{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:47:59Z","timestamp":1772909279913,"version":"3.50.1"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031708787","type":"print"},{"value":"9783031708794","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-70879-4_11","type":"book-chapter","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T19:02:20Z","timestamp":1725476540000},"page":"208-228","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Beyond Words: Stylometric Analysis for\u00a0Detecting AI Manipulation on\u00a0Social Media"],"prefix":"10.1007","author":[{"given":"Ubaid","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Sonia","family":"Laudanna","sequence":"additional","affiliation":[]},{"given":"P.","family":"Vinod","sequence":"additional","affiliation":[]},{"given":"Andrea","family":"Di Sorbo","sequence":"additional","affiliation":[]},{"given":"Corrado Aaron","family":"Visaggio","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Canfora","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,5]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Elliott, A.: The culture of AI: everyday life and the digital revolution. Routledge (2019)","DOI":"10.4324\/9781315387185"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Cardaioli, M., Conti, M., Di\u00a0Sorbo, A., Fabrizio, E., Laudanna, S., Visaggio, C.A.: It\u2019s a matter of style: detecting social bots through writing style consistency. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20139. IEEE (2021)","DOI":"10.1109\/ICCCN52240.2021.9522339"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Lambert, J., Stevens, M.: ChatGPT and generative AI technology: a mixed bag of concerns and new opportunities. Comput. Schools, 1\u201325 (2023)","DOI":"10.1080\/07380569.2023.2256710"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: Social bot detection in the age of ChatGPT: challenges and opportunities. First Monday (2023)","DOI":"10.5210\/fm.v28i6.13185"},{"issue":"3","key":"11_CR5","first-page":"85","volume":"3","author":"MA AlAfnan","year":"2023","unstructured":"AlAfnan, M.A., MohdZuki, S.F.: Do artificial intelligence chatbots have a writing style? An investigation into the stylistic features of ChatGPT-4. J. Artif. Intell. Technol. 3(3), 85\u201394 (2023)","journal-title":"J. Artif. Intell. Technol."},{"issue":"1","key":"11_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41467-018-06930-7","volume":"9","author":"C Shao","year":"2018","unstructured":"Shao, C., Ciampaglia, G.L., Varol, O., Yang, K.-C., Flammini, A., Menczer, F.: The spread of low-credibility content by social bots. Nat. Commun. 9(1), 1\u20139 (2018)","journal-title":"Nat. Commun."},{"issue":"9","key":"11_CR7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0184148","volume":"12","author":"B M\u00f8nsted","year":"2017","unstructured":"M\u00f8nsted, B., Sapie\u017cy\u0144ski, P., Ferrara, E., Lehmann, S.: Evidence of complex contagion of information in social media: an experiment using twitter bots. PLoS ONE 12(9), e0184148 (2017)","journal-title":"PLoS ONE"},{"issue":"6380","key":"11_CR8","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1126\/science.aap9559","volume":"359","author":"S Vosoughi","year":"2018","unstructured":"Vosoughi, S., Roy, D., Aral, S.: The spread of true and false news online. Science 359(6380), 1146\u20131151 (2018). https:\/\/doi.org\/10.1126\/science.aap9559","journal-title":"Science"},{"issue":"Spring","key":"11_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2749279.2749283","volume":"2015","author":"E Ferrara","year":"2015","unstructured":"Ferrara, E.: Manipulation and abuse on social media by Emilio Ferrara with Ching-man Au Yeung as coordinator. ACM SIGWEB Newsletter 2015(Spring), 1\u20139 (2015). https:\/\/doi.org\/10.1145\/2749279.2749283","journal-title":"ACM SIGWEB Newsletter"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Bessi, A., Ferrara, E.: Social bots distort the us presidential election online discussion. First Monday 21(11\u20137), 2016 (2016)","DOI":"10.5210\/fm.v21i11.7090"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Badawy, A., Ferrara, E., Lerman, K.: Analyzing the digital traces of political manipulation: the Russian interference twitter campaign. In: 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), vol. 2018, pp. 258\u2013265. IEEE (2016)","DOI":"10.1109\/ASONAM.2018.8508646"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Shen, F., Zhang, E., Zhang, H., Ren, W., Jia, Q., He, Y.: