pith. machine review for the scientific record. sign in

arxiv: 1805.08866 · v1 · submitted 2018-05-22 · 💻 cs.CR

Recognition: unknown

Author Obfuscation Using Generalised Differential Privacy

Authors on Pith no claims yet
classification 💻 cs.CR
keywords privacydifferentialgeneralisedapplicationauthordatasetsdocumentliterature
0
0 comments X
read the original abstract

The problem of obfuscating the authorship of a text document has received little attention in the literature to date. Current approaches are ad-hoc and rely on assumptions about an adversary's auxiliary knowledge which makes it difficult to reason about the privacy properties of these methods. Differential privacy is a well-known and robust privacy approach, but its reliance on the notion of adjacency between datasets has prevented its application to text document privacy. However, generalised differential privacy permits the application of differential privacy to arbitrary datasets endowed with a metric and has been demonstrated on problems involving the release of individual data points. In this paper we show how to apply generalised differential privacy to author obfuscation by utilising existing tools and methods from the stylometry and natural language processing literature.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Metric-Normalized Posterior Leakage (mPL): Attacker-Aligned Privacy for Joint Consumption

    cs.LG 2026-05 unverdicted novelty 7.0

    mPL measures attacker-aligned privacy leakage from joint data releases and AmPL provides an adaptive way to bound it with low utility cost in ML settings.