Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents

Almas Abdibayev, Dongkai Chen, Haipeng Chen, Deepti Poluru, V. S. Subrahmanian*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

Theft of intellectual property is a growing problem - one that is exacerbated by the fact that a successful compromise of an enterprise might only become known months after the hack. A recent solution called FORGE addresses this problem by automatically generating N "fake"versions of any real document so that the attacker has to determine which of the N + 1 documents that they have exfiltrated from a compromised network is real. In this article, we remove two major drawbacks in FORGE: (i) FORGE requires ontologies in order to generate fake documents - however, in the real world, ontologies, especially good ontologies, are infrequently available. The WE-FORGE system proposed in this article completely eliminates the need for ontologies by using distance metrics on word embeddings instead. (ii) FORGE generates fake documents by first identifying "target"concepts in the original document and then substituting "replacement"concepts for them. However, we will show that this can lead to sub-optimal results (e.g., as target concepts are selected without knowing the availability and/or quality of the replacement concepts, they can sometimes lead to poor results). Our WE-FORGE system addresses this problem in two possible ways by performing a joint optimization to select concepts and replacements simultaneously. We conduct a human study involving both computer science and chemistry documents and show that WE-FORGE successfully deceives adversaries.

Original languageEnglish (US)
Article number13
JournalACM Transactions on Management Information Systems
Volume12
Issue number2
DOIs
StatePublished - Jun 2021
Externally publishedYes

Keywords

  • AI security
  • fake document generation

ASJC Scopus subject areas

  • Management Information Systems
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Using Word Embeddings to Deter Intellectual Property Theft through Automated Generation of Fake Documents'. Together they form a unique fingerprint.

Cite this