• Publications
  • Influence
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation
TLDR
We describe a scheme for watermarking natural language text by embedding small portions of the watermark bit string in the syntactic structure of a number of selected sentences in the text, with both the selection and embedding keyed (via quadratic residue) to a large prime number. Expand
  • 191
  • 12
  • PDF
SemEval-2017 Task 7: Detection and Interpretation of English Puns
TLDR
This paper describes the first competitive evaluation for the automatic detection, location, and interpretation of puns. Expand
  • 60
  • 8
  • PDF
Natural Language Watermarking and Tamperproofing
TLDR
A semantically-based scheme dramatically improves the information-hiding capacity of any text through two techniques: (i) modifying the granularity of meaning of individual sentences, and (ii) halving the number of sentences affected by the watermark. Expand
  • 175
  • 3
  • PDF
Ontology in information security: a useful theoretical foundation and methodological tool
TLDR
The paper introduces and advocates an ontological semantic approach to information security. Expand
  • 151
  • 3
  • PDF
How to Understand and Assess a Theory: The Evolution of the SSTH into the GTVH and Now into the OSTH
The main thrust of this paper is to present to an important adjacent scholarly community of literary scholars how humor can be treated by the current strand of contemporary linguistics, or – moreExpand
  • 44
  • 3
Paronomasic puns: Target recoverability towards automatic generation
TLDR
Hempelmann, Christian F. Paronomasic Puns: Target Recoverability towards Automatic Generation. Expand
  • 43
  • 3
  • PDF
3 WD meets GTVH: Breaking the ground for interdisciplinary humor research
Abstract The present paper describes an interdisciplinary effort, in which results based on the same material, but analyzed with tools from two different disciplines are brought together for mutualExpand
  • 35
  • 3
  • PDF
Ontological semantic technology for detecting insider threat and social engineering
TLDR
This paper describes a computational system for detecting unintentional inferences in casual unsolicited and unrestricted verbal output of individuals, potentially responsible for leaked classified information to people with unauthorized access. Expand
  • 40
  • 2
  • PDF
Script opposition and logical mechanism in punning
Abstract Based on a larger project on punning, this paper outlines the application of the General Theory of Verbal Humor to imperfect puns. The aim is to illustrate the intricate mechanisms of thisExpand
  • 32
  • 2
...
1
2
3
4
5
...