27 research outputs found
Bot and gender detection of twitter accounts using distortion and LSA notebook for PAN at CLEF 2019
In this work, we present our approach for the Author Profiling task of PAN 2019. The task is divided into two sub-problems, bot, and gender detection, for two different languages: English and Spanish. For each instance of the problem and each language, we address the problem differently. We use an ensemble architecture to solve the Bot Detection for accounts that write in English and a single SVM for those who write in Spanish. For the Gender detection we use a single SVM architecture for both the languages, but we pre-process the tweets in a different way. Our final models achieve accuracy over the 90% in the bot detection task, while for the gender detection, of 84.17% and 77.61% respectively for the English and Spanish languages
Cross-domain authorship attribution combining instance-based and profile-based features notebook for PAN at CLEF 2019
Being able to identify the author of an unknown text is crucial. Although it is a well-studied field, it is still an open problem, since a standard approach has yet to be found. In this notebook, we propose our model for the Authorship Attribution task of PAN 2019, that focuses on cross-domain setting covering 4 different languages: French, Italian, English, and Spanish. We use n-grams of characters, words, stemmed words, and distorted text. Our model has an SVM for each feature and an ensemble architecture. Our final results outperform the baseline given by PAN in almost every problem. With this model, we reach the second place in the task with an F1-score of 68%
A Novel Long Range Spin Chain and Planar N=4 Super Yang-Mills
We probe the long-range spin chain approach to planar N=4 gauge theory at
high loop order. A recently employed hyperbolic spin chain invented by
Inozemtsev is suitable for the SU(2) subsector of the state space up to three
loops, but ceases to exhibit the conjectured thermodynamic scaling properties
at higher orders. We indicate how this may be bypassed while nevertheless
preserving integrability, and suggest the corresponding all-loop asymptotic
Bethe ansatz. We also propose the local part of the all-loop gauge transfer
matrix, leading to conjectures for the asymptotically exact formulae for all
local commuting charges. The ansatz is finally shown to be related to a
standard inhomogeneous spin chain. A comparison of our ansatz to semi-classical
string theory uncovers a detailed, non-perturbative agreement between the
corresponding expressions for the infinite tower of local charge densities.
However, the respective Bethe equations differ slightly, and we end by refining
and elaborating a previously proposed possible explanation for this
disagreement.Comment: 48 pages, 1 figure. v2, further results added: discussion of the
relationship to an inhomogeneous spin chain, normalization in sec 3 unified,
v3: minor mistakes corrected, published versio
Recommended from our members
Plane-wave lightcone superstring field theory
We construct the cubic interaction vertex and dynamically generated supercharges in lightcone superstring field theory for a large class half-supersymmetric D-branes in the planewave background. We show that these satisfy the plane-wave superalgebra at first order in string coupling. The cubic interaction vertex and dynamical supercharges presented here are given explicitly in terms of oscilators and can be used to compute three-point functions of open strings with endpoints on half-supersymmetric D-branes
Supersymmetric null-surfaces
Single trace operators with the large R-charge in supersymmetric Yang-Mills
theory correspond to the null-surfaces in . We argue that the
moduli space of the null-surfaces is the space of contours in the
super-Grassmanian parametrizing the complex -dimensional subspaces of
the complex -dimensional space. The odd coordinates on this
super-Grassmanian correspond to the fermionic degrees of freedom of the
superstring.Comment: v4: added a reference to the earlier work; corrected the formula for
the stabilizer of the BMN vacuum; added the discussion of the complex
structure of the odd coordinates in Section 3.
Large spin limits of AdS/CFT and generalized Landau-Lifshitz equations
We consider AdS_5 x S^5 string states with several large angular momenta along AdS_5 and S^5 directions which are dual to single-trace Super-Yang-Mills (SYM) operators built out of chiral combinations of scalars and covariant derivatives. In particular, we focus on the SU(3) sector (with three spins in S^5) and the SL(2) sector (with one spin in AdS_5 and one in S^5), generalizing recent work hep-th/0311203 and hep-th/0403120 on the SU(2) sector with two spins in S^5. We show that, in the large spin limit and at the leading order in the effective coupling expansion, the string sigma model equations of motion reduce to matrix Landau-Lifshitz equations. We then demonstrate that the coherent-state expectation value of the one-loop SYM dilatation operator restricted to the corresponding sector of single trace operators is also effectively described by the same equations. This implies a universal leading order equivalence between string energies and SYM anomalous dimensions, as well as a matching of integrable structures. We also discuss the more general 5-spin sector and comment on SO(6) states dual to non-chiral scalar operators
An anonymous end-to-end communication protocol for mobile cloud environments
The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) \u201cclones\u201d in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e.g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform
Preserving smartphone users' anonymity in Cloudy Days
The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users
GDPR: When the Right to Access Personal Data Becomes a Threat
One year following the entry into force of the GDPR, all websites and data controllers have updated their procedures to store users' data. The GDPR does not only cover how and what data should be saved by the service providers, but it also guarantees an easy way to know what data are collected and the freedom to export them. In this paper, we carry out a comprehensive study on the right to access data provided by Article 15 of the GDPR. We examined more than 300 data controllers, requesting access to personal data to each of them. We found that almost each data controller has a slightly different procedure to fulfill the request and several ways to provide data back to the user, from a structured file like CSV to a screenshot of the monitor. We measure the time needed to complete the access data request and the completeness of the information provided. After this phase of data gathering, we analyze the authentication process followed by the data controllers to establish the identity of the requester. We find that 50.4% of the data controllers that handled the request have flaws in their procedures of identifying users or in their phase of sending the data, exposing users to new threats, even if these data controllers store data in compliance with the GDPR. Our surprising and undesired results show that, in its present deployment, the GDRP has actually decreased the privacy of users of web services