Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
153 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

JAMDEC: Unsupervised Authorship Obfuscation using Constrained Decoding over Small Language Models (2402.08761v1)

Published 13 Feb 2024 in cs.CL and cs.AI

Abstract: The permanence of online content combined with the enhanced authorship identification techniques calls for stronger computational methods to protect the identity and privacy of online authorship when needed, e.g., blind reviews for scientific papers, anonymous online reviews, or anonymous interactions in the mental health forums. In this paper, we propose an unsupervised inference-time approach to authorship obfuscation to address the unique challenges of authorship obfuscation: lack of supervision data for diverse authorship and domains, and the need for a sufficient level of revision beyond simple paraphrasing to obfuscate the authorship, all the while preserving the original content and fluency. We introduce JAMDEC, a user-controlled, inference-time algorithm for authorship obfuscation that can be in principle applied to any text and authorship. Our approach builds on small LLMs such as GPT2-XL in order to help avoid disclosing the original content to proprietary LLM's APIs, while also reducing the performance gap between small and LLMs via algorithmic enhancement. The key idea behind our approach is to boost the creative power of smaller LLMs through constrained decoding, while also allowing for user-specified controls and flexibility. Experimental results demonstrate that our approach based on GPT2-XL outperforms previous state-of-the-art methods based on comparably small models, while performing competitively against GPT3.5 175B, a propriety model that is two orders of magnitudes larger.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (55)
  1. Pegasus paraphrase. https://huggingface.co/tuner007/pegasus_paraphrase. Accessed: 2023-10-15.
  2. Ahmed Abbasi and Hsinchun Chen. 2008. Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst., 26(2).
  3. A multifaceted framework to evaluate evasion, content preservation, and misattribution in authorship obfuscation techniques. In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, pages 2391–2406, Abu Dhabi, United Arab Emirates. Association for Computational Linguistics.
  4. Satanjeev Banerjee and Alon Lavie. 2005. METEOR: An automatic metric for MT evaluation with improved correlation with human judgments. In Proceedings of the ACL Workshop on Intrinsic and Extrinsic Evaluation Measures for Machine Translation and/or Summarization, pages 65–72, Ann Arbor, Michigan. Association for Computational Linguistics.
  5. Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity. ACM Transactions on Information and System Security (TISSEC), 15.
  6. “should i post or ghost?”: Examining how privacy concerns impact social media engagement in us consumers. Psychology & marketing, 38(10):1712–1722.
  7. Language models are few-shot learners. In Advances in Neural Information Processing Systems, volume 33, pages 1877–1901. Curran Associates, Inc.
  8. Style transfer as data augmentation: A case study on named entity recognition. In Conference on Empirical Methods in Natural Language Processing.
  9. BertAA : BERT fine-tuning for authorship attribution. In Proceedings of the 17th International Conference on Natural Language Processing (ICON), pages 127–137, Indian Institute of Technology Patna, Patna, India. NLP Association of India (NLPAI).
  10. Beyond english-centric multilingual machine translation. arXiv preprint.
  11. Neal P. Fox and Omran Ehmoda. 2012. Statistical stylometrics and the marlowe-shakespeare authorship debate.
  12. The use of stylometry for email author identification: A feasibility study. Proc. Student/Faculty Research Day.
  13. Maarten Grootendorst. 2020. Keybert: Minimal keyword extraction with bert.
  14. Project Gutenberg. [link].
  15. Avengers ensemble! improving transferability of authorship obfuscation. CoRR, abs/2109.07028.
  16. Matthew Honnibal and Ines Montani. 2017. spaCy 2: Natural language understanding with Bloom embeddings, convolutional neural networks and incremental parsing. To appear.
  17. Survey of hallucination in natural language generation. ACM Computing Surveys, 55:1 – 38.
  18. Matthew L. Jockers and Daniela M. Witten. 2010. A comparative study of machine learning methods for authorship attribution. Literary and Linguistic Computing, 25(2):215–223.
  19. Are you robert or roberta? deceiving online authorship attribution models using neural text generators.
  20. Impossible distillation: from low-quality model to high-quality dataset & model for summarization and paraphrasing. ArXiv, abs/2305.16635.
