{"id":"https://openalex.org/W4401306743","doi":"https://doi.org/10.48550/arxiv.2407.21630","title":"TAROT: Task-Oriented Authorship Obfuscation Using Policy Optimization Methods","display_name":"TAROT: Task-Oriented Authorship Obfuscation Using Policy Optimization Methods","publication_year":2024,"publication_date":"2024-07-31","ids":{"openalex":"https://openalex.org/W4401306743","doi":"https://doi.org/10.48550/arxiv.2407.21630"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2407.21630","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2407.21630","pdf_url":"https://arxiv.org/pdf/2407.21630","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2407.21630","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099069842","display_name":"Gabriel Loiseau","orcid":"https://orcid.org/0009-0008-0160-0979"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Loiseau, Gabriel","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068059558","display_name":"Damien Sileo","orcid":"https://orcid.org/0000-0002-3274-291X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sileo, Damien","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013683743","display_name":"Damien Riquet","orcid":"https://orcid.org/0009-0004-9835-9878"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Riquet, Damien","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038468377","display_name":"Maxime Meyer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Meyer, Maxime","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5047374978","display_name":"Marc Tommasi","orcid":"https://orcid.org/0000-0003-2838-4408"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tommasi, Marc","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5099069842"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12380","display_name":"Authorship Attribution and Profiling","score":0.9933000206947327,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9541000127792358,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10028","display_name":"Topic Modeling","score":0.9508000016212463,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.8865464329719543},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6943647861480713},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6698129773139954},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.35610002279281616},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.348380982875824},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.18973562121391296},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.10940879583358765},{"id":"https://openalex.org/keywords/systems-engineering","display_name":"Systems engineering","score":0.06528538465499878}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.8865464329719543},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6943647861480713},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6698129773139954},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.35610002279281616},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.348380982875824},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.18973562121391296},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.10940879583358765},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.06528538465499878}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2407.21630","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2407.21630","pdf_url":"https://arxiv.org/pdf/2407.21630","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550/arxiv.2407.21630","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2407.21630","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2407.21630","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2407.21630","pdf_url":"https://arxiv.org/pdf/2407.21630","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4401306743.pdf","grobid_xml":"https://content.openalex.org/works/W4401306743.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W4224216661","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2152144666","https://openalex.org/W1819617256","https://openalex.org/W4308699695"],"abstract_inverted_index":{"Authorship":[0,99],"obfuscation":[1,39,108],"aims":[2],"to":[3,32,66,76,113,142],"disguise":[4],"the":[5,15,26,44,50,55,78,115,120,160],"identity":[6,148],"of":[7,54,162],"an":[8,74,82],"author":[9,147],"within":[10],"a":[11,104,133],"text":[12,27,56,122],"by":[13,118,145],"altering":[14],"writing":[16],"style,":[17],"vocabulary,":[18],"syntax,":[19],"and":[20,35,52,149,171],"other":[21],"linguistic":[22],"features":[23],"associated":[24],"with":[25],"author.":[28,79],"This":[29],"alteration":[30],"needs":[31],"balance":[33],"privacy":[34],"utility.":[36,126,152,166],"While":[37],"strong":[38],"techniques":[40],"can":[41],"effectively":[42],"hide":[43],"author's":[45],"identity,":[46],"they":[47],"often":[48],"degrade":[49],"quality":[51],"usefulness":[53],"for":[57,73],"its":[58,124],"intended":[59],"purpose.":[60],"Conversely,":[61],"maintaining":[62],"high":[63],"utility":[64],"tends":[65],"provide":[67],"insufficient":[68],"privacy,":[69],"making":[70],"it":[71],"easier":[72],"adversary":[75],"de-anonymize":[77],"Thus,":[80],"achieving":[81],"optimal":[83],"trade-off":[84,117],"between":[85],"these":[86],"two":[87],"conflicting":[88],"objectives":[89],"is":[90,112],"crucial.":[91],"In":[92],"this":[93],"paper,":[94],"we":[95],"propose":[96],"TAROT:":[97],"Task-Oriented":[98],"Obfuscation":[100],"Using":[101],"Policy":[102],"Optimization,":[103],"new":[105],"unsupervised":[106],"authorship":[107],"method":[109],"whose":[110],"goal":[111],"optimize":[114],"privacy-utility":[116],"regenerating":[119],"entire":[121],"considering":[123],"downstream":[125,150],"Our":[127],"approach":[128,157],"leverages":[129],"policy":[130],"optimization":[131],"as":[132],"fine-tuning":[134],"paradigm":[135],"over":[136],"small":[137],"language":[138],"models":[139,172],"in":[140],"order":[141],"rewrite":[143],"texts":[144],"preserving":[146,165],"task":[151],"We":[153,167],"show":[154],"that":[155],"our":[156,169],"largely":[158],"reduces":[159],"accuracy":[161],"attackers":[163],"while":[164],"make":[168],"code":[170],"publicly":[173],"available.":[174]},"counts_by_year":[],"updated_date":"2026-03-09T08:58:05.943551","created_date":"2025-10-10T00:00:00"}
