Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Authorship attribution for social media forensics
A Rocha, WJ Scheirer, CW Forstall… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
The veil of anonymity provided by smartphones with pre-paid SIM cards, public Wi-Fi
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …
hotspots, and distributed networks like Tor has drastically complicated the task of identifying …
Machine learning for e-mail spam filtering: review, techniques and trends
We present a comprehensive review of the most effective content-based e-mail spam
filtering techniques. We focus primarily on Machine Learning-based spam filters and their …
filtering techniques. We focus primarily on Machine Learning-based spam filters and their …
A survey of modern authorship attribution methods
E Stamatatos - Journal of the American Society for information …, 2009 - Wiley Online Library
Authorship attribution supported by statistical or computational methods has a long history
starting from the 19th century and is marked by the seminal study of Mosteller and Wallace …
starting from the 19th century and is marked by the seminal study of Mosteller and Wallace …
Authorship attribution
P Juola - Foundations and Trends® in Information Retrieval, 2008 - nowpublishers.com
Authorship attribution, the science of inferring characteristics of the author from the
characteristics of documents written by that author, is a problem with a long history and a …
characteristics of documents written by that author, is a problem with a long history and a …
Computational methods in authorship attribution
Statistical authorship attribution has a long history, culminating in the use of modern
machine learning classification methods. Nevertheless, most of this work suffers from the …
machine learning classification methods. Nevertheless, most of this work suffers from the …
A framework for authorship identification of online messages: Writing‐style features and classification techniques
With the rapid proliferation of Internet technologies and applications, misuse of online
messages for inappropriate or illegal purposes has become a major concern for society. The …
messages for inappropriate or illegal purposes has become a major concern for society. The …
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace
One of the problems often associated with online anonymity is that it hinders social
accountability, as substantiated by the high levels of cybercrime. Although identity cues are …
accountability, as substantiated by the high levels of cybercrime. Although identity cues are …
Author gender identification from text
Text is still the most prevalent Internet media type. Examples of this include popular social
networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications …
networking applications such as Twitter, Craigslist, Facebook, etc. Other web applications …
[PDF][PDF] Who's at the keyboard? Authorship attribution in digital evidence investigations
CE Chaski - International journal of digital evidence, 2005 - Citeseer
In some investigations of digital crime, the question of who was at the keyboard when
incriminating documents were produced can be legitimately raised. Authorship attribution …
incriminating documents were produced can be legitimately raised. Authorship attribution …
Authorship attribution using text distortion
E Stamatatos - Proceedings of the 15th Conference of the …, 2017 - aclanthology.org
Authorship attribution is associated with important applications in forensics and humanities
research. A crucial point in this field is to quantify the personal style of writing, ideally in a …
research. A crucial point in this field is to quantify the personal style of writing, ideally in a …