Examining the differences between human and bot social media accounts: a case study of the Russia-Ukraine war. First Monday (2023)","DOI":"10.5210\/fm.v28i2.12777"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, B., Ren, W., Zhu, Y., Zhang, H.: Manufacturing conflict or advocating peace? A study of social bots agenda building in the twitter discussion of the Russia-Ukraine war. J. Inf. Technol. Polit., 1\u201319 (2023)","DOI":"10.1080\/19331681.2023.2189201"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Braker, C., Shiaeles, S., Bendiab, G., Savage, N., Limniotis, K.: Botspot: deep learning classification of bot accounts within twitter. In: Internet of Things, Smart Spaces, and Next Generation Networks and Systems: 20th International Conference, NEW2AN: and 13th Conference, ruSMART 2020, St. Petersburg, Russia, August 26\u201328, 2020, Proceedings, Part I 20. Springer , pp. 165\u2013175 (2020). https:\/\/doi.org\/10.1007\/978-3-030-65726-0_16","DOI":"10.1007\/978-3-030-65726-0_16"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Wu, X., Duan, R., Ni, J.: Unveiling security, privacy, and ethical concerns of ChatGPT. J. Inf. Intell. (2023)","DOI":"10.1016\/j.jiixd.2023.10.007"},{"key":"11_CR16","unstructured":"Akram, A.: An empirical study of AI generated text detection tools. arXiv preprint arXiv:2310.01423 (2023)"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"Farzindar, A., Inkpen, D., Hirst, G.: Natural language processing for social media. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-031-02175-6","DOI":"10.1007\/978-3-031-02175-6"},{"issue":"3","key":"11_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.3390\/robotics8030050","volume":"8","author":"NH Imam","year":"2019","unstructured":"Imam, N.H., Vassilakis, V.G.: A survey of attacks against twitter spam detectors in an adversarial environment. Robotics 8(3), 50 (2019)","journal-title":"Robotics"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gambini, M., Fagni, T., Falchi, F., Tesconi, M.: On pushing DeepFake tweet detection capabilities to the limits. In: Proceedings of the 14th ACM Web Science Conference 2022, pp. 154\u2013163 (2022)","DOI":"10.1145\/3501247.3531560"},{"issue":"5","key":"11_CR20","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0251415","volume":"16","author":"T Fagni","year":"2021","unstructured":"Fagni, T., Falchi, F., Gambini, M., Martella, A., Tesconi, M.: TweepFake: about detecting DeepFake tweets. PLoS ONE 16(5), e0251415 (2021)","journal-title":"PLoS ONE"},{"key":"11_CR21","unstructured":"Ashraf, S., Javed, O., Adeel, M., Iqbal, H., Nawab, R.M.A.: Bots and gender prediction using language independent stylometry-based approach. In: CLEF (Working Notes), vol. 100 (2019)"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Kuruvilla, A.M., Varghese, S.: A detection system to counter identity deception in social media applications. In: 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], pp. 1\u20135. IEEE (2015)","DOI":"10.1109\/ICCPCT.2015.7159321"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Sohn, K.-A., Chung, T.-S., et\u00a0al.: A graph model based author attribution technique for single-class e-mail classification. In: 2015 IEEE\/ACIS 14th International Conference on Computer and Information Science (ICIS), pp. 191\u2013196. IEEE (2015)","DOI":"10.1109\/ICIS.2015.7166592"},{"issue":"2","key":"11_CR24","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/JSYST.2015.2472579","volume":"11","author":"L Fridman","year":"2016","unstructured":"Fridman, L., Weber, S., Greenstadt, R., Kam, M.: Active authentication on mobile devices via stylometry, application usage, web browsing, and GPS location. IEEE Syst. J. 11(2), 513\u2013521 (2016)","journal-title":"IEEE Syst. J."},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Ragel, R., Herath, P., Senanayake, U.: Authorship detection of SMS messages using unigrams. In: 2013 IEEE 8th International Conference on Industrial and Information Systems, pp. 387\u2013392. IEEE (2013)","DOI":"10.1109\/ICIInfS.2013.6732015"},{"key":"11_CR26","unstructured":"Herz, J., Bellaachia, A.: The authorship of audacity: data mining and stylometric analysis of Barack Obama speeches. In: Proceedings of the International Conference on Data Science (ICDATA). The Steering Committee of The World Congress in Computer Science, Computer, p. 1 (2014)"},{"key":"11_CR27","doi-asserted-by":"publisher","unstructured":"De Faveri, F.L., Cosuti, L., Tricomi, P.P., Conti, M.: Twitter bots influence on the Russo-Ukrainian war during the: Italian general elections. In: International Symposium on Security and Privacy in Social Networks and Big Data, vol. 2023, pp. 38\u201357. Springer (2022). https:\/\/doi.org\/10.1007\/978-981-99-5177-2_3","DOI":"10.1007\/978-981-99-5177-2_3"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Addawood, A., Badawy, A., Lerman, K., Ferrara, E.: Linguistic cues to deception: identifying political trolls on social media. In: Proceedings of the international AAAI Conference on Web and Social Media, vol.