaluation of a single method.
- Karadjov, Georgi; Mihaylova, Tsvetomila; Kiprov, Yasen; Georgiev, Georgi; Koychev, Ivan; Nakov, Preslav (2017). "The Case for Being Average: A Mediocrity Approach to Style Masking and Author Obfuscation". Experimental IR Meets Multilinguality, Multimodality, and Interaction. Lecture Notes in Computer Science. Vol. 10456. pp. 173–185. arXiv:1707.03736. doi:10.1007/978-3-319-65813-1_18. ISBN 978-3-319-65812-4. S2CID 6456195.
- Report & evaluation of a single method.
- Oele, Martijn (July 2018). Author Obfuscation by Automatically Rewriting Texts (Thesis).
- Report & evaluation of a single method.
- de Zoeten, Rémi (2015). Computational Stylometry in Adversarial Settings (Thesis).
- Literature review with some code; review is done better elsewhere.
- Fernandes, Natasha; Dras, Mark; McIver, Annabelle (2018). "Author Obfuscation Using Generalised Differential Privacy". arXiv:1805.08866.
{{cite journal}}
: Cite journal requires|journal=
(help)- Mathematical theorising. Interesting but not worth putting in.
- Hupperich, Thomas (23 August 2017). On the feasibility and impact of digital fingerprinting for system recognition (Thesis).
- Looks at existing methods, nothing really interesting, groundbreaking or unique enough to go in.
- Stolerman, Ariel; Overdorf, Rebekah; Afroz, Sadia; Greenstadt, Rachel (2014). "Breaking the Closed-World Assumption in Stylometric Authorship Attribution". Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications. Lecture Notes in Computer Science. Vol. 8827. pp. 185–205. doi:10.1007/978-3-662-44952-3_13. ISBN 978-3-319-12567-1.
- Tangential; doesn't bring much to bear on the specific question of adversarial stylometry specifically.
- Bo, Haohan; Ding, Steven H. H.; Fung, Benjamin C. M.; Iqbal, Farkhund (2019). "ER-AE: Differentially Private Text Generation for Authorship Anonymization". Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. pp. 3997–4007. arXiv:1907.08736. doi:10.18653/v1/2021.naacl-main.314.
- Introduces & evaluates a single new method.
Non-FUTON, not even looked at
edit- Khonji, Mahmoud; Iraqi, Youssesf (2015). "Stylometric Anonymity: Is Imitation the Best Strategy?". 2015 IEEE Trustcom/BigDataSE/ISPA. pp. 974–982. doi:10.1109/Trustcom.2015.472. ISBN 978-1-4673-7952-6. S2CID 39014446.
- Brunton, Finn; Nissenbaum, Helen (11 September 2015). Obfuscation: A User's Guide for Privacy and Protest. ISBN 9780262331326.
- Juola, Patrick; Vescovi, Darren (2010). "Empirical evaluation of authorship obfuscation using JGAAP". Proceedings of the 3rd ACM workshop on Artificial intelligence and security - AISec '10. p. 14. doi:10.1145/1866423.1866427. ISBN 9781450300889. S2CID 14394643.
- Day, Siobahn; Brown, James; Thomas, Zachery; Gregory, India; Bass, Lowell; Dozier, Gerry (2016). "Adversarial Authorship, Author Webs, and Entropy-Based Evolutionary Clustering". 2016 25th International Conference on Computer Communication and Networks (ICCCN). pp. 1–6. doi:10.1109/ICCCN.2016.7568489. ISBN 978-1-5090-2279-3. S2CID 17584987.
- Faust, Christina; Dozier, Gerry; Xu, Jinsheng; King, Michael C. (2017). "Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III". 2017 IEEE Symposium Series on Computational Intelligence (SSCI). pp. 1–8. doi:10.1109/SSCI.2017.8285355. ISBN 978-1-5386-2726-6. S2CID 3313052.
- Stuart, Lauren M.; Tazhibayeva, Saltanat; Wagoner, Amy R.; Taylor, Julia M. (2013). "On Identifying Authors with Style". 2013 IEEE International Conference on Systems, Man, and Cybernetics. pp. 3048–3053. doi:10.1109/SMC.2013.520. ISBN 978-1-4799-0652-9. S2CID 9969606.
- Koppel, Moshe; Schler, Jonathan (2004). "Authorship verification as a one-class classification problem". Twenty-first international conference on Machine learning - ICML '04. p. 62. doi:10.1145/1015330.1015448. ISBN 1581138285. S2CID 2545890.
{{cite book}}
: Check|isbn=
value: checksum (help) - Khosmood, Foaad; Levinson, Robert (2010). "Automatic Synonym and Phrase Replacement Show Promise for Style Transformation". 2010 Ninth International Conference on Machine Learning and Applications. pp. 958–961. doi:10.1109/ICMLA.2010.153. ISBN 978-1-4244-9211-4. S2CID 16811193.
- Caliskan, Aylin; Greenstadt, Rachel (2012). "Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text". 2012 IEEE Sixth International Conference on Semantic Computing. pp. 121–125. doi:10.1109/ICSC.2012.46. ISBN 978-1-4673-4433-3. S2CID 8766224.
- Somers, Harold; Tweedie, Fiona (2003). "Authorship Attribution and Pastiche". Computers and the Humanities. 37 (4): 407–429. doi:10.1023/A:1025786724466. JSTOR 30204914. S2CID 40870902.
- Bevendorff, Janek; Wenzel, Tobias; Potthast, Martin; Hagen, Matthias; Stein, Benno (2020). "On divergence-based author obfuscation: An attack on the state of the art in statistical authorship verification". It - Information Technology. 62 (2): 99–115. doi:10.1515/itit-2019-0046. S2CID 214625252.