Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.
posted by Fnord666 on Wednesday September 06 2017, @12:45AM   Printer-friendly
from the another-job-lost-to-automation dept.

Spotted on HackerNews is a link to a paper on Automated Crowdturfing Attacks and Defenses in Online Review Systems:

Malicious crowdsourcing forums are gaining traction as sources of spreading misinformation online, but are limited by the costs of hiring and managing human workers. In this paper, we identify a new class of attacks that leverage deep learning language models (Recurrent Neural Networks or RNNs) to automate the generation of fake online reviews for products and services. Not only are these attacks cheap and therefore more scalable, but they can control rate of content output to eliminate the signature burstiness that makes crowdsourced campaigns easy to detect.

The paper, available from the arXiv link, contains the details of the attack which the paper notes "are largely indistinguishable from real reviews to human readers", and suggests defensive mechanisms based on "statistically detectable variations in the character-level distribution of machine-generated reviews".


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Insightful) by takyon on Wednesday September 06 2017, @02:23AM (1 child)

    by takyon (881) <takyonNO@SPAMsoylentnews.org> on Wednesday September 06 2017, @02:23AM (#564014) Journal

    The internet baked in anonymity.

    Really? You have to use Tor if you want a chance at having your sliver of anonymity, and that may even be compromised.

    Your ISP is a sellout and the NSA is watching everything with XKeyscore. Maybe using Wi-Fi from a neighbor, coffee shop, or library can help. Maybe not.

    Using mobile 3G/4G is simply connecting yourself to a surveillance network.

    Things could be worse. There has been talk of baking authentication instead of anonymity and encryption into the Internet. After all, we have to win the Cyber War!

    The internet baked in anonymity [...] but never gave a second thought to Personal Privacy

    You can't have one without the other. You might be able to fly under the radar for a while, harassing peons at 1 Megadeath threat per second, but if the government is out to get you, it's a wrap.

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
    Starting Score:    1  point
    Moderation   +3  
       Insightful=3, Total=3
    Extra 'Insightful' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by takyon on Wednesday September 06 2017, @04:31AM

    by takyon (881) <takyonNO@SPAMsoylentnews.org> on Wednesday September 06 2017, @04:31AM (#564034) Journal

    Meant to say "You have to use Tor, I2P, or something along those lines". Tor is just one approach.

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]