2015
DOI: 10.7763/ijmlc.2015.v5.543
|View full text |Cite
|
Sign up to set email alerts
|

The Best Way to a Strong Defense is a Strong Offense: Mitigating Deanonymization Attacks via Iterative Language Translation

Abstract: Abstract-In

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 8 publications
0
20
0
Order By: Relevance
“…transforming writing style but not semantic content. Back-and-forth machine translation provides a simple but highly limited technique [3,7,10,14,44], as it does not allow targeting or avoiding any particular style. Another classical alternative is rule-based paraphrase replacement from knowledge bases [12, 36-40, 45, 61], 1 https://gitlab.com/ssg-research/mlsec/parchoice/ Techniques Transformations applied [40,46] synonym replacement from WordNet [45,61] word embedding neighbour replacement [38] word replacement from GNU Diction [26], hand-crafted rules [12] synonym replacement from FreeLing [54], hand-crafted rules [36] synonym/hypernym/definition replacement from WordNet or PPDB, hand-crafted rules Table 1.…”
Section: Introductionmentioning
confidence: 99%
“…transforming writing style but not semantic content. Back-and-forth machine translation provides a simple but highly limited technique [3,7,10,14,44], as it does not allow targeting or avoiding any particular style. Another classical alternative is rule-based paraphrase replacement from knowledge bases [12, 36-40, 45, 61], 1 https://gitlab.com/ssg-research/mlsec/parchoice/ Techniques Transformations applied [40,46] synonym replacement from WordNet [45,61] word embedding neighbour replacement [38] word replacement from GNU Diction [26], hand-crafted rules [12] synonym replacement from FreeLing [54], hand-crafted rules [36] synonym/hypernym/definition replacement from WordNet or PPDB, hand-crafted rules Table 1.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to using ILT for obfuscation (see above), Day et al [36] applied iterative paraphrasing, creating the paraphrase dataset with the online tool Plagiarisma. Paraphrasing decreased the author identification rate with Hybrid-II [105] from 54% to 7% in the first iteration, 1% with the second iteration, and 6% with the third iteration. The LSA-value for paraphrased text was 0.80, indicating relatively high lexical overlap with the original text.…”
Section: Khosmood and Levinsonmentioning
confidence: 93%
“…Results on the effects of iterations are also indecisive. Almishari et al [4] decreased identification accuracy by adding iterations, whereas Mack et al [105] and Day et al [36] did not. More systematic comparative research would be needed to properly evaluate the effects of the languages, the number and direction of iterations, and the translation method.…”
Section: Automatic Obfuscationmentioning
confidence: 99%
See 1 more Smart Citation
“…Another work, from Nathan et al [121], evaluates Bowers's work by introducing a feature selection approach, namely Generative and Evolutionary Feature Selection (GEFES), over the set of predefined features that mask out non-salient previously extracted features. Both Reference [36] and Reference [121] are tested over a set of blog posts by users and the results show the efficiency of ILT-based anonymization. A recent work is also proposed by Zhang et al [191] that anonymizes users' textual information before publishing user-generated data.…”
Section: Authors In Social Media and Privacymentioning
confidence: 99%