暂无分享,去创建一个
[1] Kilian Q. Weinberger,et al. BERTScore: Evaluating Text Generation with BERT , 2019, ICLR.
[2] Rachel Greenstadt,et al. Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text , 2012, 2012 IEEE Sixth International Conference on Semantic Computing.
[3] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[4] Prasenjit Majumder,et al. Author Masking through Translation , 2016, CLEF.
[5] Joseph P. Turian,et al. Evaluation of machine translation and its evaluation , 2003, MTSUMMIT.
[6] Jiajun Wu,et al. Learning a Probabilistic Latent Space of Object Shapes via 3D Generative-Adversarial Modeling , 2016, NIPS.
[7] Léon Bottou,et al. Towards Principled Methods for Training Generative Adversarial Networks , 2017, ICLR.
[8] Dawn Xiaodong Song,et al. On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Michaela Mahlberg,et al. Corpus Stylistics and Dickens's Fiction , 2012 .
[10] Padmini Srinivasan,et al. A Girl Has No Name: Automated Authorship Obfuscation using Mutant-X , 2019, Proc. Priv. Enhancing Technol..
[11] Salim Roukos,et al. Bleu: a Method for Automatic Evaluation of Machine Translation , 2002, ACL.
[12] Wojciech Zaremba,et al. Improved Techniques for Training GANs , 2016, NIPS.
[13] Benjamin C. M. Fung,et al. ER-AE: Differentially Private Text Generation for Authorship Anonymization , 2019, NAACL.
[14] Ben Poole,et al. Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.
[15] Walter Daelemans,et al. Explanation in Computational Stylometry , 2013, CICLing.
[16] Arvind Narayanan,et al. When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries , 2015, NDSS.
[17] Ksenia Lagutina,et al. A Survey on Stylometric Text Features , 2019, 2019 25th Conference of Open Innovations Association (FRUCT).
[18] Ari Rappoport,et al. BLEU is Not Suitable for the Evaluation of Text Simplification , 2018, EMNLP.
[19] Taher Rahgooy,et al. Author Obfuscation using WordNet and Language Models , 2016, CLEF.
[20] Samy Bengio,et al. Scheduled Sampling for Sequence Prediction with Recurrent Neural Networks , 2015, NIPS.
[21] Jonathon Shlens,et al. Conditional Image Synthesis with Auxiliary Classifier GANs , 2016, ICML.
[22] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[23] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[24] Eric P. Xing,et al. Unsupervised Text Style Transfer using Language Models as Discriminators , 2018, NeurIPS.
[25] Chris Emmery,et al. Style Obfuscation by Invariance , 2018, COLING.
[26] Lukasz Kaiser,et al. Attention is All you Need , 2017, NIPS.
[27] Rachel Greenstadt,et al. Detecting Hoaxes, Frauds, and Deception in Writing Style Online , 2012, 2012 IEEE Symposium on Security and Privacy.
[28] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[29] Tomas Mikolov,et al. Advances in Pre-Training Distributed Word Representations , 2017, LREC.
[30] Yong Yu,et al. Long Text Generation via Adversarial Training with Leaked Information , 2017, AAAI.
[31] Yang Feng,et al. Bridging the Gap between Training and Inference for Neural Machine Translation , 2019, ACL.
[32] Wenbin Cai,et al. Separating Style and Content for Generalized Style Transfer , 2017, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[33] F. Mosteller,et al. Inference in an Authorship Problem , 1963 .
[34] Yiming Yang,et al. RCV1: A New Benchmark Collection for Text Categorization Research , 2004, J. Mach. Learn. Res..
[35] Ilya Sutskever,et al. Language Models are Unsupervised Multitask Learners , 2019 .
[36] Aaron C. Courville,et al. Improved Training of Wasserstein GANs , 2017, NIPS.
[37] Léon Bottou,et al. Wasserstein GAN , 2017, ArXiv.
[38] Eric Jardine,et al. Tor, what is it good for? Political repression and the use of online anonymity-granting technologies , 2018, New Media Soc..
[39] Yee Whye Teh,et al. The Concrete Distribution: A Continuous Relaxation of Discrete Random Variables , 2016, ICLR.
[40] Mike Schuster,et al. Japanese and Korean voice search , 2012, 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[41] Bernt Schiele,et al. $A^{4}NT$: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation , 2017, 1711.01921.
[42] Yoon Kim,et al. Convolutional Neural Networks for Sentence Classification , 2014, EMNLP.
[43] Chong Luo,et al. A Twofold Siamese Network for Real-Time Object Tracking , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[44] John G. Breslin,et al. Character-level and Multi-channel Convolutional Neural Networks for Large-scale Authorship Attribution , 2016, ArXiv.
[45] Ariel Stolerman,et al. Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization , 2012, Privacy Enhancing Technologies.
[46] Andrew M. Dai,et al. MaskGAN: Better Text Generation via Filling in the ______ , 2018, ICLR.
[47] Ehud Reiter,et al. A Structured Review of the Validity of BLEU , 2018, CL.
[48] Sepp Hochreiter,et al. GANs Trained by a Two Time-Scale Update Rule Converge to a Nash Equilibrium , 2017, ArXiv.
[49] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[50] Gregory R. Koch,et al. Siamese Neural Networks for One-Shot Image Recognition , 2015 .
[51] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.