語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Counter-Masquerading: A Logicist-AI ...
~
Ghosh, Rikhiya.
FindBook
Google Book
Amazon
博客來
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies./
作者:
Ghosh, Rikhiya.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2020,
面頁冊數:
111 p.
附註:
Source: Dissertations Abstracts International, Volume: 82-05, Section: B.
Contained By:
Dissertations Abstracts International82-05B.
標題:
Artificial intelligence. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28031400
ISBN:
9798684681677
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies.
Ghosh, Rikhiya.
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies.
- Ann Arbor : ProQuest Dissertations & Theses, 2020 - 111 p.
Source: Dissertations Abstracts International, Volume: 82-05, Section: B.
Thesis (Ph.D.)--Rensselaer Polytechnic Institute, 2020.
This item must not be sold to any third party vendors.
From times immemorial, masquerading has been a problem that has taken many shapes and forms. From physically impersonating a person to writing on behalf of someone, the degree and sophistication of such impersonation has varied considerably. Detection of masquerading has of course been with us as long as masquerading itself; and such detection is often a very difficult challenge. With the advent of social media, many new and often deleterious ways of masquerading have arrived on the scene. The influence of social media can, we all know, sometime shape opinions; the shift of modern life toward (at least in part) a virtual one has given rise to a plethora of new problems about online authorship, which is commonly termed the cybersecurity problem of masquerading. Simple stylometry, which long included finding penman strokes, grammatical patterns, and finding types of words used has now been "upgraded'' to authorship attribution, using 21st-century natural-language processing techniques (NLP) on large datasets. Counter-masquerading is still an embryonic, fast-developing field with new techniques coming out, it seems, every week, and because counter-masquerading is difficult, there is plenty of room for improvement. This dissertation introduces a novel framework for addressing the challenge of authorship attribution in the social-media sphere; the framework specifically seeks to contribute to attempts to achieve effective counter-masquerading. This framework, and the methods upon which it is based, touch on classical approaches to authorship attribution to detect masquerading, and also marks the inception of an entirely new sub-field of counter-masquerading: viz., interventionist strategies therein. The interventionist approach is an interactive approach in which the user suspected to be faking their identity is asked directly or indirectly to interact with designated questions or texts to gauge their reaction, and thereby to perhaps give rise to "cognitive inconsistencies,'' the presence of which aid detection of online impersonation. A key aspect of our method is (to our knowledge) the first use of counteridenticals. This type of conditional sentence/formula is a proper subclass of counterfactuals, and involves comparison of two identities in its antecedent. A pertinent example of such a conditional in the literary sphere would be : "If Moncrieff were Proust, Remembrance of Things Past would have less Edwardian intonations.'' What we dub deep counteridenticals compare incompatible identities within the purview of a "deep" pragmatic interpretation (this of course to be fully explained in the sequel). In addition, we use a new expressive framework for the modeling of emotion to delve deeper into the behavior, desire, and emotional triggers in individuals who project their online presence. It is hard for a masquerader to mimic the psyche of an individual he/she seeks to "be,'' and the interventionist approach tries enable deeper insights into masqueraders than what these deceiving agents try to project virtually.
ISBN: 9798684681677Subjects--Topical Terms:
516317
Artificial intelligence.
Subjects--Index Terms:
Counteridentical
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies.
LDR
:04367nmm a2200421 4500
001
2280060
005
20210823091508.5
008
220723s2020 ||||||||||||||||| ||eng d
020
$a
9798684681677
035
$a
(MiAaPQ)AAI28031400
035
$a
AAI28031400
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Ghosh, Rikhiya.
$3
3558560
245
1 0
$a
Counter-Masquerading: A Logicist-AI Approach to Interventionist Strategies.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2020
300
$a
111 p.
500
$a
Source: Dissertations Abstracts International, Volume: 82-05, Section: B.
500
$a
Advisor: Bringsjord, Selmer.
502
$a
Thesis (Ph.D.)--Rensselaer Polytechnic Institute, 2020.
506
$a
This item must not be sold to any third party vendors.
520
$a
From times immemorial, masquerading has been a problem that has taken many shapes and forms. From physically impersonating a person to writing on behalf of someone, the degree and sophistication of such impersonation has varied considerably. Detection of masquerading has of course been with us as long as masquerading itself; and such detection is often a very difficult challenge. With the advent of social media, many new and often deleterious ways of masquerading have arrived on the scene. The influence of social media can, we all know, sometime shape opinions; the shift of modern life toward (at least in part) a virtual one has given rise to a plethora of new problems about online authorship, which is commonly termed the cybersecurity problem of masquerading. Simple stylometry, which long included finding penman strokes, grammatical patterns, and finding types of words used has now been "upgraded'' to authorship attribution, using 21st-century natural-language processing techniques (NLP) on large datasets. Counter-masquerading is still an embryonic, fast-developing field with new techniques coming out, it seems, every week, and because counter-masquerading is difficult, there is plenty of room for improvement. This dissertation introduces a novel framework for addressing the challenge of authorship attribution in the social-media sphere; the framework specifically seeks to contribute to attempts to achieve effective counter-masquerading. This framework, and the methods upon which it is based, touch on classical approaches to authorship attribution to detect masquerading, and also marks the inception of an entirely new sub-field of counter-masquerading: viz., interventionist strategies therein. The interventionist approach is an interactive approach in which the user suspected to be faking their identity is asked directly or indirectly to interact with designated questions or texts to gauge their reaction, and thereby to perhaps give rise to "cognitive inconsistencies,'' the presence of which aid detection of online impersonation. A key aspect of our method is (to our knowledge) the first use of counteridenticals. This type of conditional sentence/formula is a proper subclass of counterfactuals, and involves comparison of two identities in its antecedent. A pertinent example of such a conditional in the literary sphere would be : "If Moncrieff were Proust, Remembrance of Things Past would have less Edwardian intonations.'' What we dub deep counteridenticals compare incompatible identities within the purview of a "deep" pragmatic interpretation (this of course to be fully explained in the sequel). In addition, we use a new expressive framework for the modeling of emotion to delve deeper into the behavior, desire, and emotional triggers in individuals who project their online presence. It is hard for a masquerader to mimic the psyche of an individual he/she seeks to "be,'' and the interventionist approach tries enable deeper insights into masqueraders than what these deceiving agents try to project virtually.
590
$a
School code: 0185.
650
4
$a
Artificial intelligence.
$3
516317
650
4
$a
Mass communications.
$3
3422380
650
4
$a
Web studies.
$3
2122754
650
4
$a
Information technology.
$3
532993
653
$a
Counteridentical
653
$a
Countermasquerading
653
$a
Natural language processing
653
$a
Impersonation
653
$a
Social media
653
$a
Cybersecurity
653
$a
Grammatical patterns
653
$a
Online authorship
690
$a
0800
690
$a
0489
690
$a
0646
690
$a
0708
710
2
$a
Rensselaer Polytechnic Institute.
$b
Computer Science.
$3
2094828
773
0
$t
Dissertations Abstracts International
$g
82-05B.
790
$a
0185
791
$a
Ph.D.
792
$a
2020
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28031400
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9431793
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入