{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:03:09Z","timestamp":1746504189897,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642387081"},{"type":"electronic","value":"9783642387098"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12568-8_49","type":"book-chapter","created":{"date-parts":[[2014,10,23]],"date-time":"2014-10-23T21:38:58Z","timestamp":1414100338000},"page":"399-407","source":"Crossref","is-referenced-by-count":1,"title":["Large-Scale Micro-Blog Authorship Attribution: Beyond Simple Feature Engineering"],"prefix":"10.1007","author":[{"given":"Thiago","family":"Cavalcante","sequence":"first","affiliation":[]},{"given":"Anderson","family":"Rocha","sequence":"additional","affiliation":[]},{"given":"Ariadne","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Bishop, C.M.: Pattern recog. and machine learning, vol.\u00a01. Springer (2006)","key":"49_CR1"},{"unstructured":"Boutwell, S.R.: Authorship attribution of short messages using multimodal features. Master\u2019s thesis, Naval Postgraduate School, Monterey, CA, USA (2011)","key":"49_CR2"},{"issue":"1-2","key":"49_CR3","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1023\/A:1023824908771","volume":"19","author":"J. Diederich","year":"2003","unstructured":"Diederich, J., Kindermann, J., Leopold, E., Paass, G.: Authorship attribution with support vector machines. Applied Intelligence\u00a019(1-2), 109\u2013123 (2003)","journal-title":"Applied Intelligence"},{"unstructured":"Forstall, C.W., Scheirer, W.J.: Features from frequency: Authorship and stylistic analysis using repetitive sound. In: Annual Chicago Colloquium on Digital Humanities and Computer Science (2009)","key":"49_CR4"},{"issue":"4","key":"49_CR5","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1093\/llc\/fqm023","volume":"22","author":"G. Hirst","year":"2007","unstructured":"Hirst, G., Feiguina, O.: Bigrams of syntactic labels for authorship discrimination of short texts. Literary and Linguistic Computing\u00a022(4), 405\u2013417 (2007)","journal-title":"Literary and Linguistic Computing"},{"issue":"2","key":"49_CR6","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/llc\/10.2.111","volume":"10","author":"D.I. Holmes","year":"1995","unstructured":"Holmes, D.I., Forsyth, R.S.: The federalist revisited: New directions in authorship attribution. Literary and Linguistic Computing\u00a010(2), 111\u2013127 (1995)","journal-title":"Literary and Linguistic Computing"},{"issue":"3","key":"49_CR7","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1561\/1500000005","volume":"1","author":"P. Juola","year":"2006","unstructured":"Juola, P.: Authorship attribution. Foundations and Trends in information Retrieval\u00a01(3), 233\u2013334 (2006)","journal-title":"Foundations and Trends in information Retrieval"},{"unstructured":"Krikorian, R.: New tweets per second record, and how! Twitter Blog (2013), http:\/\/tinyurl.com\/kcuhdcw (accessed on May, 2014)","key":"49_CR8"},{"doi-asserted-by":"crossref","unstructured":"Layton, R., Watters, P., Dazeley, R.: Authorship attribution for twitter in 140 characters or less. In: Cybercrime and Trustworthy Computing, pp. 1\u20138 (2010)","key":"49_CR9","DOI":"10.1109\/CTC.2010.17"},{"unstructured":"Madigan, D., Genkin, A., Lewis, D.D., Lewis, E.G.D.D., Argamon, S., Fradkin, D., Ye, L., Consulting, D.D.L.: Author identification on the large scale. In: Meeting of the Classification Society of North America (2005)","key":"49_CR10"},{"unstructured":"Mikros, G.K., Perifanos, K.: Authorship attribution in greek tweets using authors multilevel n-gram profiles. In: AAAI Spring Symposium Series (2013)","key":"49_CR11"},{"key":"49_CR12","volume-title":"Inference and Disputed Authorship: The Federalist Papers","author":"F. Mosteller","year":"1964","unstructured":"Mosteller, F., Wallace, D.L.: Inference and Disputed Authorship: The Federalist Papers. Addison-Wesley, Reading (1964)"},{"issue":"3-4","key":"49_CR13","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1023\/B:INRT.0000011209.19643.e2","volume":"7","author":"F. Peng","year":"2004","unstructured":"Peng, F., Schuurmans, D., Wang, S.: Augmenting naive bayes classifiers with statistical language models. Information Retrieval\u00a07(3-4), 317\u2013345 (2004)","journal-title":"Information Retrieval"},{"unstructured":"Ramshaw, E.: Bashing the candidates with their own names. The New York Times (May 2012), http:\/\/tinyurl.com\/q6lc2fw (accessed on May, 2014 )","key":"49_CR14"},{"doi-asserted-by":"crossref","unstructured":"Sanderson, C., Guenter, S.: Short text authorship attribution via sequence kernels, markov chains and author unmasking: An investigation. In: Conference on Empirical Methods in Natural Language Processing, pp. 482\u2013491. Association for Computational Linguistics (2006)","key":"49_CR15","DOI":"10.3115\/1610075.1610142"},{"doi-asserted-by":"crossref","unstructured":"Schwartz, R., Tsur, O., Rappoport, A., Koppel, M.: Authorship attribution of micro-messages. In: Conference on Empirical Methods on Natural Language Processing, pp. 1880\u20131891. ACL (2013)","key":"49_CR16","DOI":"10.18653\/v1\/D13-1193"},{"unstructured":"Shih, G.: Anonymous twitter feeds arise as political weapon. The New York Times (June 2014), http:\/\/tinyurl.com\/5vol3gt (accessed on May, 2014)","key":"49_CR17"},{"doi-asserted-by":"crossref","unstructured":"Silva, R.S., Laboreiro, G., Sarmento, L., Grant, T., Oliveira, E., Maia, B.: Twazn me!!!(automatic authorship analysis of micro-blogging messages. In: Natural Language Processing and Information Systems, pp. 161\u2013168. Springer (2011)","key":"49_CR18","DOI":"10.1007\/978-3-642-22327-3_16"},{"issue":"3","key":"49_CR19","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E. Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. of the American Society for Information Science and Technology\u00a060(3), 538\u2013556 (2009)","journal-title":"J. of the American Society for Information Science and Technology"},{"doi-asserted-by":"crossref","unstructured":"Uzuner, \u00d6., Katz, B.: A comparative study of language models for book and author recognition. In: Intl. Joint Conf. on Natural Language Processing, p. 969 (2005)","key":"49_CR20","DOI":"10.1007\/11562214_84"},{"unstructured":"Waters, J.: Why id thieves love social media. The Wall Street Journal (March 2012), http:\/\/tinyurl.com\/ldvhpsb (accessed on May, 2014)","key":"49_CR21"},{"doi-asserted-by":"crossref","unstructured":"Wu, J.: Power mean svm for large scale visual classification. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 2344\u20132351 (2012)","key":"49_CR22","DOI":"10.1109\/CVPR.2012.6247946"},{"issue":"3","key":"49_CR23","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/asi.20316","volume":"57","author":"R. Zheng","year":"2006","unstructured":"Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: Writing-style features and classification techniques. J. of the American Society for Information Science and Technology\u00a057(3), 378\u2013393 (2006)","journal-title":"J. of the American Society for Information Science and Technology"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12568-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T12:10:46Z","timestamp":1746447046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-12568-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642387081","9783642387098"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12568-8_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}