Overview of the authorship verification task at PAN 2022
The authorship verification task at PAN 2022 follows the experimental setup of similar
shared tasks in the recent past. However, it focuses on a different, and very challenging …
shared tasks in the recent past. However, it focuses on a different, and very challenging …
An overview of recent work in media forensics: Methods and threats
In this paper, we review recent work in media forensics for digital images, video, audio
(specifically speech), and documents. For each data modality, we discuss synthesis and …
(specifically speech), and documents. For each data modality, we discuss synthesis and …
[書籍][B] Defending assessment security in a digital world: Preventing e-cheating and supporting academic integrity in higher education
P Dawson - 2020 - taylorfrancis.com
Defending Assessment Security in a Digital World explores the phenomenon of e-cheating
and identifies ways to bolster assessment to ensure that it is secured against threats posed …
and identifies ways to bolster assessment to ensure that it is secured against threats posed …
[HTML][HTML] Psychographic traits identification based on political ideology: An author analysis study on spanish politicians' tweets posted in 2020
In general, people are usually more reluctant to follow advice and directions from politicians
who do not have their ideology. In extreme cases, people can be heavily biased in favour of …
who do not have their ideology. In extreme cases, people can be heavily biased in favour of …
Predicting drug–target binding affinity through molecule representation block based on multi-head attention and skip connection
Exiting computational models for drug–target binding affinity prediction have much room for
improvement in prediction accuracy, robustness and generalization ability. Most deep …
improvement in prediction accuracy, robustness and generalization ability. Most deep …
Machine learning methods for stylometry
J Savoy - Cham: Springer, 2020 - Springer
With the recent progress made in network and computing technology, the ubiquity of data,
and textual repositories freely available, the scientific practice evolves towards a more data …
and textual repositories freely available, the scientific practice evolves towards a more data …
Cross-domain authorship attribution using pre-trained language models
Authorship attribution attempts to identify the authors behind texts and has important
applications mainly in cyber-security, digital humanities and social media analytics. An …
applications mainly in cyber-security, digital humanities and social media analytics. An …
Explainable authorship verification in social media via attention-based similarity learning
Authorship verification is the task of analyzing the linguistic patterns of two or more texts to
determine whether they were written by the same author or not. The analysis is traditionally …
determine whether they were written by the same author or not. The analysis is traditionally …
Computational intelligence enabled cybersecurity for the internet of things
The computational intelligence (CI) based technologies play key roles in campaigning
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …
cybersecurity challenges in complex systems such as the Internet of Things (IoT), cyber …
Can software improve marker accuracy at detecting contract cheating? A pilot study of the Turnitin authorship investigate alpha
Contract cheating happens when students outsource their assessed work to a third party.
One approach that has been suggested for improving contract cheating detection is …
One approach that has been suggested for improving contract cheating detection is …