\u00a013, pp. 15\u201325 (2019)","DOI":"10.1609\/icwsm.v13i01.3205"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Luceri, L., Deb, A., Badawy, A., Ferrara, E.: Red bots do it better: comparative analysis of social bot partisan behavior. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 1007\u20131012 (2019)","DOI":"10.1145\/3308560.3316735"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Kollanyi, B.: Bots,# strongerin, and# brexit: computational propaganda during the uk-eu referendum. arXiv preprint arXiv:1606.06356 (2016)","DOI":"10.2139\/ssrn.2798311"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Stella, M., Ferrara, E., De\u00a0Domenico, M.: Bots increase exposure to negative and inflammatory content in online social systems. In: Proceedings of the National Academy of Sciences, vol. 115, no.\u00a049, pp. 12:435\u201312:440 (2018)","DOI":"10.1073\/pnas.1803470115"},{"key":"11_CR32","doi-asserted-by":"publisher","unstructured":"Vasek, M., Moore, T.: There\u2019s no free lunch, even using bitcoin: tracking the popularity and profits of virtual currency scams. In: Financial Cryptography and Data Security: 19th International Conference, FC: San Juan, Puerto Rico, January 26\u201330, 2015, Revised Selected Papers 19, vol. 2015, pp. 44\u201361. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-47854-7_4","DOI":"10.1007\/978-3-662-47854-7_4"},{"key":"11_CR33","unstructured":"Allyn, B.: Researchers: nearly half of accounts tweeting about coronavirus are likely bots. NPR.org Internet, vol.\u00a020 (2020)"},{"key":"11_CR34","doi-asserted-by":"crossref","unstructured":"Ferrara, E.: What types of COVID-19 conspiracies are populated by twitter bots? First Monday, vol.\u00a025, no.\u00a06 (2020)","DOI":"10.5210\/fm.v25i6.10633"},{"key":"11_CR35","doi-asserted-by":"crossref","unstructured":"Clark, E., August, T., Serrano, S., Haduong, N., Gururangan, S., Smith, N.A.: All that\u2019s \u2018human\u2019 is not gold: Evaluating human evaluation of generated text. In: Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing (Volume 1: Long Papers) (2021)","DOI":"10.18653\/v1\/2021.acl-long.565"},{"key":"11_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106553","volume":"114","author":"N K\u00f6bis","year":"2021","unstructured":"K\u00f6bis, N., Mossink, L.D.: Artificial intelligence versus Maya Angelou: experimental evidence that people cannot differentiate AI-generated from human-written poetry. Comput. Hum. Behav. 114, 106553 (2021)","journal-title":"Comput. Hum. Behav."},{"key":"11_CR37","unstructured":"Transformer, G.G.P., Thunstr\u00f6m, A.O., Steingrimsson, S.: Can GPT-3 write an academic paper on itself, with minimal human input? (2022)"},{"key":"11_CR38","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-981-99-7947-9_12","volume-title":"Artificial Intelligence in Education Technologies: New Development and Innovative Practices: Proceedings of 2023 4th International Conference on Artificial Intelligence in Education Technology","author":"L Mindner","year":"2023","unstructured":"Mindner, L., Schlippe, T., Schaaff, K.: Classification of\u00a0human- and AI-generated texts: investigating features for\u00a0ChatGPT. In: Schlippe, T., Cheng, E.C.K., Wang, T. (eds.) Artificial Intelligence in Education Technologies: New Development and Innovative Practices: Proceedings of 2023 4th International Conference on Artificial Intelligence in Education Technology, pp. 152\u2013170. Springer Nature Singapore, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-7947-9_12"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Korkmaz, A., Akt\u00fcrk, C., Talan, T.: Analyzing the user\u2019s sentiments of ChatGPT using twitter data. Iraqi J. Comput. Sci. Math., 4(2), 202\u2013214 (2023)","DOI":"10.52866\/ijcsm.2023.02.02.018"},{"key":"11_CR40","unstructured":"Harrag, F., Dabbah, M., Darwish, K., Abdelali, A.: