{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:57:18Z","timestamp":1768593438028,"version":"3.49.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319658124","type":"print"},{"value":"9783319658131","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-65813-1_18","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T03:54:23Z","timestamp":1502855663000},"page":"173-185","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["The Case for Being Average: A Mediocrity Approach to Style Masking and Author Obfuscation"],"prefix":"10.1007","author":[{"given":"Georgi","family":"Karadzhov","sequence":"first","affiliation":[]},{"given":"Tsvetomila","family":"Mihaylova","sequence":"additional","affiliation":[]},{"given":"Yasen","family":"Kiprov","sequence":"additional","affiliation":[]},{"given":"Georgi","family":"Georgiev","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Koychev","sequence":"additional","affiliation":[]},{"given":"Preslav","family":"Nakov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Almishari, M., Oguz, E., Tsudik, G.: Fighting authorship linkability with crowdsourcing. In: Proceedings of the Second ACM Conference on Online Social Networks (COSN 2014), pp. 69\u201382. ACM, Dublin (2014)","DOI":"10.1145\/2660460.2660486"},{"key":"18_CR2","unstructured":"Bagnall, D.: Author identification using multi-headed recurrent neural networks. In: Working Notes of CLEF 2015 - Conference and Labs of the Evaluation Forum (CLEF 2015), Toulouse (2015)"},{"issue":"3","key":"18_CR3","doi-asserted-by":"publisher","first-page":"12:1","DOI":"10.1145\/2382448.2382450","volume":"15","author":"M Brennan","year":"2012","unstructured":"Brennan, M., Afroz, S., Greenstadt, R.: Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15(3), 12:1\u201312:22 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"18_CR4","unstructured":"Brennan, M.R., Greenstadt, R.: Practical attacks against authorship recognition techniques. In: Proceedings of the Twenty-First Innovative Applications of Artificial Intelligence Conference (IAAI 2009), Pasadena (2009)"},{"key":"18_CR5","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","volume-title":"WordNet: An Electronic Lexical Database","author":"C Fellbaum","year":"1998","unstructured":"Fellbaum, C.: WordNet: An Electronic Lexical Database. Bradford Books, Cambridge (1998)"},{"key":"18_CR6","unstructured":"Ganitkevitch, J., Van Durme, B., Callison-Burch, C.: PPDB: the paraphrase database. In: Proceedings of the 2013 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT 2013), Atlanta, pp. 758\u2013764 (2013)"},{"issue":"3","key":"18_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1093\/llc\/13.3.111","volume":"13","author":"DI Holmes","year":"1998","unstructured":"Holmes, D.I.: The evolution of stylometry in humanities scholarship. Lit. Linguist. Comput. 13(3), 111\u2013117 (1998)","journal-title":"Lit. Linguist. Comput."},{"key":"18_CR8","unstructured":"Juola, P.: Detecting stylistic deception. In: Proceedings of the Workshop on Computational Approaches to Deception Detection, Avignon, pp. 91\u201396 (2012)"},{"key":"18_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-642-24212-0_9","volume-title":"Advances in Digital Forensics VII","author":"P Juola","year":"2011","unstructured":"Juola, P., Vescovi, D.: Analyzing stylometric approaches to author obfuscation. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2011. IAICT, vol. 361, pp. 115\u2013125. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-24212-0_9"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Kabbara, J., Cheung, J.C.K.: Stylistic transfer in natural language generation systems using recurrent neural networks. In: Proceedings of the Workshop on Uphill Battles in Language Processing: Scaling Early Achievements to Robust Methods, Austin, pp. 43\u201347 (2016)","DOI":"10.18653\/v1\/W16-6010"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Kacmarcik, G., Gamon, M.: Obfuscating document stylometry to preserve author anonymity. In: Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (COLING-ACL 2006), Sydney, pp. 444\u2013451 (2006)","DOI":"10.3115\/1273073.1273131"},{"key":"18_CR12","unstructured":"Keswani, Y., Trivedi, H., Mehta, P., Majumder, P.: Author masking through translation. In: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation Forum (CLEF 2016), \u00c9vora, pp. 890\u2013894 (2016)"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-319-24018-3_6","volume-title":"Information Security Theory and Practice","author":"H Le","year":"2015","unstructured":"Le, H., Safavi-Naini, R., Galib, A.: Secure obfuscation of authoring style. In: Akram, R.N., Jajodia, S. (eds.) WISTP 2015. LNCS, vol. 9311, pp. 88\u2013103. Springer, Cham (2015). doi:10.1007\/978-3-319-24018-3_6"},{"key":"18_CR14","unstructured":"Mansoorizadeh, M., Rahgooy, T., Aminiyan, M., Eskandari, M.: Author obfuscation using WordNet and language models. In: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation Forum (CLEF 2016), \u00c9vora, pp. 932\u2013938 (2016)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1007\/978-3-642-31680-7_16","volume-title":"Privacy Enhancing Technologies","author":"AWE McDonald","year":"2012","unstructured":"McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use fewer instances of the letter \u201ci\u201d: toward writing style anonymization. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299\u2013318. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-31680-7_16"},{"issue":"214","key":"18_CR16","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1126\/science.ns-9.214S.237","volume":"9","author":"TC Mendenhall","year":"1887","unstructured":"Mendenhall, T.C.: The characteristic curves of composition. Science 9(214), 237\u2013249 (1887)","journal-title":"Science"},{"key":"18_CR17","unstructured":"Mihaylova, T., Karadjov, G., Nakov, P., Kiprov, Y., Georgiev, G., Koychev, I.: SU@PAN\u20192016: author obfuscation-notebook for PAN at CLEF 2016. In: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation Forum (CLEF 2016), \u00c9vora (2016)"},{"issue":"11","key":"18_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"GA Miller","year":"1995","unstructured":"Miller, G.A.: WordNet: a lexical database for English. Commun. ACM 38(11), 39\u201341 (1995)","journal-title":"Commun. ACM"},{"key":"18_CR19","unstructured":"Potthast, M., Hagen, M., Stein, B.: Author obfuscation: Attacking the state of the art in authorship verification. In: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation Forum (CLEF 2016), \u00c9vora, pp. 716\u2013749 (2016)"},{"key":"18_CR20","unstructured":"Quirk, C., Brockett, C., Dolan, W.: Monolingual machine translation for paraphrase generation. In: Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing (EMNLP 2004), Barcelona, pp. 142\u2013149 (2004)"},{"issue":"3","key":"18_CR21","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60(3), 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"18_CR22","unstructured":"Stamatatos, E., Daelemans, W., Verhoeven, B., Juola, P., L\u00f3pez-L\u00f3pez, A., Potthast, M., Stein, B.: Overview of the author identification task at PAN 2015. In: Working Notes of CLEF 2015 - Conference and Labs of the Evaluation Forum (CLEF 2015), Toulouse (2015)"}],"container-title":["Lecture Notes in Computer Science","Experimental IR Meets Multilinguality, Multimodality, and Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65813-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T16:00:49Z","timestamp":1710345649000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-65813-1_18"}},"subtitle":["(Best of the Labs Track at CLEF-2017)"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319658124","9783319658131"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65813-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CLEF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of the Cross-Language Evaluation Forum for European Languages","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"clef2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/clef2017.clef-initiative.eu\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}