401 Hits in 6.2 sec

Overview of PAN 2018 [chapter]

Efstathios Stamatatos, Francisco Rangel, Michael Tschuggnall, Benno Stein, Mike Kestemont, Paolo Rosso, Martin Potthast
2018 Lecture Notes in Computer Science  
PAN 2018 explores several authorship analysis tasks enabling a systematic comparison of competitive approaches and advancing research in digital text forensics.  ...  Finally, the author obfuscation task studies how a text by a certain author can be paraphrased so that existing author identification tools are confused and cannot recognize the similarity with other texts  ...  Acknowledgments Our special thanks go to all of PAN's participants, to Symanto Group 7 for sponsoring PAN and to MeaningCloud 8 for sponsoring the author profiling shared task award.  ... 
doi:10.1007/978-3-319-98932-7_25 fatcat:7kjolzjqzncvfbv3mcxyhfchyu

Shared Tasks on Authorship Analysis at PAN 2020 [chapter]

Janek Bevendorff, Bilal Ghanem, Anastasia Giachanou, Mike Kestemont, Enrique Manjavacas, Martin Potthast, Francisco Rangel, Paolo Rosso, Günther Specht, Efstathios Stamatatos, Benno Stein, Matti Wiegmann (+1 others)
2020 Lecture Notes in Computer Science  
The tasks include author profiling, celebrity profiling, crossdomain author verification, and style change detection, seeking to advance the state of the art and to evaluate it on new benchmark datasets  ...  The paper gives a brief overview of the four shared tasks that are to be organized at the PAN 2020 lab on digital text forensics and stylometry, hosted at CLEF conference.  ...  safeness, soundness, and/or sensibleness of an obfuscation software (2016) (2017) (2018) .  ... 
doi:10.1007/978-3-030-45442-5_66 fatcat:c7yewwmji5hwjgmda5ouhloia4

Academic Plagiarism Detection

Tomáš Foltýnek, Norman Meuschke, Bela Gipp
2019 ACM Computing Surveys  
Over the period we review, the field has seen major advances regarding the automated detection of strongly obfuscated and thus hard-to-identify forms of academic plagiarism.  ...  The high intensity and rapid pace of research on academic plagiarism detection make it difficult for researchers to get an overview of the field.  ...  Author identification methods achieve a precision of approximately 60%, author profiling methods of approximately 80% [200] .  ... 
doi:10.1145/3345317 fatcat:yk6f5xl2kvdxlhvsolem6zfdsu

Multilingual Author Profiling using LSTMs: Notebook for PAN at CLEF 2018

Roy Khristopher Bayot, Teresa Gonçalves
2018 Conference and Labs of the Evaluation Forum  
This paper shows one approach of the Universidade de Évora for author profiling for PAN 2018. The approach mainly consists of using word vectors and LSTMs for gender classification.  ...  Using the PAN 2018 dataset, we achieved an accuracy of 67.60% for Arabic, 77.16% for English, and 68.73% for Spanish gender classification.  ...  PAN Editions PAN is one of the initiatives at CLEF that has various tasks related to author analysis. It has author identification, obfuscation, and profiling.  ... 
dblp:conf/clef/BayotG18 fatcat:7gjohpuljvbbjnfc75vuj7f5u4

Fine-grained analysis of language varieties and demographics

Francisco Rangel, Paolo Rosso, Wajdi Zaghouani, Anis Charfi
2020 Natural Language Engineering  
We compared the performance of this method with the best performing teams in the Author Profiling task at PAN 2017.  ...  We obtained an average accuracy of 92.08% versus 91.84% for the best performing team at PAN 2017. We also analyse the relationship of the language variety identification with the authors' gender.  ...  The statements made herein are solely the responsibility of the authors. References  ... 
doi:10.1017/s1351324920000108 fatcat:mdk2yxafbjffnhm5te3b7lscxe

STEREO: Scientific Text Reuse in Open Access Publications [article]

Lukas Gienapp, Wolfgang Kircheis, Bjarne Sievers, Benno Stein, Martin Potthast
2021 arXiv   pre-print
Featuring a high coverage of scientific disciplines and varieties of reuse, as well as comprehensive metadata to contextualize each case, our dataset addresses the most salient shortcomings of previous  ...  Webis-STEREO-21 allows for tackling a wide range of research questions from different scientific backgrounds, facilitating both qualitative and quantitative analysis of the phenomenon as well as a first-time  ...  The heavily obfuscated test sets studied at PAN were dedicated to study extreme cases of plagiarism, where an author expends much effort to hide the fact via severe forms of paraphrasing.  ... 
arXiv:2112.11800v1 fatcat:d74wspv4hrdajkkziyor6273gq

Analyzing Non-Textual Content Elements to Detect Academic Plagiarism

Norman Meuschke, Bela Gipp, Harald Reiterer, Michael L. Nelson
2021 Zenodo  
To improve the identification of plagiarism in disciplines like mathematics, physics, and engineering, the thesis presents the first plagiarism detection approach that analyzes the similarity of mathematical  ...  However, reliably detecting disguised plagiarism, such as strong paraphrases, sense-for-sense translations, and the reuse of non-textual content and ideas, is an open research problem.  ...  Author identification methods achieve a precision of approximately 60%, author profiling methods of approximately 80% Therefore, most plagiarism detection research addresses the external paradigm.  ... 
doi:10.5281/zenodo.4913344 fatcat:xmpaahvwuva53l5l5i2gaidvi4

