{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:01:04Z","timestamp":1740099664926,"version":"3.37.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030457143"},{"type":"electronic","value":"9783030457150"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45715-0_2","type":"book-chapter","created":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T23:05:47Z","timestamp":1588115147000},"page":"13-27","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Evolving a Weighted Combination of Text Similarities for Authorship Attribution"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8349-4373","authenticated-orcid":false,"given":"Youssef","family":"Keyrouz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4729-4715","authenticated-orcid":false,"given":"Cyril","family":"Fonlupt","sequence":"additional","affiliation":[]},{"given":"Dany","family":"Mezher","sequence":"additional","affiliation":[]},{"given":"Denis","family":"Robilliard","sequence":"additional","affiliation":[]},{"given":"Rafic","family":"Faddoul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,29]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1023\/a:1015059928466","volume":"1","author":"HG Beyer","year":"2002","unstructured":"Beyer, H.G., Schwefel, H.P.: Evolution strategies - a comprehensive introduction. Nat. Comput. 1(1), 3\u201352 (2002). \nhttps:\/\/doi.org\/10.1023\/a:1015059928466","journal-title":"Nat. Comput."},{"issue":"4","key":"2_CR2","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1093\/llc\/14.4.445","volume":"14","author":"J Binongo","year":"1999","unstructured":"Binongo, J., Smith, M.: The application of principal component analysis to stylometry. Literary Linguist. Comput. 14(4), 445\u2013466 (1999). \nhttps:\/\/doi.org\/10.1093\/llc\/14.4.445","journal-title":"Literary Linguist. Comput."},{"key":"2_CR3","series-title":"International Series in Operations Research & Management Science","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1007\/978-3-319-91086-4_14","volume-title":"Handbook of Metaheuristics","author":"EK Burke","year":"2019","unstructured":"Burke, E.K., Hyde, M.R., Kendall, G., Ochoa, G., \u00d6zcan, E., Woodward, J.R.: A classification of hyper-heuristic approaches: revisited. In: Gendreau, M., Potvin, J.-Y. (eds.) Handbook of Metaheuristics. ISORMS, vol. 272, pp. 453\u2013477. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-319-91086-4_14"},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1093\/llc\/18.4.423","volume":"18","author":"R Clement","year":"2003","unstructured":"Clement, R.: Ngram and Bayesian classification of documents for topic and authorship. Literary Linguist. Comput. 18(4), 423\u2013447 (2003). \nhttps:\/\/doi.org\/10.1093\/llc\/18.4.423","journal-title":"Literary Linguist. Comput."},{"issue":"2","key":"2_CR5","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1111\/j.1468-0394.2010.00547.x","volume":"28","author":"P Day","year":"2010","unstructured":"Day, P., Nandi, A.K.: Evolution of superFeatures through genetic programming. Expert Syst. 28(2), 167\u2013184 (2010). \nhttps:\/\/doi.org\/10.1111\/j.1468-0394.2010.00547.x","journal-title":"Expert Syst."},{"key":"2_CR6","unstructured":"Ge, Z., Sun, Y., Smith, M.J.T.: Authorship attribution using a neural network language model. In: Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, AAAI 2916, pp. 4212\u20134213. AAAI Press (2016). \nhttp:\/\/dl.acm.org\/citation.cfm?id=3016387.3016522"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-540-24630-5_69","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"G Guo","year":"2004","unstructured":"Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: An kNN model-based approach and its application in text categorization. In: Gelbukh, A. (ed.) CICLing 2004. LNCS, vol. 2945, pp. 559\u2013570. Springer, Heidelberg (2004). \nhttps:\/\/doi.org\/10.1007\/978-3-540-24630-5_69"},{"key":"2_CR8","unstructured":"Gutenberg: Project gutenberg, March 2018 (n.d.). \nwww.gutenberg.org"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Lahiri, S.: Complexity of word collocation networks: a preliminary structural analysis. In: Proceedings of the Student Research Workshop at the 14th Conference of the European Chapter of the Association for Computational Linguistics. Association for Computational Linguistics (2014). \nhttps:\/\/doi.org\/10.3115\/v1\/e14-3011","DOI":"10.3115\/v1\/e14-3011"},{"key":"2_CR10","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.orp.2016.09.002","volume":"3","author":"M L\u00f3pez-Ib\u00e1\u00f1ez","year":"2016","unstructured":"L\u00f3pez-Ib\u00e1\u00f1ez, M., Dubois-Lacoste, J., C\u00e1ceres, L.P., Birattari, M., St\u00fctzle, T.: The irace package: iterated racing for automatic algorithm configuration. Oper. Res. Perspect. 3, 43\u201358 (2016). \nhttps:\/\/doi.org\/10.1016\/j.orp.2016.09.002","journal-title":"Oper. Res. Perspect."},{"key":"2_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511483165","volume-title":"Attributing Authorship: An Introduction","author":"H Love","year":"2002","unstructured":"Love, H.: Attributing Authorship: An Introduction. Cambridge University Press, Cambridge (2002). \nhttps:\/\/doi.org\/10.1017\/CBO9780511483165"},{"key":"2_CR12","unstructured":"Luke, S.: ECJ evolutionary computation library. Available for free (1998), \nhttp:\/\/cs.gmu.edu\/~eclab\/projects\/ecj\/"},{"issue":"41","key":"2_CR13","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3406\/reg.1898.5847","volume":"11","author":"W Lutoslawski","year":"1898","unstructured":"Lutoslawski, W.: Principes de stylom\u00e9trie appliqu\u00e9s \u00e0 la chronologie des \u0153uvres de platon. Revue des \u00c9tudes Grecques 11(41), 61\u201381 (1898). \nhttps:\/\/doi.org\/10.3406\/reg.1898.5847","journal-title":"Revue des \u00c9tudes Grecques"},{"key":"2_CR14","unstructured":"Manning, C.D., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S.J., McClosky, D.: The Stanford CoreNLP natural language processing toolkit. In: Association for Computational Linguistics (ACL) System Demonstrations, pp. 55\u201360 (2014). \nhttp:\/\/www.aclweb.org\/anthology\/P\/P14\/P14-5010"},{"key":"2_CR15","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. In: Proceedings of Workshop at ICLR 2013, January 2013"},{"issue":"302","key":"2_CR16","doi-asserted-by":"publisher","first-page":"275","DOI":"10.2307\/2283270","volume":"58","author":"F Mosteller","year":"1963","unstructured":"Mosteller, F., Wallace, D.L.: Inference in an authorship problem. J. Am. Stat. Assoc. 