Author of the publication

The Limitations of Stylometry for Detecting Machine-Generated Fake News.

, , , and . Comput. Linguistics, 46 (2): 499-510 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DroidDisintegrator: Intra-Application Information Flow Control in Android Apps., and . AsiaCCS, page 401-412. ACM, (2016)Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help., , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 25:1-25:25 (2022)In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning., , , , and . CoRR, (2022)The Limitations of Stylometry for Detecting Machine-Generated Fake News., , , and . Comput. Linguistics, 46 (2): 499-510 (2020)Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning., , , and . SP, page 1295-1313. IEEE, (2020)De-Anonymizing Text by Fingerprinting Language Generation., , and . NeurIPS, (2020)In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning., , , , and . NeurIPS, (2022)Situational Access Control in the Internet of Things., , and . ACM Conference on Computer and Communications Security, page 1056-1073. ACM, (2018)When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , and . EuroS&P, page 175-199. IEEE, (2023)Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning., , , , , , and . USENIX Security Symposium, page 211-228. USENIX Association, (2023)