BERT transformer model for detecting Arabic GPT2 auto-generated tweets. In: Proceedings of the Fifth Arabic Natural Language Processing Workshop. Barcelona, Spain (Online): Association for Computational Linguistics, pp. 207\u2013214 (2020)"},{"key":"11_CR41","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-030-92571-0_7","volume-title":"Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16\u201320, 2021, Proceedings","author":"SM Saravani","year":"2021","unstructured":"Saravani, S.M., Ray, I., Ray, I.: Automated identification of\u00a0social media bots using DeepFake text detection. In: Tripathy, S., Shyamasundar, R.K., Ranjan, R. (eds.) Information Systems Security: 17th International Conference, ICISS 2021, Patna, India, December 16\u201320, 2021, Proceedings, pp. 111\u2013123. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92571-0_7"},{"key":"11_CR42","doi-asserted-by":"publisher","unstructured":"Spitale, G., Biller-Andorno, N., Germani, F.: AI model GPT-3 (dis)informs us better than humans. Sci. Adv. 9(26) (2023). https:\/\/doi.org\/10.1126\/sciadv.adh1850","DOI":"10.1126\/sciadv.adh1850"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Tourille, J., Sow, B., Popescu, A.: Automatic detection of bot-generated tweets. In: Proceedings of the 1st International Workshop on Multimedia AI against Disinformation, pp. 44\u201351 (2022)","DOI":"10.1145\/3512732.3533584"},{"key":"11_CR44","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-030-01704-0_4","volume-title":"Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Wu, C., Zheng, K., Wang, X.: Social bot detection using tweets similarity. In: Beyah, R., Chang, B., Li, Y., Zhu, S. (eds.) Security and Privacy in Communication Networks: 14th International Conference, SecureComm 2018, Singapore, Singapore, August 8-10, 2018, Proceedings, Part II, pp. 63\u201378. Springer International Publishing, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01704-0_4"},{"key":"11_CR45","doi-asserted-by":"crossref","unstructured":"Chen, Y., Bouazizi, M., Ohtsuki, T.: Social robot detection using RoBERTa classifier and random forest regressor with similarity analysis. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 6433\u20136438. IEEE (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10001445"},{"key":"11_CR46","unstructured":"Ma, Y., Liu, J., Yi, F., Cheng, Q., Huang, Y., Lu, W., Liu, X.: AI vs. Human\u2013differentiation analysis of scientific content generation. arXiv:2301 (2023)"},{"key":"11_CR47","doi-asserted-by":"crossref","unstructured":"Cresci, S., Di\u00a0Pietro, R., Petrocchi, M., Spognardi, A., Tesconi, M.: The paradigm-shift of social spambots: evidence, theories, and tools for the arms race. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 963\u2013972 (2017)","DOI":"10.1145\/3041021.3055135"},{"key":"11_CR48","doi-asserted-by":"crossref","unstructured":"Sujith, K., Chowdhury, S., Goyal, A., Hegde, A.V., Srinath, R.: Twitter bot detection and ranking using supervised machine learning models. In: 2022 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI), vol.\u00a01, pp. 1\u20136. IEEE (2022)","DOI":"10.1109\/ICDSAAI55433.2022.10028860"},{"key":"11_CR49","doi-asserted-by":"publisher","unstructured":"Rajkumar, A., Rakesh, C., Kalaivani, M., Arun, G.: Twitter bot detection using one-class classifier and topic analysis. In: Inventive Systems and Control: Proceedings of ICISC 2022, pp. 789\u2013799. Springer (2022). https:\/\/doi.org\/10.1007\/978-981-19-1012-8_56","DOI":"10.1007\/978-981-19-1012-8_56"},{"key":"11_CR50","doi-asserted-by":"crossref","unstructured":"McKnight, P.E., Najab, J.: Mann-whitney u test. The Corsini encyclopedia of psychology, p. 1 (2010)","DOI":"10.1002\/9780470479216.corpsy0524"},{"key":"11_CR51","unstructured":"Grissom, R., Kim, J.: Effect Sizes for Research: A Broad Practical Approach. Lawrence Erlbaum Associates (2005)"},{"issue":"200","key":"11_CR52","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1080\/01621459.1937.10503522","volume":"32","author":"M Friedman","year":"1937","unstructured":"Friedman, M.: The use of ranks to avoid the assumption of normality implicit in the analysis of variance. J. Am. Stat. Assoc. 32(200), 675\u2013701 (1937)","journal-title":"J. Am. Stat. Assoc."