Adversarial stylometry

Author:

Brennan Michael1,Afroz Sadia1,Greenstadt Rachel1

Affiliation:

1. Drexel University

Abstract

The use of stylometry, authorship recognition through purely linguistic means, has contributed to literary, historical, and criminal investigation breakthroughs. Existing stylometry research assumes that authors have not attempted to disguise their linguistic writing style. We challenge this basic assumption of existing stylometry methodologies and present a new area of research: adversarial stylometry. Adversaries have a devastating effect on the robustness of existing classification methods. Our work presents a framework for creating adversarial passages including obfuscation , where a subject attempts to hide her identity, and imitation , where a subject attempts to frame another subject by imitating his writing style, and translation where original passages are obfuscated with machine translation services. This research demonstrates that manual circumvention methods work very well while automated translation methods are not effective. The obfuscation method reduces the techniques' effectiveness to the level of random guessing and the imitation attempts succeed up to 67% of the time depending on the stylometry technique used. These results are more significant given the fact that experimental subjects were unfamiliar with stylometry, were not professional writers, and spent little time on the attacks. This article also contributes to the field by using human subjects to empirically validate the claim of high accuracy for four current techniques (without adversaries). We have also compiled and released two corpora of adversarial stylometry texts to promote research in this field with a total of 57 unique authors. We argue that this field is important to a multidisciplinary approach to privacy, security, and anonymity.

Funder

Intel Corporation

Defense Advanced Research Projects Agency

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference26 articles.

1. Writeprints

2. Adams C. 2006. With a little help from my friends (and colleagues): The multidisciplinary requirement for privacy. http://www.idtrail.org/content/view/402/42/. Adams C. 2006. With a little help from my friends (and colleagues): The multidisciplinary requirement for privacy. http://www.idtrail.org/content/view/402/42/.

3. Detecting Hoaxes, Frauds, and Deception in Writing Style Online

4. Brennan M. and Greenstadt R. 2009. Practical attacks on authorship recognition techniques. Innov. Appl. Artif. Intell. Brennan M. and Greenstadt R. 2009. Practical attacks on authorship recognition techniques. Innov. Appl. Artif. Intell.

Cited by 110 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets;ACM Computing Surveys;2024-04-30

2. On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise;Proceedings of the ACM on Human-Computer Interaction;2024-04-17

3. Computational thematics: comparing algorithms for clustering the genres of literary fiction;Humanities and Social Sciences Communications;2024-03-20

4. Reframing and Broadening Adversarial Stylometry for Academic Integrity;Springer International Handbooks of Education;2024

5. TDRLM: Stylometric learning for authorship verification by Topic-Debiasing;Expert Systems with Applications;2023-12

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3