27 research outputs found

    Bot and gender detection of twitter accounts using distortion and LSA notebook for PAN at CLEF 2019

    Get PDF
    In this work, we present our approach for the Author Profiling task of PAN 2019. The task is divided into two sub-problems, bot, and gender detection, for two different languages: English and Spanish. For each instance of the problem and each language, we address the problem differently. We use an ensemble architecture to solve the Bot Detection for accounts that write in English and a single SVM for those who write in Spanish. For the Gender detection we use a single SVM architecture for both the languages, but we pre-process the tweets in a different way. Our final models achieve accuracy over the 90% in the bot detection task, while for the gender detection, of 84.17% and 77.61% respectively for the English and Spanish languages

    Cross-domain authorship attribution combining instance-based and profile-based features notebook for PAN at CLEF 2019

    Get PDF
    Being able to identify the author of an unknown text is crucial. Although it is a well-studied field, it is still an open problem, since a standard approach has yet to be found. In this notebook, we propose our model for the Authorship Attribution task of PAN 2019, that focuses on cross-domain setting covering 4 different languages: French, Italian, English, and Spanish. We use n-grams of characters, words, stemmed words, and distorted text. Our model has an SVM for each feature and an ensemble architecture. Our final results outperform the baseline given by PAN in almost every problem. With this model, we reach the second place in the task with an F1-score of 68%

    A Novel Long Range Spin Chain and Planar N=4 Super Yang-Mills

    Full text link
    We probe the long-range spin chain approach to planar N=4 gauge theory at high loop order. A recently employed hyperbolic spin chain invented by Inozemtsev is suitable for the SU(2) subsector of the state space up to three loops, but ceases to exhibit the conjectured thermodynamic scaling properties at higher orders. We indicate how this may be bypassed while nevertheless preserving integrability, and suggest the corresponding all-loop asymptotic Bethe ansatz. We also propose the local part of the all-loop gauge transfer matrix, leading to conjectures for the asymptotically exact formulae for all local commuting charges. The ansatz is finally shown to be related to a standard inhomogeneous spin chain. A comparison of our ansatz to semi-classical string theory uncovers a detailed, non-perturbative agreement between the corresponding expressions for the infinite tower of local charge densities. However, the respective Bethe equations differ slightly, and we end by refining and elaborating a previously proposed possible explanation for this disagreement.Comment: 48 pages, 1 figure. v2, further results added: discussion of the relationship to an inhomogeneous spin chain, normalization in sec 3 unified, v3: minor mistakes corrected, published versio

    Supersymmetric null-surfaces

    Get PDF
    Single trace operators with the large R-charge in supersymmetric Yang-Mills theory correspond to the null-surfaces in AdS5×S5AdS_5\times S^5. We argue that the moduli space of the null-surfaces is the space of contours in the super-Grassmanian parametrizing the complex (22)(2|2)-dimensional subspaces of the complex (44)(4|4)-dimensional space. The odd coordinates on this super-Grassmanian correspond to the fermionic degrees of freedom of the superstring.Comment: v4: added a reference to the earlier work; corrected the formula for the stabilizer of the BMN vacuum; added the discussion of the complex structure of the odd coordinates in Section 3.

    Large spin limits of AdS/CFT and generalized Landau-Lifshitz equations

    Get PDF
    We consider AdS_5 x S^5 string states with several large angular momenta along AdS_5 and S^5 directions which are dual to single-trace Super-Yang-Mills (SYM) operators built out of chiral combinations of scalars and covariant derivatives. In particular, we focus on the SU(3) sector (with three spins in S^5) and the SL(2) sector (with one spin in AdS_5 and one in S^5), generalizing recent work hep-th/0311203 and hep-th/0403120 on the SU(2) sector with two spins in S^5. We show that, in the large spin limit and at the leading order in the effective coupling expansion, the string sigma model equations of motion reduce to matrix Landau-Lifshitz equations. We then demonstrate that the coherent-state expectation value of the one-loop SYM dilatation operator restricted to the corresponding sector of single trace operators is also effectively described by the same equations. This implies a universal leading order equivalence between string energies and SYM anomalous dimensions, as well as a matching of integrable structures. We also discuss the more general 5-spin sector and comment on SO(6) states dual to non-chiral scalar operators

    An anonymous end-to-end communication protocol for mobile cloud environments

    No full text
    The increasing spread of mobile cloud computing paradigm is changing the traditional mobile communication infrastructure. Today, smartphones can rely on virtual (software) \u201cclones\u201d in the cloud, offering backup/recovery solutions as well as the possibility to offload computations. As a result, clones increase the communication and computation capabilities of smartphones, making their limited batteries last longer. Unfortunately, mobile cloud introduces new privacy risks, since personal information of the communicating users is distributed among several parties (e.g., cellular network operator, cloud provider). In this paper, we propose a solution implementing an end-to-end anonymous communication protocol between two users in the network, which leverages properties of social networks and ad hoc wireless networks. We consider an adversary model where each party observing a portion of the communication possibly colludes with others to uncover the identity of communicating users. We then extensively analyze the security of our protocol and the anonymity preserved against the above adversaries. Most importantly, we assess the performance of our solution by comparing it to Tor on a real testbed of 36 smartphones and relative clones running on Amazon EC2 platform

    Preserving smartphone users' anonymity in Cloudy Days

    No full text
    The mobile cloud computing paradigm involves communications between smartphones and their virtual (software) clones in the cloud. It offers both backup/recovery solutions as well as offload of mobile computations, increasing the communication and computation capabilities of smartphones and making their limited batteries last longer. Unfortunately, in this scenario, the privacy of the users is at stake. The cellular network operator knows how often users contact the cloud, and the cloud provider knows how often users' clones contact each other. We address this privacy problem by providing an anonymous communication protocol, leveraging properties of social networks and ad-hoc wireless networks. Our solution provides anonymous end-to-end communication between two users in the network, and in turn between a user and her clone in the cloud. The proposal copes with an adversary model, where each party observing a portion of the communication (including the cloud provider and the cellular network operator) possibly colludes with others to uncover the identity of communicating users

    GDPR: When the Right to Access Personal Data Becomes a Threat

    No full text
    One year following the entry into force of the GDPR, all websites and data controllers have updated their procedures to store users' data. The GDPR does not only cover how and what data should be saved by the service providers, but it also guarantees an easy way to know what data are collected and the freedom to export them. In this paper, we carry out a comprehensive study on the right to access data provided by Article 15 of the GDPR. We examined more than 300 data controllers, requesting access to personal data to each of them. We found that almost each data controller has a slightly different procedure to fulfill the request and several ways to provide data back to the user, from a structured file like CSV to a screenshot of the monitor. We measure the time needed to complete the access data request and the completeness of the information provided. After this phase of data gathering, we analyze the authentication process followed by the data controllers to establish the identity of the requester. We find that 50.4% of the data controllers that handled the request have flaws in their procedures of identifying users or in their phase of sending the data, exposing users to new threats, even if these data controllers store data in compliance with the GDPR. Our surprising and undesired results show that, in its present deployment, the GDRP has actually decreased the privacy of users of web services
    corecore