{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:00:32Z","timestamp":1725764432797},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319038438"},{"type":"electronic","value":"9783319038445"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03844-5_4","type":"book-chapter","created":{"date-parts":[[2013,12,15]],"date-time":"2013-12-15T21:56:24Z","timestamp":1387144584000},"page":"28-37","source":"Crossref","is-referenced-by-count":0,"title":["An Empirical Evaluation of SVM on Meta Features for Authorship Attribution of Online Texts"],"prefix":"10.1007","author":[{"given":"Hongwei","family":"Yao","sequence":"first","affiliation":[]},{"given":"Tieyun","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Li","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Manyun","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Xueyu","family":"Mo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Argamon, S., Levitan, S.: Measuring the usefulness of function words for authorship attribution. In: Literary and Linguistic Computing, pp. 1\u20133 (2004)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Argamon, S., \u0160ari\u0107, M., Stein, S.S.: Style mining of electronic messages for multiple authorship discrimination: First results. In: Proc. of the 9th SIGKDD, pp. 475\u2013480 (2003)","DOI":"10.1145\/956804.956805"},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1002\/asi.20553","volume":"58","author":"S. Argamon","year":"2007","unstructured":"Argamon, S., Whitelaw, C., Chase, P., Hota, S.R., Garg, N., Levitan, S.: Stylistic text classification using functional lexical features: Research articles. JASIST\u00a058, 802\u2013822 (2007)","journal-title":"JASIST"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1093\/llc\/7.2.91","volume":"7","author":"J.F. Burrows","year":"1992","unstructured":"Burrows, J.F.: Not unles you ask nicely: The interpretative nexus between analysis and information. Literary and Linguistic Computing\u00a07, 91\u2013109 (1992)","journal-title":"Literary and Linguistic Computing"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1023\/A:1023824908771","volume":"19","author":"J. Diederich","year":"2000","unstructured":"Diederich, J., Kindermann, J., Leopold, E., Paass, G., Informationstechnik, G.F., Augustin, D.S.: Authorship attribution with support vector machines. Applied Intelligence\u00a019, 109\u2013123 (2000)","journal-title":"Applied Intelligence"},{"key":"4_CR6","unstructured":"Escalante, H.J., Solorio, T., Montes-y G\u00f3mez, M.: Local histograms of character n-grams for authorship attribution. In: Proc. of the 49th ACL, pp. 288\u2013298 (2011)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Gamon, M.: Linguistic correlates of style: authorship classification with deep linguistic analysis features. In: Proc. of the 20th COLING (2004)","DOI":"10.3115\/1220355.1220443"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1017\/S1351324905003694","volume":"11","author":"N. Graham","year":"2005","unstructured":"Graham, N., Hirst, G., Marthi, B.: Segmenting documents by stylistic character. Natural Language Engineering\u00a011, 397\u2013415 (2005)","journal-title":"Natural Language Engineering"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1093\/llc\/fqm020","volume":"22","author":"J. Grieve","year":"2007","unstructured":"Grieve, J.: Quantitative authorship attribution: An evaluation of techniques. Literary and Linguistic Computing\u00a022, 251\u2013270 (2007)","journal-title":"Literary and Linguistic Computing"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1187415.1187416","volume":"4","author":"H. Halteren van","year":"2007","unstructured":"van Halteren, H.: Author verification by linguistic profiling: An exploration of the parameter space. ACM Transactions on Speech and Language Processing\u00a04, 1\u201317 (2007)","journal-title":"ACM Transactions on Speech and Language Processing"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1093\/llc\/11.3.121","volume":"11","author":"H. Halteren van","year":"1996","unstructured":"van Halteren, H., Tweedie, F., Baayen, H.: Outside the cave of shadows: using syntactic annotation to enhance authorship attribution. Literary and Linguistic Computing\u00a011, 121\u2013132 (1996)","journal-title":"Literary and Linguistic Computing"},{"key":"4_CR12","unstructured":"Hedegaard, S., Simonsen, J.G.: Lost in translation: authorship attribution using frame semantics. In: Proc. of the 49th ACL, pp. 65\u201370 (2011)"},{"key":"4_CR13","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1093\/llc\/fqm023","volume":"22","author":"G. Hirst","year":"2007","unstructured":"Hirst, G., Feiguina, O.: Bigrams of syntactic labels for authorship discrimination of short texts. Literary and Linguistic Computing\u00a022, 405\u2013417 (2007)","journal-title":"Literary and Linguistic