A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
暂无分享,去创建一个
[1] Daniel Castro-Castro,et al. Author Masking by Sentence Transformation , 2017, CLEF.
[2] Minh N. Do,et al. Semantic Image Inpainting with Perceptual and Contextual Losses , 2016, ArXiv.
[3] Navdeep Jaitly,et al. Sequence-to-Sequence Models Can Directly Transcribe Foreign Speech , 2017, ArXiv.
[4] Patrick Juola,et al. Authorship Attribution , 2008, Found. Trends Inf. Retr..
[5] Alexei A. Efros,et al. Unpaired Image-to-Image Translation Using Cycle-Consistent Adversarial Networks , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[6] Arvind Narayanan,et al. De-anonymizing Programmers via Code Stylometry , 2015, USENIX Security Symposium.
[7] Sanja Fidler,et al. Skip-Thought Vectors , 2015, NIPS.
[8] Alon Lavie,et al. Meteor Universal: Language Specific Translation Evaluation for Any Target Language , 2014, WMT@ACL.
[9] Lantao Yu,et al. SeqGAN: Sequence Generative Adversarial Nets with Policy Gradient , 2016, AAAI.
[10] G. Peters,et al. Going Public: Using New Data from the American Presidency Project , 2008 .
[11] Ben Poole,et al. Categorical Reparameterization with Gumbel-Softmax , 2016, ICLR.
[12] Regina Barzilay,et al. Style Transfer from Non-Parallel Text by Cross-Alignment , 2017, NIPS.
[13] Eneko Agirre,et al. SemEval-2016 Task 1: Semantic Textual Similarity, Monolingual and Cross-Lingual Evaluation , 2016, *SEMEVAL.
[14] Bernt Schiele,et al. Speaking the Same Language: Matching Machine to Human Captions by Adversarial Training , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[15] Jürgen Schmidhuber,et al. Recurrent Highway Networks , 2016, ICML.
[16] Michael Gamon,et al. Obfuscating Document Stylometry to Preserve Author Anonymity , 2006, ACL.
[17] Sameep Mehta,et al. Towards Crafting Text Adversarial Samples , 2017, ArXiv.
[18] Christopher D. Manning,et al. Incorporating Non-local Information into Information Extraction Systems by Gibbs Sampling , 2005, ACL.
[19] Prasenjit Majumder,et al. Author Masking through Translation , 2016, CLEF.
[20] Robert F. Chew,et al. Predicting age groups of Twitter users based on language and metadata features , 2017, PloS one.
[21] Hsinchun Chen,et al. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace , 2008, TOIS.
[22] William J. Clinton. The American Presidency Project , 2011 .
[23] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[24] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[25] Xirong Li,et al. Deep Text Classification Can be Fooled , 2017, IJCAI.
[26] Desmond Elliott,et al. Findings of the Second Shared Task on Multimodal Machine Translation and Multilingual Image Description , 2017, WMT.
[27] Emerson Murphy-Hill,et al. Gender differences and bias in open source: pull request acceptance of women versus men , 2017, PeerJ Comput. Sci..
[28] Rachel Greenstadt,et al. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity , 2012, TSEC.
[29] Ralph Grishman,et al. Paraphrasing for Style , 2012, COLING.
[30] Ariel Stolerman,et al. Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization , 2012, Privacy Enhancing Technologies.
[31] Efstathios Stamatatos,et al. A survey of modern authorship attribution methods , 2009, J. Assoc. Inf. Sci. Technol..
[32] Shlomo Argamon,et al. Automatically profiling the author of an anonymous text , 2009, CACM.
[33] Douglas Bagnall,et al. Author Identification Using Multi-headed Recurrent Neural Networks , 2015, CLEF.
[34] Seong Joon Oh,et al. Adversarial Image Perturbation for Privacy Protection A Game Theory Perspective , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).
[35] J. Oberlander,et al. Proceedings of the COLING/ACL on Main Conference Poster Sessions , 2006 .
