{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:13:19Z","timestamp":1773155599882,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319600796","type":"print"},{"value":"9783319600802","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_9","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T10:40:06Z","timestamp":1496313606000},"page":"115-135","source":"Crossref","is-referenced-by-count":16,"title":["Stylometric Authorship Attribution of Collaborative Documents"],"prefix":"10.1007","author":[{"given":"Edwin","family":"Dauber","sequence":"first","affiliation":[]},{"given":"Rebekah","family":"Overdorf","sequence":"additional","affiliation":[]},{"given":"Rachel","family":"Greenstadt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"issue":"2","key":"9_CR1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1344411.1344413","volume":"26","author":"A Abbasi","year":"2008","unstructured":"Abbasi, A., Chen, H.: Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. (TOIS) 26(2), 7 (2008)","journal-title":"ACM Trans. Inf. Syst. (TOIS)"},{"issue":"11","key":"9_CR2","doi-asserted-by":"crossref","first-page":"2256","DOI":"10.1002\/asi.22924","volume":"64","author":"N Akiva","year":"2013","unstructured":"Akiva, N., Koppel, M.: A generic unsupervised method for decomposing multi-author documents. J. Am. Soc. Inf. Sci. Technol. 64(11), 2256\u20132264 (2013)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Almishari, M., Oguz, E., Tsudik, G.: Fighting authorship linkability with crowdsourcing. In: Proceedings of the 2nd of the ACM Conference on Online Social Networks, pp. 69\u201382. ACM (2014)","DOI":"10.1145\/2660460.2660486"},{"issue":"3","key":"9_CR4","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2382448.2382450","volume":"15","author":"M Brennan","year":"2012","unstructured":"Brennan, M., Afroz, S., Greenstadt, R.: Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. (TISSEC) 15(3), 12 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"9_CR5","unstructured":"Corney, M.W., Anderson, A.M., Mohay, G.M., de Vel, O.: Identifying the authors of suspect email. Comput. Secur. (2001)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Dauber, E., Caliskan, A., Harang, R., Greenstadt, R.: Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments. arXiv preprint arXiv:1701.05681 (2017)","DOI":"10.1145\/3183440.3195007"},{"issue":"1\u20132","key":"9_CR7","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1023\/A:1023824908771","volume":"19","author":"J Diederich","year":"2003","unstructured":"Diederich, J., Kindermann, J., Leopold, E., Paass, G.: Authorship attribution with support vector machines. Appl. Intell. 19(1\u20132), 109\u2013123 (2003)","journal-title":"Appl. Intell."},{"key":"9_CR8","unstructured":"Fifield, D., Follan, T., Lunde, E.: Unsupervised authorship attribution. arXiv preprint arXiv:1503.07613 (2015)"},{"key":"9_CR9","unstructured":"Harpalani, M., Hart, M., Singh, S., Johnson, R., Choi, Y.: Language of vandalism: improving wikipedia vandalism detection via stylometric analysis. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies: Short Papers, vol. 2, pp. 83\u201388. Association for Computational Linguistics (2011)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Juola, P., et al.: Authorship attribution. Found. Trends $$\\textregistered $$ Inf. Retrieval 1(3), 233\u2013334 (2008)","DOI":"10.1561\/1500000005"},{"key":"9_CR11","unstructured":"Koppel, M., Akiva, N., Dershowitz, I., Dershowitz, N.: Unsupervised decomposition of a document into authorial components. In: Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, vol. 1, pp. 1356\u20131364. Association for Computational Linguistics (2011)"},{"key":"9_CR12","unstructured":"Macke, S., Hirshman, J.: Deep sentence-level authorship attribution (2015)"},{"issue":"9","key":"9_CR13","doi-asserted-by":"crossref","first-page":"3084","DOI":"10.1016\/j.patcog.2012.03.004","volume":"45","author":"G Madjarov","year":"2012","unstructured":"Madjarov, G., Kocev, D., Gjorgjevikj, D., D\u017eeroski, S.: An extensive experimental comparison of methods for multi-label learning. Pattern Recogn. 45(9), 3084\u20133104 (2012)","journal-title":"Pattern Recogn."},{"key":"9_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-31680-7_16","volume-title":"Privacy Enhancing Technologies","author":"AWE McDonald","year":"2012","unstructured":"McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use fewer instances of the letter \u201ci\u201d: toward writing style anonymization. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299\u2013318. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31680-7_16"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Overdorf, R., Greenstadt, R.: Blogs, twitter feeds, and reddit comments: cross-domain authorship attribution. PoPETs 2016(3), 155\u2013171 (2016)","DOI":"10.1515\/popets-2016-0021"},{"key":"9_CR16","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2014.2368355","volume":"10","author":"M Payer","year":"2015","unstructured":"Payer, M., Huang, L., Gong, N.Z., Borgolte, K., Frank, M.: What you submit is who you are: a multi-modal approach for deanonymizing scientific publications. IEEE Trans. Inf. Forensics Secur. 10, 200\u2013212 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"9_CR17","unstructured":"Solorio, T., Hasan, R., Mizan, M.: Sockpuppet detection in wikipedia: a corpus of real-world deceptive writing for linking identities. arXiv preprint arXiv:1310.6772 (2013)"},{"issue":"3","key":"9_CR18","first-page":"13","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehouse. Min. 3(3), 13 (2007)","journal-title":"Int. J. Data Warehouse. Min."},{"key":"9_CR19","unstructured":"Tsoumakas, G., Katakis, I., Vlahavas, I.: Effective and efficient multilabel classification in domains with large number of labels. In: Proceedings of ECML\/PKDD 2008 Workshop on Mining Multidimensional Data (MMD 2008), pp. 30\u201344 (2008)"},{"key":"9_CR20","first-page":"667","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"G Tsoumakas","year":"2010","unstructured":"Tsoumakas, G., Katakis, I., Vlahavas, I.: Mining multi-label data. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 667\u2013685. Springer, New York (2010)"},{"issue":"7","key":"9_CR21","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1109\/TKDE.2010.164","volume":"23","author":"G Tsoumakas","year":"2011","unstructured":"Tsoumakas, G., Katakis, I., Vlahavas, I.: Random k-labelsets for multilabel classification. IEEE Trans. Knowl. Data Eng. 23(7), 1079\u20131089 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"9_CR22","doi-asserted-by":"crossref","first-page":"2038","DOI":"10.1016\/j.patcog.2006.12.019","volume":"40","author":"ML Zhang","year":"2007","unstructured":"Zhang, M.L., Zhou, Z.H.: ML-KNN: a lazy learning approach to multi-label learning. Pattern Recogn. 40(7), 2038\u20132048 (2007)","journal-title":"Pattern Recogn."}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T07:24:08Z","timestamp":1569396248000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}