Machine learning and genomics: precision medicine versus patient privacy

C.-A. Azencott
2018 Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences  
Researchers, study participants and governing bodies should be aware of the ways in which the privacy of participants might be compromised, as well as of the large body of research on technical solutions  ...  However, these advances require collecting and sharing among researchers large amounts of genomic data, which generates much concern about privacy.  ...  Learning from obfuscated data (a) De-identification by data suppression Preventing re-identification often requires stripping more than unique identifiers from the data.  ... 
doi:10.1098/rsta.2017.0350 pmid:30082298 fatcat:mwzuk7xvdbbmpkmjjte5avg6lq

Privacy–Enhancing Face Biometrics: A Comprehensive Survey

Blaz Meden, Peter Rot, Philipp Terhorst, Naser Damer, Arjan Kuijper, Walter J. Scheirer, Arun Ross, Peter Peer, Vitomir Struc
2021 IEEE Transactions on Information Forensics and Security  
The goal of this overview paper is to provide a comprehensive introduction into privacy-related research in the area of biometrics and review existing work on Biometric Privacy-Enhancing Techniques (B-PETs  ...  Biometric recognition technology has made significant advances over the last decade and is now used across a number of services and applications.  ...  For more information, see This article has been accepted for publication in a future issue of this journal, but has not been fully edited.  ... 
doi:10.1109/tifs.2021.3096024 fatcat:z5kvij6g7vgx3b24narxdyp2py

Visual Surveillance within the EU General Data Protection Regulation: A Technology Perspective

Mamoona N. Asghar, Nadia Kanwal, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao
2019 IEEE Access  
The European parliament has ratified the General Data Protection Regulation (GDPR), which has been effective since May 2018 with a view to ensuring the privacy of European Union (EU) citizens' and visitors  ...  In the context of GDPR, the roles of machine learning (i.e. within computer vision), image processing, cryptography, and blockchain are explored as a way of deploying Data Protection-by-Design solutions  ...  ACKNOWLEDGMENTS We would like to thank the reviewers for their valuable comments in improving the quality of the article and in enhancing the readability and usefulness of our manuscript.  ... 
doi:10.1109/access.2019.2934226 fatcat:rbs4au7iyzdd7mfscho6xk6sna

The Reproduction of "Petro-Nationalism" in Ethnic Media: A Case Study of WeChat Public Accounts' Coverage of the Trans Mountain Pipeline Controversy

Sibo Chen
2021 Frontiers in Environmental Science  
As a result, the Canadian mainstream media's downplay of the climate emergency and decarbonization sets the news agendas of the surveyed WeChat public accounts.  ...  A thematic analysis of TMX-related WeChat articles published between January 2016 and May 2021 reveals an overall negative attitude toward the project's opponents.  ...  ACKNOWLEDGMENTS SC would like to thank Chloe Sher (PhD student, Kinesiology and Physical Education, University of Toronto) for her research assistance during the project's data collection and analysis.  ... 
doi:10.3389/fenvs.2021.802757 fatcat:6j3ru25g3jcwbc6lyx6lqpm5ma

Cardpliance: PCI DSS Compliance of Android Applications

Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves
2020 USENIX Security Symposium  
Smartphones and their applications have become a predominant way of computing, and it is only natural that they have become an important part of financial transaction technology.  ...  Overall, we found that 1.67% of the 358 applications are not compliant with PCI DSS, with vulnerabilities including improperly storing credit card numbers and card verification codes.  ...  Any findings and opinions expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
dblp:conf/uss/MahmudAAER20 fatcat:r5u3z2awcbfqrgs2hh6ode4enq

Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption

Marco Autili, Ivano Malavolta, Alexander Perucci, Gian Luca Scoccia, Roberto Verdecchia
2021 Journal of Internet Services and Applications  
study aimed at identifying, evaluating and classifying characteristics, trends and potential for industrial adoption of existing research in static analysis of mobile apps.  ...  The results of this study give a solid foundation for assessing existing and future approaches for static analysis of mobile apps, especially in terms of their industrial adoptability.Researchers and practitioners  ...  methods and techniques of mobile apps Authors' contributions The authors equally contributed to the elaboration of this survey.  ... 
doi:10.1186/s13174-021-00134-x fatcat:mlzjbkdi7fhezisn3tcv7wzlbi

A Survey On Anti-Spoofing Methods For Face Recognition with RGB Cameras of Generic Consumer Devices [article]

Zuheng Ming, Muriel Visani, Muhammad Muzzamil Luqman, Jean-Christophe Burie
2020 arXiv   pre-print
From an experimental point of view, this survey paper provides a summarized overview of the available public databases and extensive comparative experimental results of different PAD methods.  ...  We present an attack scenario-oriented typology of the existing face PAD methods and we provide a review of over 50 of the most recent face PAD methods and their related issues.  ...  Pan et al.  ... 
arXiv:2010.04145v1 fatcat:pjyiow55wffg7pwkaq6ybs2ccu

Ethical Machines: The Human-centric Use of Artificial Intelligence

B. Lepri, N. Oliver, A. Pentland
2021 iScience  
Today's increased availability of large amounts of human behavioral data and advances in artificial intelligence (AI) are contributing to a growing reliance on algorithms to make consequential decisions  ...  We also highlight the criticality and urgency to engage multi-disciplinary teams of researchers, practitioners, policy makers, and citizens to co-develop and evaluate in the real-world algorithmic decision-making  ...  ACKNOWLEDGMENTS The authors would like to thank Lorenzo Lucchini and Simone Centellegher for their support in preparing the graphical abstract.  ... 
doi:10.1016/j.isci.2021.102249 pmid:33763636 pmcid:PMC7973859 fatcat:wmf2ink7ljhbtewpl5vrpejmxq
« Previous Showing results 1 — 15 out of 401 results