Computing"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1093\/llc\/16.4.421","volume":"16","author":"D.L. Hoover","year":"2001","unstructured":"Hoover, D.L.: Statistical stylistics and authorship attribution: An empirical investigation. Literary and Linguistic Computing\u00a016, 421\u2013424 (2001)","journal-title":"Literary and Linguistic Computing"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Making large-scale support vector machine learning practical. In: Advances in Kernel Methods, pp. 169\u2013184. MIT Press (1999)","DOI":"10.7551\/mitpress\/1130.003.0015"},{"key":"4_CR16","unstructured":"Kern, R., Seifert, C., Zechner, M., Granitzer, M.: Vote\/veto meta-classifier for authorship identification - notebook for pan at clef 2011 (2011)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Kim, S., Kim, H., Weninger, T., Han, J., Kim, H.D.: Authorship classification: a discriminative syntactic tree mining approach. In: Proc. of the 34th SIGIR, pp. 455\u2013464 (2011)","DOI":"10.1145\/2009916.2009979"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Klein, D., Manning, C.D.: Accurate unlexicalized parsing. In: Proc. of the 41st ACL, pp. 423\u2013430 (2003)","DOI":"10.3115\/1075096.1075150"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Koppel, M., Schler, J.: Authorship verification as a one-class classification problem. In: Proc. of the 21st ICML (2004)","DOI":"10.1145\/1015330.1015448"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/s10579-009-9111-2","volume":"45","author":"M. Koppel","year":"2011","unstructured":"Koppel, M., Schler, J., Argamon, S.: Authorship attribution in the wild. Lang. Resources & Evaluation\u00a045, 83\u201394 (2011)","journal-title":"Lang. Resources & Evaluation"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1121949.1121951","volume":"49","author":"J. Li","year":"2006","unstructured":"Li, J., Zheng, R., Chen, H.: From fingerprint to writeprint. Communications of the ACM\u00a049, 76\u201382 (2006)","journal-title":"Communications of the ACM"},{"key":"4_CR22","unstructured":"Mosteller, F.W.: Inference and disputed authorship: The Federalist. Addison-Wesley (1964)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, markov chains and author unmasking: an investigation. In: Proc. of EMNLP, pp. 482\u2013491 (2006)","DOI":"10.3115\/1610075.1610142"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Seroussi, Y., Bohnert, F., Zukerman, I.: Authorship attribution with author-aware topic models. In: Proc. of ACL, pp. 264\u2013269 (2012)","DOI":"10.1162\/COLI_a_00173"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Seroussi, Y., Zukerman, I., Bohnert, F.: Collaborative inference of sentiments from texts. In: Proc. of the 18th UMAP, pp. 195\u2013206 (2010)","DOI":"10.1007\/978-3-642-13470-8_19"},{"key":"4_CR26","unstructured":"Solorio, T., Pillay, S., Raghavan, S., y Gomez, M.M.: Modality specific meta features for authorship attribution in web forum posts. In: Proc. of the 5th IJCNLP, pp. 156\u2013164 (2011)"},{"key":"4_CR27","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1162\/089120100750105920","volume":"26","author":"E. Stamatatos","year":"2000","unstructured":"Stamatatos, E., Kokkinakis, G., Fakotakis, N.: Automatic text categorization in terms of genre and author. Comput. Linguist.\u00a026, 471\u2013495 (2000)","journal-title":"Comput. Linguist."},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Uzuner, \u00d6., Katz, B.: A comparative study of language models for book and author recognition. In: Proc. of the 2nd IJCNLP, pp. 969\u2013980 (2005)","DOI":"10.1007\/11562214_84"},{"key":"4_CR29","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/604264.604272","volume":"30","author":"O. Vel de","year":"2001","unstructured":"de Vel, O., Anderson, A., Corney, M., Mohay, G.: Mining email content for author identification forensics. Sigmod Record\u00a030, 55\u201364 (2001)","journal-title":"Sigmod Record"},{"key":"4_CR30","unstructured":"Yule, G.U.: The statistical study of literary vocabulary. Cambridge University Press (1944)"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Zobel, J.: Effective and scalable authorship attribution using function words. In: Proceeding of Information Retrival Technology, pp. 174\u2013189 (2005)","DOI":"10.1007\/11562382_14"},{"key":"4_CR32","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. JASIST\u00a057, 378\u2013393 (2006)","journal-title":"JASIST"}],"container-title":["Lecture Notes in Computer Science","Mining Intelligence and Knowledge Exploration"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03844-5_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T21:15:29Z","timestamp":1688850929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03844-5_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319038438","9783319038445"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03844-5_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}