Measuring Differentiability: Unmasking Pseudonymous Authors

نویسندگان

  • Moshe Koppel
  • Jonathan Schler
  • Elisheva Bonchek-Dokow
چکیده

In the authorship verification problem, we are given examples of the writing of a single author and are asked to determine if given long texts were or were not written by this author. We present a new learning-based method for adducing the “depth of difference” between two example sets and offer evidence that this method solves the authorship verification problem with very high accuracy. The underlying idea is to test the rate of degradation of the accuracy of learned models as the best features are iteratively dropped from the learning process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized H-differentiability for solving second order linear fuzzy differential ‎equations

In this paper, a new approach for solving the second order fuzzy differential equations (FDE) with fuzzy initial value, under strongly generalized H-differentiability is presented. Solving first order fuzzy differential equations by extending 1-cut solution of the original problem and solving fuzzy integro-differential equations has been investigated by some authors (see for example cite{darabi...

متن کامل

Implementation and adaptation of the Pseudonymous PKI for Ubiquitous Computing for Car-2-Car Communication

Car-2-Car communication requires the use of pseudonymous public keys to ensure the vehicle’s privacy by making its messages unlinkable over a longer period. The Pseudonymous PKI (PPKI) for Ubiquitous Computing by K. Zeng [Ze06] offers peer-side pseudonym generation, non-repudiation and an efficient revocation mechanism that excludes the revoked peers from the group of authorized participants. I...

متن کامل

Modern Credential Access Control Approach Based On Pseudonymous Signature

This paper proposes a modern credential access control approach which allows the organizations to provide their resources/services on the internet and grant access rights to users by employing Cryptographic Pseudonymous Signature. The concepts of Modern Credentials and Pseudonymous Signature are proposed with respect to Pseudonymous Identification Scheme to facilitate pseudonymity in access con...

متن کامل

The Efficiency and Security of Pseudonymous Digital Signature for Modern e-Services

This paper presents a cryptanalysis of Pseudonymous Digital Signature(PDS) described in [8]. PDS proposed with respect to Pseudonymous Identification Scheme Intended to generate pseudonyms by trusted third party (usually the pseudonymity service provider) for registered users and organizations that provides on –line services. The results shows that the PDS very fast and highly secure with a com...

متن کامل

Domain-Specific Pseudonymous Signatures Revisited

Domain-Specific Pseudonymous Signature schemes were recently proposed for privacy preserving authentication of digital identity documents by the BSI, German Federal Office for Information Security. The crucial property of domain-specific pseudonymous signatures is that a signer may derive unique pseudonyms within a so called domain. Now, the signer’s true identity is hidden behind his domain ps...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Journal of Machine Learning Research

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2007