58(302), 275 (1963). \nhttps:\/\/doi.org\/10.2307\/2283270","journal-title":"J. Am. Stat. Assoc."},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.D.: Glove: global vectors for word representation. In: Empirical Methods in Natural Language Processing (EMNLP), pp. 1532\u20131543 (2014). \nhttps:\/\/doi.org\/10.3115\/v1\/D14-1162\n\n. \nhttp:\/\/www.aclweb.org\/anthology\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Ramezani, R., Sheydaei, N., Kahani, M.: Evaluating the effects of textual features on authorship attribution accuracy. In: ICCKE 2013. IEEE, October 2013. \nhttps:\/\/doi.org\/10.1109\/iccke.2013.6682828","DOI":"10.1109\/iccke.2013.6682828"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1007\/978-0-387-39940-9_565","volume-title":"Encyclopedia of Database Systems","author":"P Refaeilzadeh","year":"2009","unstructured":"Refaeilzadeh, P., Tang, L., Liu, H.: Cross-validation. In: Liu, L., \u00d6zsu, M.T. (eds.) Encyclopedia of Database Systems, pp. 532\u2013538. Springer, Boston (2009). \nhttps:\/\/doi.org\/10.1007\/978-0-387-39940-9_565"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1023\/A:1001018624850","volume":"31","author":"J Rudman","year":"1997","unstructured":"Rudman, J.: The state of authorship attribution studies: some problems and solutions. Comput. Humanit. 31, 351\u2013365 (1997). \nhttps:\/\/doi.org\/10.1023\/A:1001018624850","journal-title":"Comput. Humanit."},{"issue":"11","key":"2_CR21","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1145\/361219.361220","volume":"18","author":"G Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, C.S.: A vector space model for automatic indexing. Commun. ACM 18(11), 613\u2013620 (1975). \nhttps:\/\/doi.org\/10.1145\/361219.361220","journal-title":"Commun. ACM"},{"key":"2_CR22","unstructured":"Selj, V., Peng, F., Cercone, N., Thomas, C.: N-gram-based author profiles for authorship attribution. In: Proceedings of the Conference Pacific Association for Computational Linguistics PACLING 2003, September 2003"},{"issue":"3","key":"2_CR23","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538\u2013556 (2009). \nhttps:\/\/doi.org\/10.1002\/asi.21001","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"issue":"6","key":"2_CR24","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/79.543973","volume":"13","author":"K Tang","year":"1996","unstructured":"Tang, K., Man, K., Kwong, S., He, Q.: Genetic algorithms and their applications. IEEE Signal Process. Mag. 13(6), 22\u201337 (1996). \nhttps:\/\/doi.org\/10.1109\/79.543973","journal-title":"IEEE Signal Process. Mag."},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/bf00054024","volume":"30","author":"FJ Tweedie","year":"1996","unstructured":"Tweedie, F.J., Singh, S., Holmes, D.I.: Neural network applications in stylometry: the federalist papers. Comput. Humanit. 30(1), 1\u201310 (1996). \nhttps:\/\/doi.org\/10.1007\/bf00054024","journal-title":"Comput. Humanit."},{"issue":"1","key":"2_CR26","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1093\/biomet\/62.1.207","volume":"62","author":"CB Williams","year":"1975","unstructured":"Williams, C.B.: Mendenhall\u2019s studies of word-length distribution in the works of Shakespeare and Bacon. Biometrika 62(1), 207\u2013212 (1975). \nhttps:\/\/doi.org\/10.1093\/biomet\/62.1.207","journal-title":"Biometrika"},{"key":"2_CR27","volume-title":"The Statistical Study of Literary Vocabulary","author":"CU Yule","year":"2014","unstructured":"Yule, C.U.: The Statistical Study of Literary Vocabulary. Cambridge University Press, Cambridge (2014)"},{"issue":"3\/4","key":"2_CR28","doi-asserted-by":"publisher","first-page":"363","DOI":"10.2307\/2332655","volume":"30","author":"GU Yule","year":"1939","unstructured":"Yule, G.U.: On sentence-length as a statistical characteristic of style in prose: with application to two cases of disputed authorship. Biometrika 30(3\/4), 363 (1939). \nhttps:\/\/doi.org\/10.2307\/2332655","journal-title":"Biometrika"},{"key":"2_CR29","doi-asserted-by":"publisher","DOI":"10.4159\/harvard.9780674434929","volume-title":"Selected Studies of the Principle of Relative Frequency in Language","author":"GK Zipf","year":"1932","unstructured":"Zipf, G.K.: Selected Studies of the Principle of Relative Frequency in Language. Harvard University Press, Cambridge (1932). \nhttps:\/\/doi.org\/10.4159\/harvard.9780674434929"}],"container-title":["Lecture Notes in Computer Science","Artificial Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45715-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T23:12:40Z","timestamp":1588115560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45715-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030457143","9783030457150"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45715-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Evolution (Evolution Artificielle)","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mulhouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ae2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ea2019.inria.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}