180:. Their work explains in detail an attempt to detect inauthentic texts and identify pernicious problems of inauthentic texts in cyberspace. The site has a means of submitting text that assesses, based on supervised learning, whether a corpus is inauthentic or not. Many users have submitted incorrect types of data and have correspondingly commented on the scores. This application is meant for a specific kind of data; therefore, submitting, say, an email, will not return a meaningful score.
25:
164:
With the amount of computer generated text outpacing the ability of people to humans to curate it, there needs some means of distinguishing between the two. Yet automated approaches to determining absolutely whether a text is authentic or not face intrinsic challenges of semantics.
133:
is a computer-generated expository document meant to appear as genuine, but which is actually meaningless. Frequently they are created in order to be intermixed with genuine documents and thus manipulate the results of search engines, as with
173:" giving an example of grammatically-correct, but semantically incoherent sentence; some will point out that in certain contexts one could give this sentence (or any phrase) meaning.
161:
to a conference, where they were initially accepted. This led the students to claim that the bar for submissions was too low.
97:
170:
69:
76:
116:
46:
54:
83:
231:
50:
65:
236:
35:
145:
Sometimes nonsensical documents are created with computer assistance for humorous effect, as with
39:
90:
8:
241:
215:
177:
199:
146:
246:
225:
176:
The first group to use the expression in this regard can be found below from
153:. They have also been used to challenge the veracity of a publication—
189:
166:
150:
139:
194:
142:
by giving the spam the superficial characteristics of legitimate text.
135:
24:
157:
students submitted papers generated by a computer program called
158:
211:
154:
138:. They are also carried along in email in order to fool
223:
53:. Unsourced material may be challenged and
117:Learn how and when to remove this message
224:
171:Colorless green ideas sleep furiously
51:adding citations to reliable sources
18:
16:Meaningless computer-generated text
13:
14:
258:
205:
23:
1:
212:An Inauthentic Paper Detector
7:
183:
10:
263:
232:Scientific misconduct
218:School of Informatics
47:improve this article
169:coined the phrase "
216:Indiana University
178:Indiana University
66:"Inauthentic text"
200:Stochastic parrot
147:Dissociated press
127:
126:
119:
101:
254:
237:Machine learning
131:inauthentic text
122:
115:
111:
108:
102:
100:
59:
27:
19:
262:
261:
257:
256:
255:
253:
252:
251:
222:
221:
208:
186:
123:
112:
106:
103:
60:
58:
44:
28:
17:
12:
11:
5:
260:
250:
249:
244:
239:
234:
220:
219:
207:
206:External links
204:
203:
202:
197:
192:
185:
182:
125:
124:
31:
29:
22:
15:
9:
6:
4:
3:
2:
259:
248:
245:
243:
240:
238:
235:
233:
230:
229:
227:
217:
213:
210:
209:
201:
198:
196:
193:
191:
188:
187:
181:
179:
174:
172:
168:
162:
160:
156:
152:
148:
143:
141:
137:
132:
121:
118:
110:
99:
96:
92:
89:
85:
82:
78:
75:
71:
68: –
67:
63:
62:Find sources:
56:
52:
48:
42:
41:
37:
32:This article
30:
26:
21:
20:
190:Scraper site
175:
167:Noam Chomsky
163:
151:Flarf poetry
144:
140:spam filters
130:
128:
113:
104:
94:
87:
80:
73:
61:
45:Please help
33:
226:Categories
195:Spamdexing
136:Spam blogs
77:newspapers
242:Semantics
107:July 2016
34:does not
184:See also
91:scholar
55:removed
40:sources
159:SCIgen
93:
86:
79:
72:
64:
247:Fraud
214:from
98:JSTOR
84:books
70:news
38:any
36:cite
155:MIT
149:or
129:An
49:by
228::
120:)
114:(
109:)
105:(
95:·
88:·
81:·
74:·
57:.
43:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.