Authorship attribution for social media forensics

A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …

Computational methods in authorship attribution

M Koppel, J Schler, S Argamon - Journal of the American …, 2009 - Wiley Online Library
Statistical authorship attribution has a long history, culminating in the use of modern
machine learning classification methods. Nevertheless, most of this work suffers from the …

[PDF][PDF] Data mining system and applications: A review

SP Deshpande, VM Thakare - International Journal of Distributed …, 2010 - researchgate.net
In the Information Technology era information plays vital role in every sphere of the human
life. It is very important to gather data from different data sources, store and maintain the …

Behavioural biometrics: a survey and classification

RV Yampolskiy, V Govindaraju - International Journal of …, 2008 - inderscienceonline.com
This study is a survey and classification of the state-of-the-art in behavioural biometrics
which is based on skills, style, preference, knowledge, motor-skills or strategy used by …

Overview of the author identification task at PAN 2014

E Stamatatos, W Daelemans, B Verhoeven… - CEUR Workshop …, 2014 - cris.unibo.it
The author identification task at PAN-2014 focuses on author verification. Similar to PAN-
2013 we are given a set of documents by the same author along with exactly one document …

N-gram feature selection for authorship identification

J Houvardas, E Stamatatos - International conference on artificial …, 2006 - Springer
Automatic authorship identification offers a valuable tool for supporting crime investigation
and security. It can be seen as a multi-class, single-label text categorization task. Character …

[PDF][PDF] Measuring differentiability: Unmasking pseudonymous authors.

M Koppel, J Schler, E Bonchek-Dokow - Journal of Machine Learning …, 2007 - jmlr.org
In the authorship verification problem, we are given examples of the writing of a single
author and are asked to determine if given long texts were or were not written by this author …

Authorship attribution using text distortion

E Stamatatos - Proceedings of the 15th Conference of the …, 2017 - aclanthology.org
Authorship attribution is associated with important applications in forensics and humanities
research. A crucial point in this field is to quantify the personal style of writing, ideally in a …

Linguistic profiling of a neural language model

A Miaschi, D Brunato, F Dell'Orletta… - arxiv preprint arxiv …, 2020 - arxiv.org
In this paper we investigate the linguistic knowledge learned by a Neural Language Model
(NLM) before and after a fine-tuning process and how this knowledge affects its predictions …

Profiling-ud: a tool for linguistic profiling of texts

D Brunato, A Cimino, F Dell'Orletta… - Proceedings of the …, 2020 - aclanthology.org
In this paper, we introduce Profiling–UD, a new text analysis tool inspired to the principles of
linguistic profiling that can support language variation research from different perspectives. It …