[36] Ronald J. Williams,et al. Simple Statistical Gradient-Following Algorithms for Connectionist Reinforcement Learning , 2004, Machine Learning.
[37] Yoshua Bengio,et al. A Character-level Decoder without Explicit Segmentation for Neural Machine Translation , 2016, ACL.
[38] Davood Rafiei,et al. Predicting political preference of Twitter users , 2013, ASONAM.
[39] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[40] Eduard H. Hovy,et al. End-to-end Sequence Labeling via Bi-directional LSTM-CNNs-CRF , 2016, ACL.
[41] Jeffrey Pennington,et al. GloVe: Global Vectors for Word Representation , 2014, EMNLP.
[42] Jason Lee,et al. Fully Character-Level Neural Machine Translation without Explicit Segmentation , 2016, TACL.
[43] Hang Li,et al. Paraphrase Generation with Deep Reinforcement Learning , 2017, EMNLP.
[44] Rachel Greenstadt,et al. Detecting Hoaxes, Frauds, and Deception in Writing Style Online , 2012, 2012 IEEE Symposium on Security and Privacy.
[45] Pankaj Rohatgi,et al. Can Pseudonymity Really Guarantee Privacy? , 2000, USENIX Security Symposium.
[46] Ariel Stolerman,et al. Doppelgänger Finder: Taking Stylometry to the Underground , 2014, 2014 IEEE Symposium on Security and Privacy.
[47] Percy Liang,et al. Adversarial Examples for Evaluating Reading Comprehension Systems , 2017, EMNLP.
[48] L. Sweeney. Simple Demographics Often Identify People Uniquely , 2000 .
[49] Rachel Greenstadt,et al. Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text , 2012, 2012 IEEE Sixth International Conference on Semantic Computing.
[50] Jian Sun,et al. Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[51] Preslav Nakov,et al. The Case for Being Average: A Mediocrity Approach to Style Masking and Author Obfuscation - (Best of the Labs Track at CLEF-2017) , 2017, CLEF.
[52] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[53] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[54] Dawn Xiaodong Song,et al. On the Feasibility of Internet-Scale Author Identification , 2012, 2012 IEEE Symposium on Security and Privacy.
[55] Teruo Higashino,et al. Twitter user profiling based on text and community mining for market analysis , 2013, Knowl. Based Syst..
[56] Yee Whye Teh,et al. The Concrete Distribution: A Continuous Relaxation of Discrete Random Variables , 2016, ICLR.
[57] Quoc V. Le,et al. Sequence to Sequence Learning with Neural Networks , 2014, NIPS.
[58] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[59] David A. Wagner,et al. Towards Evaluating the Robustness of Neural Networks , 2016, 2017 IEEE Symposium on Security and Privacy (SP).
[60] John G. Breslin,et al. Character-level and Multi-channel Convolutional Neural Networks for Large-scale Authorship Attribution , 2016, ArXiv.
[61] Shlomo Argamon,et al. Effects of Age and Gender on Blogging , 2006, AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs.
[62] Christopher Potts,et al. A large annotated corpus for learning natural language inference , 2015, EMNLP.
[63] R. Steinpreis,et al. The Impact of Gender on the Review of the Curricula Vitae of Job Applicants and Tenure Candidates: A National Empirical Study , 1999 .
[64] Holger Schwenk,et al. Supervised Learning of Universal Sentence Representations from Natural Language Inference Data , 2017, EMNLP.
[65] George Kurian,et al. Google's Neural Machine Translation System: Bridging the Gap between Human and Machine Translation , 2016, ArXiv.
[66] Rachel Greenstadt,et al. Blogs, Twitter Feeds, and Reddit Comments: Cross-domain Authorship Attribution , 2016, Proc. Priv. Enhancing Technol..
[67] Alan Ritter,et al. Adversarial Learning for Neural Dialogue Generation , 2017, EMNLP.