},{"key":"11_CR53","unstructured":"Nemenyi, P.B.: Distribution-free multiple comparisons. Princeton University (1963)"},{"key":"11_CR54","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106665","volume":"139","author":"S Panichella","year":"2021","unstructured":"Panichella, S., Canfora, G., Di Sorbo, A.: Won\u2019t We Fix this Issue? Qualitative characterization and automated identification of Wontfix issues on Github. Inf. Softw. Technol. 139, 106665 (2021)","journal-title":"Inf. Softw. Technol."},{"key":"11_CR55","doi-asserted-by":"crossref","unstructured":"Panichella, S., Di Sorbo, A., Guzman, E., Visaggio, C.A., Canfora, G., Gall, H.C.: How can i improve my app? Classifying user reviews for software maintenance and evolution. In: 2015 IEEE International Conference on Software Maintenance and Evolution, ICSME 2015, Bremen, Germany, September 29 - October 1, 2015, R.\u00a0Koschke, J.\u00a0Krinke, and M.\u00a0P. Robillard, Eds., pp. 281\u2013290. IEEE Computer Society (2015)","DOI":"10.1109\/ICSM.2015.7332474"},{"key":"11_CR56","doi-asserted-by":"crossref","unstructured":"Di Sorbo, A., Zampetti, F., Visaggio, A., Penta, M.D., Panichella, S.: Automated identification and qualitative characterization of safety concerns reported in UAV software platforms. ACM Trans. Softw. Eng. Methodol. 32(3), 67:1\u201367:37 (2023)","DOI":"10.1145\/3564821"},{"issue":"3","key":"11_CR57","doi-asserted-by":"publisher","first-page":"348","DOI":"10.3102\/1076998619832248","volume":"44","author":"J Hao","year":"2019","unstructured":"Hao, J., Ho, T.K.: Machine learning made easy: a review of scikit-learn package in python programming language. J. Educ. Behav. Stat. 44(3), 348\u2013361 (2019)","journal-title":"J. Educ. Behav. Stat."},{"key":"11_CR58","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1631\/BF02842477","volume":"6","author":"Z Yun-tao","year":"2005","unstructured":"Yun-tao, Z., Ling, G., Yong-cheng, W.: An improved TF-IDF approach for text classification. J. Zhejiang Univ.-Sci. A 6, 49\u201355 (2005)","journal-title":"J. Zhejiang Univ.-Sci. A"},{"key":"11_CR59","doi-asserted-by":"crossref","unstructured":"Morris, J.X., Lifland, E., Yoo, J.Y., Grigsby, J., Jin, D., Qi, Y.: TextAttack: a framework for adversarial attacks, data augmentation, and adversarial training in NLP (2020). https:\/\/api.semanticscholar.org\/CorpusID:220714040","DOI":"10.18653\/v1\/2020.emnlp-demos.16"},{"issue":"05","key":"11_CR60","first-page":"8018","volume":"34","author":"D Jin","year":"2020","unstructured":"Jin, D., Jin, Z., Zhou, J.T., Szolovits, P.: Is BERT really robust? A strong baseline for natural language attack on text classification and entailment. Proc. AAAI Conf. Artif. Intell. 34(05), 8018\u20138025 (2020)","journal-title":"Proc. AAAI Conf. Artif. Intell."},{"key":"11_CR61","unstructured":"Cer, D., et\u00a0al.: Universal sentence encoder. arXiv preprint arXiv:1803.11175 (2018)"},{"key":"11_CR62","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2023.126787","volume":"558","author":"A Bajaj","year":"2023","unstructured":"Bajaj, A., Vishwakarma, D.K.: Evading text based emotion detection mechanism via adversarial attacks. Neurocomputing 558, 126787 (2023)","journal-title":"Neurocomputing"},{"key":"11_CR63","doi-asserted-by":"crossref","unstructured":"Gilani, Z., Kochmar, E., Crowcroft, J.: Classification of twitter accounts into automated agents and human users. In: Proceedings of the 2017 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, pp. 489\u2013496 (2017)","DOI":"10.1145\/3110025.3110091"},{"key":"11_CR64","unstructured":"Rangel, F., Rosso, P., Koppel, M., Stamatatos, E., Inches, G.: Overview of the author profiling task at pan 2013. In: CLEF Conference on Multilingual and Multimodal Information Access Evaluation, pp. 352\u2013365. CELCT (2013)"},{"key":"11_CR65","unstructured":"L\u00f3pez-Anguita, R., Montejo-R\u00e1ez, A., D\u00edaz-Galiano, M.C.: Complexity measures and POS N-grams for author identification in several languages. SINAI at PAN@ CLEF (2018)"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-70879-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:43:39Z","timestamp":1732736619000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-70879-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031708787","9783031708794"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-70879-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"5 September 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bydgoszcz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2024.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}