  21. The case for being average: A mediocrity approach to style masking and author obfuscation. International Conference of the Cross-Language Evaluation Forum for European Languages, pages 173–185.
  22. Author masking through translation. In Conference and Labs of the Evaluation Forum.
  23. Reformulating unsupervised style transfer as paraphrase generation. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 737–762, Online. Association for Computational Linguistics.
  24. The significance of recall in automatic metrics for MT evaluation. In Proceedings of the 6th Conference of the Association for Machine Translation in the Americas: Technical Papers, pages 134–143, Washington, USA. Springer.
  25. Wikipedia Frequency List. Wikipedia frequency list.
  26. WANLI: Worker and AI collaboration for natural language inference dataset creation. In Findings of the Association for Computational Linguistics: EMNLP 2022, pages 6826–6847, Abu Dhabi, United Arab Emirates. Association for Computational Linguistics.
  27. Roberta: A robustly optimized BERT pretraining approach. CoRR, abs/1907.11692.
  28. Zhi Liu. Reuter 5050 data set.
  29. Zhi Liu. 2011. Reuter 50-50. UCI Machine Learning Repository. DOI: https://doi.org/10.24432/C5DS42.
  30. Neurologic decoding: (un)supervised neural text generation with predicate logic constraints. In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pages 4288–4299, Online. Association for Computational Linguistics.
  31. A girl has no name: Automated authorship obfuscation using mutant-x. Proceedings on Privacy Enhancing Technologies, 2019(4):54–71.
  32. A girl has no name: Automated authorship obfuscation using mutant-x. Proceedings on Privacy Enhancing Technologies, 2019:54 – 71.
  33. A girl has a name: Detecting authorship obfuscation. In Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, pages 2235–2245, Online. Association for Computational Linguistics.
  34. Author obfuscation using wordnet and language models. In Conference and Labs of the Evaluation Forum.
  35. Amazon Mechanical Turk. [link].
  36. Su@ pan’2016: Author obfuscation—notebook for pan at clef 2016.
  37. Textattack: A framework for adversarial attacks, data augmentation, and adversarial training in nlp. In Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, pages 119–126.
  38. PAN2016. Obfuscation evaluation 2016.
  39. PAN2018. Obfuscation evaluation 2018.
  40. Matt Post and David Vilar. 2018. Fast lexically constrained decoding with dynamic beam allocation for neural machine translation. In North American Chapter of the Association for Computational Linguistics.
  41. Deep learning based authorship identification.
  42. Language models are unsupervised multitask learners.
  43. Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of Machine Learning Research, 21(140):1–67.
  44. Effects of age and gender on blogging. In AAAI spring symposium: Computational approaches to analyzing weblogs, volume 6, pages 199–205.
  45. A4nt: Author attribute anonymity by adversarial training of neural machine translation. In USENIX Security Symposium.
  46. A4NT: Author attribute anonymity by adversarial training of neural machine translation. In 27th USENIX Security Symposium (USENIX Security 18), pages 1633–1650, Baltimore, MD. USENIX Association.
  47. Style transfer in nlp: a framework and multilingual analysis with friends tv series. 2021 International Conference Engineering and Telecommunication (En&T), pages 1–6.
  48. Ewoenam Kwaku Tokpo and Toon Calders. 2022. Text style transfer for bias mitigation using masked language modeling. In North American Chapter of the Association for Computational Linguistics.
  49. Llama 2: Open foundation and fine-tuned chat models.
  50. Diverse beam search: Decoding diverse solutions from neural sequence models. CoRR, abs/1610.02424.
  51. Perplexity from plm is unreliable for evaluating text quality.
  52. Neural network acceptability judgments. Transactions of the Association for Computational Linguistics, 7:625–641.
  53. Dp-vae: Human-readable text anonymization for online reviews with differentially private variational autoencoders. In Proceedings of the ACM Web Conference 2022, WWW ’22, page 721–731, New York, NY, USA. Association for Computing Machinery.
  54. A girl has a name, and it’s … adversarial authorship attribution for deobfuscation. ArXiv, abs/2203.11849.
  55. PEGASUS: Pre-training with extracted gap-sentences for abstractive summarization. In Proceedings of the 37th International Conference on Machine Learning, volume 119 of Proceedings of Machine Learning Research, pages 11328–11339. PMLR.
Citations (4)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com