Masks and Mimicry: Strategic Obfuscation and Impersonation Attacks on Authorship Verification

Open in new window