Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Attribution and obfuscation of neural text authorship: A data mining perspective

A Uchendu, T Le, D Lee - ACM SIGKDD Explorations Newsletter, 2023 - dl.acm.org
Two interlocking research questions of growing interest and importance in privacy research
are Authorship Attribution (AA) and Authorship Obfuscation (AO). Given an artifact …

Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location

L Fridman, S Weber, R Greenstadt… - IEEE Systems …, 2016 - ieeexplore.ieee.org
Active authentication is the problem of continuously verifying the identity of a person based
on behavioral aspects of their interaction with a computing device. In this paper, we collect …

[PDF][PDF] Generalised differential privacy for text document processing

N Fernandes, M Dras, A McIver - … , POST 2019, Held as Part of the …, 2019 - library.oapen.org
We address the problem of how to “obfuscate” texts by removing stylistic clues which can
identify authorship, whilst preserving (as much as possible) the content of the text. In this …

When coding style survives compilation: De-anonymizing programmers from executable binaries

A Caliskan, F Yamaguchi, E Dauber, R Harang… - arXiv preprint arXiv …, 2015 - arxiv.org
The ability to identify authors of computer programs based on their coding style is a direct
threat to the privacy and anonymity of programmers. While recent work found that source …

Doppelgänger finder: Taking stylometry to the underground

S Afroz, AC Islam, A Stolerman… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Stylometry is a method for identifying anonymous authors of anonymous texts by analyzing
their writing style. While stylometric methods have produced impressive results in previous …

[PDF][PDF] Obfuscating gender in social media writing

S Reddy, K Knight - Proceedings of the First Workshop on NLP …, 2016 - aclanthology.org
The vast availability of textual data on social media has led to an interest in algorithms to
predict user attributes such as gender based on the user's writing. These methods are …

{A4NT}: Author attribute anonymity by adversarial training of neural machine translation

R Shetty, B Schiele, M Fritz - 27th USENIX Security Symposium (USENIX …, 2018 - usenix.org
Text-based analysis methods enable an adversary to reveal privacy relevant author
attributes such as gender, age and can identify the text's author. Such methods can …

Use of machine learning in big data analytics for insider threat detection

M Mayhew, M Atighetchi, A Adler… - MILCOM 2015-2015 …, 2015 - ieeexplore.ieee.org
In current enterprise environments, information is becoming more readily accessible across
a wide range of interconnected systems. However, trustworthiness of documents and actors …

Emailprofiler: Spearphishing filtering with header and stylometric features of emails

S Duman, K Kalkan-Cakmakci, M Egele… - 2016 IEEE 40th …, 2016 - ieeexplore.ieee.org
Spearphishing is a prominent targeted attack vector in today's Internet. By impersonating
trusted email senders through carefully crafted messages and spoofed metadata …