Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Tommi Gröndahl"'
Autor:
Tommi Gröndahl, Nadarajah Asokan
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2020, Iss 4, Pp 175-195 (2020)
Stylometry can be used to profile or deanonymize authors against their will based on writing style. Style transfer provides a defence. Current techniques typically use either encoder-decoder architectures or rule-based algorithms. Crucially, style tr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::32db8e192072ab47bb637ba27797b7c5
https://aaltodoc.aalto.fi/handle/123456789/101392
https://aaltodoc.aalto.fi/handle/123456789/101392
Publikováno v:
EMNLP (Findings)
Detection of some types of toxic language is hampered by extreme scarcity of labeled training data. Data augmentation – generating new synthetic data from a labeled seed dataset – can help. The efficacy of data augmentation on toxic language clas
Publikováno v:
IEEE TRANSACTIONS ON COMPUTERS. 66(10):1717-1733
Phishing is a major problem on the Web. Despite the significant attention it has received over the years, there has been no definitive solution. While the state-of-the-art solutions have reasonably good performance, they suffer from several drawbacks
Autor:
Nadarajah Asokan, Tommi Gröndahl
Textual deception constitutes a major problem for online security. Many studies have argued that deceptiveness leaves traces in writing style, which could be detected using text classification techniques. By conducting an extensive literature review
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9129328ad37314a5df97ac10114e295a
http://arxiv.org/abs/1902.08939
http://arxiv.org/abs/1902.08939
Publikováno v:
AISec@CCS
openaire: EC/H2020/688061/EU//TagItSmart With the spread of social networks and their unfortunate use for hate speech, automatic detection of the latter has become a pressing problem. In this paper, we reproduce seven state-of-the-art hate speech det
Autor:
Tommi Gröndahl, Andrew Paverd, Elizabeth Stobert, Praveen Kumar Pendyala, Ahmad-Reza Sadeghi, Hoang Long Nguyen, Nadarajah Asokan, Thien Duc Nguyen, Sandeep Tamrakar
Two attractive features of cloud storage services are (1) the automatic synchronization of files between multiple devices and (2) the possibility of sharing files with other users. However, many users are concerned about the security and privacy of d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::97a25a5043b66b55d742449360cae89d
http://hdl.handle.net/10138/327063
http://hdl.handle.net/10138/327063