Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,341,789 papers from all fields of science
Search
Sign In
Create Free Account
Inauthentic text
An inauthentic text is a computer-generated expository document meant to appear as genuine, but which is actually meaningless. Frequently they are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Dissociated press
SCIgen
Spamdexing
Broader (1)
Machine learning
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
House of Representatives Standing Committee on Indigenous Affairs: growing presence of inauthentic Aboriginal and Torres Strait Islander 'style' art and craft products and merchandise for sale across…
R. Kennedy
,
M. Kelly
2018
Corpus ID: 169119523
2016
2016
Smartphone-based thin layer chromatography for the discrimination of falsified medicines
Hojeong Yu
,
Huy Le
,
S. Lumetta
,
B. Cunningham
,
Elingiringa Amos Kaale
,
T. Layloff
Italian National Conference on Sensors
2016
Corpus ID: 44220753
Identification of counterfeit and substandard drugs, which pose severe risks to patient safety is increasingly important, as…
Expand
2015
2015
Feature maps driven no-reference image quality prediction of authentically distorted images
Deepti Ghadiyaram
,
A. Bovik
Electronic imaging
2015
Corpus ID: 1396563
Current blind image quality prediction models rely on benchmark databases comprised of singly and synthetically distorted images…
Expand
2015
2015
Scene statistics of authentically distorted images in perceptually relevant color spaces for blind image quality assessment
Deepti Ghadiyaram
,
A. Bovik
International Conference on Information Photonics
2015
Corpus ID: 16197812
Current top-performing blind image quality assessment (IQA) models rely on benchmark databases comprising of singly distorted…
Expand
2014
2014
The ever present past: the tension of the ‘authentically inauthentic antique’ found within the Late Renaissance Villeggiatura with a focus on the Villa Farnese
Emma Moloney Steinfort
2014
Corpus ID: 193074911
Review
2010
Review
2010
Inauthentic Archaeologies: Public Uses and Abuses of the Past [Book Review]
Kate Rogers
,
R. Paton
2010
Corpus ID: 146598321
Review(s) of: Inauthentic Archaeologies: Public Uses and Abuses of the Past, by Troy Lovata, 168 pp, Left Coast Press, California…
Expand
Review
2008
Review
2008
Inauthentic Archaeologies: Public Uses and Abuses of the Past [Book Review]
D. Gojak
2008
Corpus ID: 146390755
Review(s) of: Inauthentic Archaeologies: Public Uses and Abuses of the Past, by Troy Lovata, Left Coast Press, Walnut Creek, CA…
Expand
2005
2005
Detecting malicious peers in a reputation-based peer-to-peer system
Loubna Mekouar
,
Y. Iraqi
,
R. Boutaba
Second IEEE Consumer Communications and…
2005
Corpus ID: 14095327
In this paper we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme…
Expand
2003
2003
High art as tourist art, tourist art as high art: Comparing the New Guinea Sculpture Garden at Stanford University and Sepik River tourist art
E. Silverman
2003
Corpus ID: 189916594
This paper compares two contemporary aesthetic expressions: tourist art from the Sepik River in Papua New Guinea and the New…
Expand
2001
2001
Do students who are exposed to authentic listening in class, perform better than those who are exposed to inauthentic listening?
Jane Hislop
2001
Corpus ID: 142071507
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE