Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Authorship attribution in the era of llms: Problems, methodologies, and challenges

B Huang, C Chen, K Shu - ACM SIGKDD Explorations Newsletter, 2025 - dl.acm.org
Accurate attribution of authorship is crucial for maintaining the integrity of digital content,
improving forensic investigations, and mitigating the risks of misinformation and plagiarism …

[KSIĄŻKA][B] Sentiment analysis: Mining opinions, sentiments, and emotions

B Liu - 2020 - books.google.com
Sentiment analysis is the computational study of people's opinions, sentiments, emotions,
moods, and attitudes. This fascinating problem offers numerous research challenges, but …

A survey of modern authorship attribution methods

E Stamatatos - Journal of the American Society for information …, 2009 - Wiley Online Library
Authorship attribution supported by statistical or computational methods has a long history
starting from the 19th century and is marked by the seminal study of Mosteller and Wallace …

[KSIĄŻKA][B] An introduction to forensic linguistics: Language in evidence

M Coulthard, A Johnson, D Wright - 2016 - taylorfrancis.com
An Introduction to Forensic Linguistics: Language in Evidence has established itself as the
essential textbook written by leading authorities in this expanding field. The second edition …

Computational methods in authorship attribution

M Koppel, J Schler, S Argamon - Journal of the American …, 2009 - Wiley Online Library
Statistical authorship attribution has a long history, culminating in the use of modern
machine learning classification methods. Nevertheless, most of this work suffers from the …

Predicting age and gender in online social networks

C Peersman, W Daelemans… - Proceedings of the 3rd …, 2011 - dl.acm.org
A common characteristic of communication on online social networks is that it happens via
short messages, often using non-standard language variations. These characteristics make …

Does size matter? Authorship attribution, small samples, big problem

M Eder - Digital Scholarship in the Humanities, 2015 - academic.oup.com
The aim of this study is to find such a minimal size of text samples for authorship attribution
that would provide stable results independent of random noise. A few controlled tests for …

A comparative study of machine learning methods for authorship attribution

ML Jockers, DM Witten - Literary and Linguistic Computing, 2010 - academic.oup.com
We compare and benchmark the performance of five classification methods, four of which
are taken from the machine learning literature, in a classic authorship attribution problem …

User profiling in intrusion detection: A review

J Peng, KKR Choo, H Ashman - Journal of Network and Computer …, 2016 - Elsevier
Intrusion detection systems are important for detecting and reacting to the presence of
unauthorised users of a network or system. They observe the actions of the system and its …